Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO#150003191.exe

Overview

General Information

Sample name:PO#150003191.exe
Analysis ID:1551927
MD5:5e65cf7e65869dadf646fb12f02f11f1
SHA1:4bd0a57e77856c5a78fc09450b9416e104e51423
SHA256:1ffe4c1c7499b8e319bec5719db4c238fdd7c94861d7e19cee97ce92645f0765
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO#150003191.exe (PID: 2876 cmdline: "C:\Users\user\Desktop\PO#150003191.exe" MD5: 5E65CF7E65869DADF646FB12F02F11F1)
    • RegSvcs.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\PO#150003191.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "d09913@jeepcommerce.rs", "Password": "q[0r3BqZHV[u"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.2058400763.0000000001710000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 F9 88 44 24 2B 88 44 24 2F B0 75 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    00000002.00000002.4489863959.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 F9 88 44 24 2B 88 44 24 2F B0 75 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Click to see the 20 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 F9 88 44 24 2B 88 44 24 2F B0 75 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        2.2.RegSvcs.exe.56e0ee8.6.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegSvcs.exe.56e0ee8.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            2.2.RegSvcs.exe.56e0ee8.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              2.2.RegSvcs.exe.56e0ee8.6.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3ea31:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x3eaa3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3eb2d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x3ebbf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x3ec29:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x3ec9b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x3ed31:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x3edc1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              Click to see the 86 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-08T11:41:58.373164+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549738TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "d09913@jeepcommerce.rs", "Password": "q[0r3BqZHV[u"}
              Source: PO#150003191.exeReversingLabs: Detection: 36%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: PO#150003191.exeJoe Sandbox ML: detected
              Source: PO#150003191.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: PO#150003191.exe, 00000000.00000003.2051346185.0000000004740000.00000004.00001000.00020000.00000000.sdmp, PO#150003191.exe, 00000000.00000003.2048716515.00000000045A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: PO#150003191.exe, 00000000.00000003.2051346185.0000000004740000.00000004.00001000.00020000.00000000.sdmp, PO#150003191.exe, 00000000.00000003.2048716515.00000000045A0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewASN Name: BEOTEL-AShttpwwwbeotelnetRS BEOTEL-AShttpwwwbeotelnetRS
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: ip-api.com
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49738
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
              Source: RegSvcs.exe, 00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
              Source: RegSvcs.exe, 00000002.00000002.4496373165.0000000003124000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: RegSvcs.exe, 00000002.00000002.4496373165.0000000003124000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: RegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: RegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: RegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49704 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, JIcKHs9coGd.cs.Net Code: Gz7EnQtwbBn
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

              System Summary

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.PO#150003191.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000000.00000002.2058400763.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4489863959.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: PO#150003191.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0042200C0_2_0042200C
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0041A2170_2_0041A217
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004122160_2_00412216
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0042435D0_2_0042435D
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004033C00_2_004033C0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044F4300_2_0044F430
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004125E80_2_004125E8
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044663B0_2_0044663B
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004096A00_2_004096A0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004138010_2_00413801
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0042096F0_2_0042096F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004129D00_2_004129D0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004119E30_2_004119E3
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0041C9AE0_2_0041C9AE
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0047EA6F0_2_0047EA6F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040FA100_2_0040FA10
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044EB5F0_2_0044EB5F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00423C810_2_00423C81
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00411E780_2_00411E78
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00442E0C0_2_00442E0C
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00420EC00_2_00420EC0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044CF170_2_0044CF17
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00444FD20_2_00444FD2
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_03F23EA00_2_03F23EA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D7CD582_2_02D7CD58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D7D9702_2_02D7D970
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D712EE2_2_02D712EE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D70FD02_2_02D70FD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D7D0A02_2_02D7D0A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02D710302_2_02D71030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06769FF82_2_06769FF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06765F802_2_06765F80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0676D0102_2_0676D010
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0676F9082_2_0676F908
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06766B902_2_06766B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067600402_2_06760040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067600072_2_06760007
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB60F02_2_06DB60F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB70702_2_06DB7070
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB0EF02_2_06DB0EF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DBAFB02_2_06DBAFB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB04782_2_06DB0478
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB92802_2_06DB9280
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB1FF02_2_06DB1FF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: String function: 004115D7 appears 36 times
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: String function: 00416C70 appears 39 times
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: String function: 00445AE0 appears 55 times
              Source: PO#150003191.exe, 00000000.00000003.2053908130.000000000486D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO#150003191.exe
              Source: PO#150003191.exe, 00000000.00000003.2051636917.00000000046C3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO#150003191.exe
              Source: PO#150003191.exe, 00000000.00000002.2058400763.0000000001710000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename30168ba9-c486-4019-81b9-f83949bb0f24.exe4 vs PO#150003191.exe
              Source: PO#150003191.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.PO#150003191.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000000.00000002.2058400763.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4489863959.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, jeDZ.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, jeDZ.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, jeDZ.csCryptographic APIs: 'TransformFinalBlock'
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, jeDZ.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\PO#150003191.exeFile created: C:\Users\user\AppData\Local\Temp\lophophorineJump to behavior
              Source: PO#150003191.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\PO#150003191.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PO#150003191.exeReversingLabs: Detection: 36%
              Source: C:\Users\user\Desktop\PO#150003191.exeFile read: C:\Users\user\Desktop\PO#150003191.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PO#150003191.exe "C:\Users\user\Desktop\PO#150003191.exe"
              Source: C:\Users\user\Desktop\PO#150003191.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO#150003191.exe"
              Source: C:\Users\user\Desktop\PO#150003191.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO#150003191.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: PO#150003191.exeStatic file information: File size 1283911 > 1048576
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: PO#150003191.exe, 00000000.00000003.2051346185.0000000004740000.00000004.00001000.00020000.00000000.sdmp, PO#150003191.exe, 00000000.00000003.2048716515.00000000045A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: PO#150003191.exe, 00000000.00000003.2051346185.0000000004740000.00000004.00001000.00020000.00000000.sdmp, PO#150003191.exe, 00000000.00000003.2048716515.00000000045A0000.00000004.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: PO#150003191.exeStatic PE information: real checksum: 0xa961f should be: 0x13d358
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BFCD pushad ; ret 2_2_0041BFCE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06DB926F push eax; retf 2_2_06DB9279
              Source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Y1FTWNwffa3uV', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Y1FTWNwffa3uV', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Y1FTWNwffa3uV', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Y1FTWNwffa3uV', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'Y1FTWNwffa3uV', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\PO#150003191.exeAPI/Special instruction interceptor: Address: 3F23AC4
              Source: RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599282Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599157Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599012Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598784Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597969Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596612Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2309Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7492Jump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeAPI coverage: 3.3 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599282Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599157Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599012Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598784Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597969Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596612Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
              Source: RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
              Source: RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVBox
              Source: RegSvcs.exe, 00000002.00000002.4498780839.0000000005A92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06762008 CheckRemoteDebuggerPresent,2_2_06762008
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_03F226C0 mov eax, dword ptr fs:[00000030h]0_2_03F226C0
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_03F23D90 mov eax, dword ptr fs:[00000030h]0_2_03F23D90
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_03F23D30 mov eax, dword ptr fs:[00000030h]0_2_03F23D30
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\PO#150003191.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F9E008Jump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
              Source: C:\Users\user\Desktop\PO#150003191.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO#150003191.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
              Source: PO#150003191.exeBinary or memory string: Shell_TrayWnd
              Source: PO#150003191.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6600, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: PO#150003191.exeBinary or memory string: WIN_XP
              Source: PO#150003191.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
              Source: PO#150003191.exeBinary or memory string: WIN_XPe
              Source: PO#150003191.exeBinary or memory string: WIN_VISTA
              Source: PO#150003191.exeBinary or memory string: WIN_7
              Source: PO#150003191.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6600, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6600, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.4124790.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.56e0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2def7de.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.2df06c6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.5770000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.40d5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
              Source: C:\Users\user\Desktop\PO#150003191.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              221
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              1
              Credentials in Registry
              2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS138
              System Information Discovery
              Distributed Component Object Model121
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets651
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials231
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items231
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PO#150003191.exe37%ReversingLabsWin32.Trojan.Generic
              PO#150003191.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://ftp.jeepcommerce.rs0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ftp.jeepcommerce.rs
              195.252.110.253
              truetrue
                unknown
                api.ipify.org
                172.67.74.152
                truefalse
                  high
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                      high
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.orgRegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://account.dyn.com/RegSvcs.exe, 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4496373165.00000000030D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ip-api.comRegSvcs.exe, 00000002.00000002.4496373165.0000000003124000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  195.252.110.253
                                  ftp.jeepcommerce.rsSerbia
                                  6700BEOTEL-AShttpwwwbeotelnetRStrue
                                  172.67.74.152
                                  api.ipify.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1551927
                                  Start date and time:2024-11-08 11:40:12 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 9m 5s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:PO#150003191.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 95%
                                  • Number of executed functions: 48
                                  • Number of non-executed functions: 310
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: PO#150003191.exe
                                  TimeTypeDescription
                                  05:41:06API Interceptor10776666x Sleep call for process: RegSvcs.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.1SecuriteInfo.com.Trojan.PWS.Stealer.36948.5627.25665.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  file.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  qWBySdk8Ng.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • ip-api.com/json/
                                  Adp7cjgsPN.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • ip-api.com/line/?fields=hosting
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • ip-api.com/line/?fields=hosting
                                  tU1qSK21hV.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                  • ip-api.com/json/
                                  xyDbBgoa3s.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  lIocM276SA.exeGet hashmaliciousRemcos, Amadey, LummaC Stealer, Stealc, WhiteSnake StealerBrowse
                                  • ip-api.com/line?fields=query,country
                                  file.exeGet hashmaliciousLummaC, Remcos, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                                  • ip-api.com/line?fields=query,country
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ip-api.comSecuriteInfo.com.Trojan.PWS.Stealer.36948.5627.25665.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  file.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  qWBySdk8Ng.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 208.95.112.1
                                  Adp7cjgsPN.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • 208.95.112.1
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • 208.95.112.1
                                  tU1qSK21hV.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                  • 208.95.112.1
                                  xyDbBgoa3s.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  https://login-zendesk-account.servz.com.pkGet hashmaliciousHTMLPhisherBrowse
                                  • 85.10.196.124
                                  https://login-zendesk-account.servz.com.pkGet hashmaliciousHTMLPhisherBrowse
                                  • 85.10.196.124
                                  ftp.jeepcommerce.rsdg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  EgjKf0gmd1.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.252.110.253
                                  INVOICE SUBMISSION.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.252.110.253
                                  KM75Avr7PS.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.252.110.253
                                  Bm3Ux1o05M.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  po89654.exeGet hashmaliciousAgentTeslaBrowse
                                  • 195.252.110.253
                                  New order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  api.ipify.orgQ88.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 172.67.74.152
                                  ACTION REQUIRED Revised Billing #NL992-071 From Robinson Aviation Inc.msgGet hashmaliciousUnknownBrowse
                                  • 104.26.13.205
                                  Play_VM_00_01_22sec-ATT212monika.hayward@bostonbeer.com.htmlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                  • 104.26.12.205
                                  vUWhc67uSc.exeGet hashmaliciousStormKittyBrowse
                                  • 172.67.74.152
                                  vUWhc67uSc.exeGet hashmaliciousStormKittyBrowse
                                  • 172.67.74.152
                                  Copia pendiente de pago Proveedor 107924.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.12.205
                                  fz9TDYlgmf.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 104.26.12.205
                                  DnpIU3I6HL.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 104.26.12.205
                                  00514DIRyT.exeGet hashmaliciousGO StealerBrowse
                                  • 104.26.13.205
                                  C2jr42FUsv.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.12.205
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TUT-ASUSSecuriteInfo.com.Trojan.PWS.Stealer.36948.5627.25665.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  file.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  qWBySdk8Ng.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 208.95.112.1
                                  Adp7cjgsPN.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • 208.95.112.1
                                  tOSTxAsB65.exeGet hashmaliciousNoCryBrowse
                                  • 208.95.112.1
                                  tU1qSK21hV.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                  • 208.95.112.1
                                  xyDbBgoa3s.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  lIocM276SA.exeGet hashmaliciousRemcos, Amadey, LummaC Stealer, Stealc, WhiteSnake StealerBrowse
                                  • 208.95.112.1
                                  file.exeGet hashmaliciousLummaC, Remcos, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                                  • 208.95.112.1
                                  BEOTEL-AShttpwwwbeotelnetRSdg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 195.252.110.253
                                  belks.mips.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.183
                                  belks.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.157
                                  belks.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.156
                                  splsh4.elfGet hashmaliciousUnknownBrowse
                                  • 217.26.70.40
                                  atH4SE3Oi6.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.149
                                  5tSAlF2WkT.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.197
                                  jade.x86.elfGet hashmaliciousMiraiBrowse
                                  • 62.108.98.197
                                  CLOUDFLARENETUSDigiturk.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  eQwUFcwrXk.lnkGet hashmaliciousDucktailBrowse
                                  • 104.21.86.219
                                  4YgQ2xN41W.lnkGet hashmaliciousRDPWrap Tool, DucktailBrowse
                                  • 104.21.86.219
                                  EERNI7eIS7.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.137.62
                                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                  • 172.67.133.135
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                  • 104.21.5.155
                                  http://laughterchefs.ru/dotGet hashmaliciousUnknownBrowse
                                  • 188.114.96.3
                                  cOOhDuNWt7.lnkGet hashmaliciousDucktailBrowse
                                  • 162.159.61.3
                                  O5PR3i6ILA.lnkGet hashmaliciousDucktailBrowse
                                  • 104.21.86.219
                                  https://nvcourts.gov/Get hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0eCracker.exeGet hashmaliciousLuca StealerBrowse
                                  • 172.67.74.152
                                  Cracker.exeGet hashmaliciousLuca StealerBrowse
                                  • 172.67.74.152
                                  eQwUFcwrXk.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.74.152
                                  4YgQ2xN41W.lnkGet hashmaliciousRDPWrap Tool, DucktailBrowse
                                  • 172.67.74.152
                                  EERNI7eIS7.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.74.152
                                  cOOhDuNWt7.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.74.152
                                  monthly-eStatementForum120478962.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                  • 172.67.74.152
                                  O5PR3i6ILA.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.74.152
                                  SPENDINGONDIGITALMARKETING_DIGITALMARKETINGBUDGET lnk.lnkGet hashmaliciousDucktailBrowse
                                  • 172.67.74.152
                                  monthly-eStatementForum120478962.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                  • 172.67.74.152
                                  No context
                                  Process:C:\Users\user\Desktop\PO#150003191.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):269824
                                  Entropy (8bit):7.912487761029892
                                  Encrypted:false
                                  SSDEEP:6144:R0d6O1K5T78Gk6rAzNj/cXOhejhssdRXiFTlcHNfgy54:RwH1SXeR/SOhets2btn4
                                  MD5:56B586F5A81FE4FC547ACAB8FECFA7EF
                                  SHA1:66522E7FE73D09AF663712F9B2AC12BBFE5FB952
                                  SHA-256:C149E6A049B160F8094342BCE92C78FC8527F6A3E7FEDD3A60DEAA9B18641603
                                  SHA-512:CB5272674E5C6C454BD74C518E0FE999E4D008EBE5107ED311A0A4EC0941645BB2F7098FE00B36F9C79C8D89A355CDD1349BC185C8D24BB16B960D335A791504
                                  Malicious:false
                                  Reputation:low
                                  Preview:...5DP99HDU5..XN.2Z4VZN8.DA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMK.5GP7&.JU.K.y.U~...2'Kw43]0?*7.$1WW#0uW'n*;:.3Zv..kw).V2cFW?cP99LDU5*^.cxC.Jz+.F{5.Len4$.6.G2..+.3.&b%.$h'.0.t*?.&.5h....H.:g.90u?.L.]52bI.:A2WMKZ5GP99LDU5B5..12Z4V..8W.@6W9.ZeGP99LDU5.N{O_3S4V.O8W.C2WMKZ..P99\DU5.OXNTrZ4FZN8UDA7WMKZ5GP<9LDU5BNX.P2Z0VZ..UDC2W.KZ%GP)9LDU%BNHNT2Z4VJN8WDA2WMKZ5.E;9.DU5B.ZNh.[4VZN8WDA2WMKZ5GP99LDU5BNX..3Z(VZN8WDA2WMKZ5GP99LDU5BNXNT2.9TZ.8WDA2WMKZ5GP.8L.T5BNXNT2Z4VZN8WDA2WMKZ5GP99b00M6NXNL.[4VJN8W.@2WIKZ5GP99LDU5BNXnT2:.$>/L6DA.:MKZ.FP9WLDU.CNXNT2Z4VZN8WD.2W.e>T3199L.e5BNxLT2L4VZD:WDA2WMKZ5GP99.DU.l<+<72Z4j.O8W$C2W.JZ5gR99LDU5BNXNT2ZtVZ.8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BNXNT2Z4VZN8WDA2WMKZ5GP99LDU5BN
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.4963545333699875
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:PO#150003191.exe
                                  File size:1'283'911 bytes
                                  MD5:5e65cf7e65869dadf646fb12f02f11f1
                                  SHA1:4bd0a57e77856c5a78fc09450b9416e104e51423
                                  SHA256:1ffe4c1c7499b8e319bec5719db4c238fdd7c94861d7e19cee97ce92645f0765
                                  SHA512:fc1f6a6662bddafa526500b3bd3eb957f0d0e02bb1d19f386285ea95547b42e992dea6a6416b0a3e8c63c5dd21f6fe6d7f9f0a9754105b127a08bd755ab6493a
                                  SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCSR5AsNuUYxq70ufMNunGH:7JZoQrbTFZY1iaC0pYAF2H
                                  TLSH:F255E121F5D68036C2B323B19E7FF76A963D69360326D29727C82D321EA05416B39773
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                  Icon Hash:1733312925935517
                                  Entrypoint:0x4165c1
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                  Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:0
                                  File Version Major:5
                                  File Version Minor:0
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:0
                                  Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                  Instruction
                                  call 00007FF4F0E20CEBh
                                  jmp 00007FF4F0E17B5Eh
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push ebp
                                  mov ebp, esp
                                  push edi
                                  push esi
                                  mov esi, dword ptr [ebp+0Ch]
                                  mov ecx, dword ptr [ebp+10h]
                                  mov edi, dword ptr [ebp+08h]
                                  mov eax, ecx
                                  mov edx, ecx
                                  add eax, esi
                                  cmp edi, esi
                                  jbe 00007FF4F0E17CDAh
                                  cmp edi, eax
                                  jc 00007FF4F0E17E76h
                                  cmp ecx, 00000080h
                                  jc 00007FF4F0E17CEEh
                                  cmp dword ptr [004A9724h], 00000000h
                                  je 00007FF4F0E17CE5h
                                  push edi
                                  push esi
                                  and edi, 0Fh
                                  and esi, 0Fh
                                  cmp edi, esi
                                  pop esi
                                  pop edi
                                  jne 00007FF4F0E17CD7h
                                  jmp 00007FF4F0E180B2h
                                  test edi, 00000003h
                                  jne 00007FF4F0E17CE6h
                                  shr ecx, 02h
                                  and edx, 03h
                                  cmp ecx, 08h
                                  jc 00007FF4F0E17CFBh
                                  rep movsd
                                  jmp dword ptr [00416740h+edx*4]
                                  mov eax, edi
                                  mov edx, 00000003h
                                  sub ecx, 04h
                                  jc 00007FF4F0E17CDEh
                                  and eax, 03h
                                  add ecx, eax
                                  jmp dword ptr [00416654h+eax*4]
                                  jmp dword ptr [00416750h+ecx*4]
                                  nop
                                  jmp dword ptr [004166D4h+ecx*4]
                                  nop
                                  inc cx
                                  add byte ptr [eax-4BFFBE9Ah], dl
                                  inc cx
                                  add byte ptr [ebx], ah
                                  ror dword ptr [edx-75F877FAh], 1
                                  inc esi
                                  add dword ptr [eax+468A0147h], ecx
                                  add al, cl
                                  jmp 00007FF4F32904D7h
                                  add esi, 03h
                                  add edi, 03h
                                  cmp ecx, 08h
                                  jc 00007FF4F0E17C9Eh
                                  rep movsd
                                  jmp dword ptr [00000000h+edx*4]
                                  Programming Language:
                                  • [ C ] VS2010 SP1 build 40219
                                  • [C++] VS2010 SP1 build 40219
                                  • [ C ] VS2008 SP1 build 30729
                                  • [IMP] VS2008 SP1 build 30729
                                  • [ASM] VS2010 SP1 build 40219
                                  • [RES] VS2010 SP1 build 40219
                                  • [LNK] VS2010 SP1 build 40219
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                  RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                  RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                  RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                  RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                  RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                  RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                  RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                  RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                  RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                  RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                  RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                  DLLImport
                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                  USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                  GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                  OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishGreat Britain
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-08T11:41:58.373164+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549738TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 8, 2024 11:41:06.231662035 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:06.231702089 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:06.231790066 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:06.288192034 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:06.288222075 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:06.908262968 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:06.908334017 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:06.913229942 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:06.913240910 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:06.913568974 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:06.964732885 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:07.045442104 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:07.087333918 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:07.219577074 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:07.219645023 CET44349704172.67.74.152192.168.2.5
                                  Nov 8, 2024 11:41:07.219693899 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:07.246803999 CET49704443192.168.2.5172.67.74.152
                                  Nov 8, 2024 11:41:07.270157099 CET4970580192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.274945021 CET8049705208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:07.275028944 CET4970580192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.275166988 CET4970580192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.279937029 CET8049705208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:07.279973984 CET8049705208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:07.322458982 CET4970680192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.327575922 CET8049706208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:07.327708006 CET4970680192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.327796936 CET4970680192.168.2.5208.95.112.1
                                  Nov 8, 2024 11:41:07.332576990 CET8049706208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:07.332926989 CET8049706208.95.112.1192.168.2.5
                                  Nov 8, 2024 11:41:08.598144054 CET4970721192.168.2.5195.252.110.253
                                  Nov 8, 2024 11:41:08.603329897 CET2149707195.252.110.253192.168.2.5
                                  Nov 8, 2024 11:41:08.603420019 CET4970721192.168.2.5195.252.110.253
                                  Nov 8, 2024 11:41:08.604832888 CET4970721192.168.2.5195.252.110.253
                                  Nov 8, 2024 11:41:08.609464884 CET2149707195.252.110.253192.168.2.5
                                  Nov 8, 2024 11:41:08.609510899 CET4970721192.168.2.5195.252.110.253
                                  Nov 8, 2024 11:41:08.609628916 CET2149707195.252.110.253192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 8, 2024 11:41:06.215909958 CET6301653192.168.2.51.1.1.1
                                  Nov 8, 2024 11:41:06.222537994 CET53630161.1.1.1192.168.2.5
                                  Nov 8, 2024 11:41:07.262312889 CET5012753192.168.2.51.1.1.1
                                  Nov 8, 2024 11:41:07.269596100 CET53501271.1.1.1192.168.2.5
                                  Nov 8, 2024 11:41:08.526412010 CET6101153192.168.2.51.1.1.1
                                  Nov 8, 2024 11:41:08.597484112 CET53610111.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 8, 2024 11:41:06.215909958 CET192.168.2.51.1.1.10xcb94Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:07.262312889 CET192.168.2.51.1.1.10xe1e3Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:08.526412010 CET192.168.2.51.1.1.10x38edStandard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 8, 2024 11:41:06.222537994 CET1.1.1.1192.168.2.50xcb94No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:06.222537994 CET1.1.1.1192.168.2.50xcb94No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:06.222537994 CET1.1.1.1192.168.2.50xcb94No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:07.269596100 CET1.1.1.1192.168.2.50xe1e3No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                  Nov 8, 2024 11:41:08.597484112 CET1.1.1.1192.168.2.50x38edNo error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                  • api.ipify.org
                                  • ip-api.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549705208.95.112.1806600C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  TimestampBytes transferredDirectionData
                                  Nov 8, 2024 11:41:07.275166988 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                  Host: ip-api.com
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549706208.95.112.1806600C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  TimestampBytes transferredDirectionData
                                  Nov 8, 2024 11:41:07.327796936 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                  Host: ip-api.com
                                  Connection: Keep-Alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549704172.67.74.1524436600C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  TimestampBytes transferredDirectionData
                                  2024-11-08 10:41:07 UTC155OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                  Host: api.ipify.org
                                  Connection: Keep-Alive
                                  2024-11-08 10:41:07 UTC399INHTTP/1.1 200 OK
                                  Date: Fri, 08 Nov 2024 10:41:07 GMT
                                  Content-Type: text/plain
                                  Content-Length: 14
                                  Connection: close
                                  Vary: Origin
                                  cf-cache-status: DYNAMIC
                                  Server: cloudflare
                                  CF-RAY: 8df4f2e36f016b2e-DFW
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1050&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2818&recv_bytes=769&delivery_rate=2768642&cwnd=247&unsent_bytes=0&cid=1974f63fcd66e4e8&ts=318&x=0"
                                  2024-11-08 10:41:07 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 30
                                  Data Ascii: 173.254.250.90


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:05:41:02
                                  Start date:08/11/2024
                                  Path:C:\Users\user\Desktop\PO#150003191.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\PO#150003191.exe"
                                  Imagebase:0x400000
                                  File size:1'283'911 bytes
                                  MD5 hash:5E65CF7E65869DADF646FB12F02F11F1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2058400763.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:05:41:03
                                  Start date:08/11/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\PO#150003191.exe"
                                  Imagebase:0xc80000
                                  File size:45'984 bytes
                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4496373165.0000000003162000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.4489863959.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4497510334.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4496373165.0000000003138000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.4498204210.00000000056E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.4498501327.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4494153877.0000000002DAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:3.2%
                                    Dynamic/Decrypted Code Coverage:2.2%
                                    Signature Coverage:4.4%
                                    Total number of Nodes:1850
                                    Total number of Limit Nodes:36
                                    execution_graph 86120 4010e0 86123 401100 86120->86123 86122 4010f8 86124 401113 86123->86124 86125 401184 86124->86125 86126 40114c 86124->86126 86128 401120 86124->86128 86156 401182 86124->86156 86161 401250 61 API calls __localtime64_s 86125->86161 86129 401151 86126->86129 86130 40119d 86126->86130 86127 40112c DefWindowProcW 86127->86122 86128->86127 86168 401000 Shell_NotifyIconW __localtime64_s 86128->86168 86132 401219 86129->86132 86133 40115d 86129->86133 86134 42afb4 86130->86134 86139 4011a3 86130->86139 86132->86128 86136 401225 86132->86136 86135 401163 86133->86135 86142 42b01d 86133->86142 86163 40f190 10 API calls 86134->86163 86143 42afe9 86135->86143 86144 40116c 86135->86144 86170 468b0e 74 API calls __localtime64_s 86136->86170 86139->86128 86140 4011b6 KillTimer 86139->86140 86141 4011db SetTimer RegisterWindowMessageW 86139->86141 86162 401000 Shell_NotifyIconW __localtime64_s 86140->86162 86145 401193 86141->86145 86148 401204 CreatePopupMenu 86141->86148 86142->86127 86167 4370f4 52 API calls 86142->86167 86165 40f190 10 API calls 86143->86165 86144->86128 86150 401174 86144->86150 86145->86122 86146 42b04f 86169 40e0c0 74 API calls __localtime64_s 86146->86169 86148->86122 86164 45fd57 65 API calls __localtime64_s 86150->86164 86154 42b00e 86166 401a50 331 API calls 86154->86166 86155 4011c9 PostQuitMessage 86155->86122 86156->86127 86157 42afe4 86157->86145 86160 42afdc 86160->86127 86160->86157 86161->86145 86162->86155 86163->86145 86164->86160 86165->86154 86166->86156 86167->86156 86168->86146 86169->86156 86170->86157 86171 40bd20 86172 428194 86171->86172 86173 40bd2d 86171->86173 86175 40bd43 86172->86175 86177 4281bc 86172->86177 86178 4281b2 86172->86178 86174 40bd37 86173->86174 86194 4531b1 85 API calls 5 library calls 86173->86194 86183 40bd50 86174->86183 86193 45e987 86 API calls moneypunct 86177->86193 86192 40b510 VariantClear 86178->86192 86182 4281ba 86184 426cf1 86183->86184 86185 40bd63 86183->86185 86204 44cde9 52 API calls _memmove 86184->86204 86195 40bd80 86185->86195 86188 426cfc 86205 40e0a0 86188->86205 86189 40bd73 86189->86175 86191 426d02 86192->86182 86193->86173 86194->86174 86196 40bd8e 86195->86196 86203 40bdb7 _memmove 86195->86203 86197 40bded 86196->86197 86198 40bdad 86196->86198 86196->86203 86215 4115d7 86197->86215 86209 402f00 86198->86209 86202 4115d7 52 API calls 86202->86203 86203->86189 86204->86188 86206 40e0b2 86205->86206 86207 40e0a8 86205->86207 86206->86191 86249 403c30 52 API calls _memmove 86207->86249 86210 402f10 86209->86210 86211 402f0c 86209->86211 86212 4115d7 52 API calls 86210->86212 86213 4268c3 86210->86213 86211->86203 86214 402f51 moneypunct _memmove 86212->86214 86214->86203 86217 4115e1 _malloc 86215->86217 86218 40bdf6 86217->86218 86221 4115fd std::exception::exception 86217->86221 86226 4135bb 86217->86226 86218->86202 86218->86203 86219 41163b 86241 4180af 46 API calls std::exception::operator= 86219->86241 86221->86219 86240 41130a 51 API calls __cinit 86221->86240 86222 411645 86242 418105 RaiseException 86222->86242 86225 411656 86227 413638 _malloc 86226->86227 86235 4135c9 _malloc 86226->86235 86248 417f77 46 API calls __getptd_noexit 86227->86248 86230 4135f7 RtlAllocateHeap 86230->86235 86239 413630 86230->86239 86232 413624 86246 417f77 46 API calls __getptd_noexit 86232->86246 86235->86230 86235->86232 86236 413622 86235->86236 86237 4135d4 86235->86237 86247 417f77 46 API calls __getptd_noexit 86236->86247 86237->86235 86243 418901 46 API calls __NMSG_WRITE 86237->86243 86244 418752 46 API calls 7 library calls 86237->86244 86245 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86237->86245 86239->86217 86240->86219 86241->86222 86242->86225 86243->86237 86244->86237 86246->86236 86247->86239 86248->86239 86249->86206 86250 425ba2 86255 40e360 86250->86255 86252 425bb4 86271 41130a 51 API calls __cinit 86252->86271 86254 425bbe 86256 4115d7 52 API calls 86255->86256 86257 40e3ec GetModuleFileNameW 86256->86257 86272 413a0e 86257->86272 86259 40e421 _wcsncat 86275 413a9e 86259->86275 86262 4115d7 52 API calls 86263 40e45e _wcscpy 86262->86263 86278 40bc70 86263->86278 86267 40e4a1 _wcscat _wcslen _wcsncpy 86268 40e4a9 86267->86268 86269 401c90 52 API calls 86267->86269 86270 4115d7 52 API calls 86267->86270 86268->86252 86269->86267 86270->86267 86271->86254 86297 413801 86272->86297 86327 419efd 86275->86327 86279 4115d7 52 API calls 86278->86279 86280 40bc98 86279->86280 86281 4115d7 52 API calls 86280->86281 86282 40bca6 86281->86282 86283 40e4c0 86282->86283 86339 403350 86283->86339 86285 40e4cb RegOpenKeyExW 86286 427190 RegQueryValueExW 86285->86286 86287 40e4eb 86285->86287 86288 4271b0 86286->86288 86289 42721a RegCloseKey 86286->86289 86287->86267 86290 4115d7 52 API calls 86288->86290 86289->86267 86291 4271cb 86290->86291 86346 43652f 52 API calls 86291->86346 86293 4271d8 RegQueryValueExW 86294 42720e 86293->86294 86295 4271f7 86293->86295 86294->86289 86347 402160 86295->86347 86299 41389e 86297->86299 86304 41381a 86297->86304 86298 4139e8 86324 417f77 46 API calls __getptd_noexit 86298->86324 86299->86298 86301 413a00 86299->86301 86326 417f77 46 API calls __getptd_noexit 86301->86326 86302 4139ed 86325 417f25 10 API calls __write 86302->86325 86304->86299 86311 41388a 86304->86311 86319 419e30 46 API calls __write 86304->86319 86307 41396c 86307->86299 86309 413967 86307->86309 86312 41397a 86307->86312 86308 413929 86308->86299 86310 413945 86308->86310 86321 419e30 46 API calls __write 86308->86321 86309->86259 86310->86299 86310->86309 86315 41395b 86310->86315 86311->86299 86318 413909 86311->86318 86320 419e30 46 API calls __write 86311->86320 86323 419e30 46 API calls __write 86312->86323 86322 419e30 46 API calls __write 86315->86322 86318->86307 86318->86308 86319->86311 86320->86318 86321->86310 86322->86309 86323->86309 86324->86302 86325->86309 86326->86309 86328 419f13 86327->86328 86329 419f0e 86327->86329 86336 417f77 46 API calls __getptd_noexit 86328->86336 86329->86328 86333 419f2b 86329->86333 86332 40e454 86332->86262 86333->86332 86338 417f77 46 API calls __getptd_noexit 86333->86338 86335 419f18 86337 417f25 10 API calls __write 86335->86337 86336->86335 86337->86332 86338->86335 86340 403367 86339->86340 86341 403358 86339->86341 86342 4115d7 52 API calls 86340->86342 86341->86285 86343 403370 86342->86343 86344 4115d7 52 API calls 86343->86344 86345 40339e 86344->86345 86345->86285 86346->86293 86348 426daa 86347->86348 86349 40216b _wcslen 86347->86349 86362 40c600 86348->86362 86352 402180 86349->86352 86353 40219e 86349->86353 86351 426db5 86351->86294 86360 403bd0 52 API calls moneypunct 86352->86360 86361 4013a0 52 API calls 86353->86361 86356 4021a5 86357 426db7 86356->86357 86359 4115d7 52 API calls 86356->86359 86358 402187 _memmove 86358->86294 86359->86358 86360->86358 86361->86356 86363 40c619 86362->86363 86364 40c60a 86362->86364 86363->86351 86364->86363 86367 4026f0 86364->86367 86366 426d7a _memmove 86366->86351 86368 426873 86367->86368 86369 4026ff 86367->86369 86374 4013a0 52 API calls 86368->86374 86369->86366 86371 42687b 86372 4115d7 52 API calls 86371->86372 86373 42689e _memmove 86372->86373 86373->86366 86374->86371 86375 3f22c00 86389 3f20850 86375->86389 86377 3f22d04 86392 3f22af0 86377->86392 86379 3f22d2d CreateFileW 86381 3f22d84 86379->86381 86382 3f22d7f 86379->86382 86381->86382 86383 3f22d9b VirtualAlloc 86381->86383 86383->86382 86384 3f22db9 ReadFile 86383->86384 86384->86382 86385 3f22dd7 86384->86385 86386 3f21af0 13 API calls 86385->86386 86387 3f22e0a 86386->86387 86388 3f22e2d ExitProcess 86387->86388 86388->86382 86395 3f23d30 GetPEB 86389->86395 86391 3f20edb 86391->86377 86393 3f22af9 Sleep 86392->86393 86394 3f22b07 86393->86394 86396 3f23d5a 86395->86396 86396->86391 86397 416454 86434 416c70 86397->86434 86399 416460 GetStartupInfoW 86400 416474 86399->86400 86435 419d5a HeapCreate 86400->86435 86402 4164cd 86403 4164d8 86402->86403 86519 41642b 46 API calls 3 library calls 86402->86519 86436 417c20 GetModuleHandleW 86403->86436 86406 4164de 86407 4164e9 __RTC_Initialize 86406->86407 86520 41642b 46 API calls 3 library calls 86406->86520 86455 41aaa1 GetStartupInfoW 86407->86455 86411 416503 GetCommandLineW 86468 41f584 GetEnvironmentStringsW 86411->86468 86415 416513 86474 41f4d6 GetModuleFileNameW 86415->86474 86417 41651d 86420 416528 86417->86420 86522 411924 46 API calls 3 library calls 86417->86522 86478 41f2a4 86420->86478 86421 41652e 86422 416539 86421->86422 86523 411924 46 API calls 3 library calls 86421->86523 86492 411703 86422->86492 86425 416541 86427 41654c __wwincmdln 86425->86427 86524 411924 46 API calls 3 library calls 86425->86524 86496 40d6b0 86427->86496 86430 41657c 86526 411906 46 API calls _doexit 86430->86526 86433 416581 __write 86434->86399 86435->86402 86437 417c34 86436->86437 86438 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86436->86438 86527 4178ff 49 API calls _free 86437->86527 86440 417c87 TlsAlloc 86438->86440 86443 417cd5 TlsSetValue 86440->86443 86444 417d96 86440->86444 86441 417c39 86441->86406 86443->86444 86445 417ce6 __init_pointers 86443->86445 86444->86406 86528 418151 InitializeCriticalSectionAndSpinCount 86445->86528 86447 417d91 86536 4178ff 49 API calls _free 86447->86536 86449 417d2a 86449->86447 86529 416b49 86449->86529 86452 417d76 86535 41793c 46 API calls 4 library calls 86452->86535 86454 417d7e GetCurrentThreadId 86454->86444 86456 416b49 __calloc_crt 46 API calls 86455->86456 86463 41aabf 86456->86463 86457 41ac6a GetStdHandle 86464 41ac34 86457->86464 86458 41acce SetHandleCount 86460 4164f7 86458->86460 86459 416b49 __calloc_crt 46 API calls 86459->86463 86460->86411 86521 411924 46 API calls 3 library calls 86460->86521 86461 41ac7c GetFileType 86461->86464 86462 41abb4 86462->86464 86465 41abe0 GetFileType 86462->86465 86466 41abeb InitializeCriticalSectionAndSpinCount 86462->86466 86463->86459 86463->86460 86463->86462 86463->86464 86464->86457 86464->86458 86464->86461 86467 41aca2 InitializeCriticalSectionAndSpinCount 86464->86467 86465->86462 86465->86466 86466->86460 86466->86462 86467->86460 86467->86464 86469 41f595 86468->86469 86470 41f599 86468->86470 86469->86415 86546 416b04 86470->86546 86472 41f5bb _memmove 86473 41f5c2 FreeEnvironmentStringsW 86472->86473 86473->86415 86475 41f50b _wparse_cmdline 86474->86475 86476 416b04 __malloc_crt 46 API calls 86475->86476 86477 41f54e _wparse_cmdline 86475->86477 86476->86477 86477->86417 86479 41f2bc _wcslen 86478->86479 86483 41f2b4 86478->86483 86480 416b49 __calloc_crt 46 API calls 86479->86480 86485 41f2e0 _wcslen 86480->86485 86481 41f336 86553 413748 86481->86553 86483->86421 86484 416b49 __calloc_crt 46 API calls 86484->86485 86485->86481 86485->86483 86485->86484 86486 41f35c 86485->86486 86489 41f373 86485->86489 86552 41ef12 46 API calls __write 86485->86552 86487 413748 _free 46 API calls 86486->86487 86487->86483 86559 417ed3 86489->86559 86491 41f37f 86491->86421 86493 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86492->86493 86495 411750 __IsNonwritableInCurrentImage 86493->86495 86578 41130a 51 API calls __cinit 86493->86578 86495->86425 86497 42e2f3 86496->86497 86498 40d6cc 86496->86498 86579 408f40 86498->86579 86500 40d707 86583 40ebb0 86500->86583 86503 40d737 86586 411951 86503->86586 86508 40d751 86598 40f4e0 SystemParametersInfoW SystemParametersInfoW 86508->86598 86510 40d75f 86599 40d590 GetCurrentDirectoryW 86510->86599 86512 40d767 SystemParametersInfoW 86513 40d794 86512->86513 86514 40d78d FreeLibrary 86512->86514 86515 408f40 VariantClear 86513->86515 86514->86513 86516 40d79d 86515->86516 86517 408f40 VariantClear 86516->86517 86518 40d7a6 86517->86518 86518->86430 86525 4118da 46 API calls _doexit 86518->86525 86519->86403 86520->86407 86525->86430 86526->86433 86527->86441 86528->86449 86531 416b52 86529->86531 86532 416b8f 86531->86532 86533 416b70 Sleep 86531->86533 86537 41f677 86531->86537 86532->86447 86532->86452 86534 416b85 86533->86534 86534->86531 86534->86532 86535->86454 86536->86444 86538 41f683 86537->86538 86544 41f69e _malloc 86537->86544 86539 41f68f 86538->86539 86538->86544 86545 417f77 46 API calls __getptd_noexit 86539->86545 86541 41f6b1 HeapAlloc 86543 41f6d8 86541->86543 86541->86544 86542 41f694 86542->86531 86543->86531 86544->86541 86544->86543 86545->86542 86549 416b0d 86546->86549 86547 4135bb _malloc 45 API calls 86547->86549 86548 416b43 86548->86472 86549->86547 86549->86548 86550 416b24 Sleep 86549->86550 86551 416b39 86550->86551 86551->86548 86551->86549 86552->86485 86554 413753 RtlFreeHeap 86553->86554 86558 41377c _free 86553->86558 86555 413768 86554->86555 86554->86558 86562 417f77 46 API calls __getptd_noexit 86555->86562 86557 41376e GetLastError 86557->86558 86558->86483 86563 417daa 86559->86563 86562->86557 86564 417dc9 __localtime64_s __call_reportfault 86563->86564 86565 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86564->86565 86566 417eb5 __call_reportfault 86565->86566 86569 41a208 86566->86569 86568 417ed1 GetCurrentProcess TerminateProcess 86568->86491 86570 41a210 86569->86570 86571 41a212 IsDebuggerPresent 86569->86571 86570->86568 86577 41fe19 86571->86577 86574 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86575 421ff0 __call_reportfault 86574->86575 86576 421ff8 GetCurrentProcess TerminateProcess 86574->86576 86575->86576 86576->86568 86577->86574 86578->86495 86580 408f48 moneypunct 86579->86580 86581 4265c7 VariantClear 86580->86581 86582 408f55 moneypunct 86580->86582 86581->86582 86582->86500 86639 40ebd0 86583->86639 86643 4182cb 86586->86643 86588 41195e 86650 4181f2 LeaveCriticalSection 86588->86650 86590 40d748 86591 4119b0 86590->86591 86592 4119d6 86591->86592 86593 4119bc 86591->86593 86592->86508 86593->86592 86685 417f77 46 API calls __getptd_noexit 86593->86685 86595 4119c6 86686 417f25 10 API calls __write 86595->86686 86597 4119d1 86597->86508 86598->86510 86687 401f20 86599->86687 86601 40d5b6 IsDebuggerPresent 86602 40d5c4 86601->86602 86603 42e1bb MessageBoxA 86601->86603 86604 42e1d4 86602->86604 86605 40d5e3 86602->86605 86603->86604 86860 403a50 52 API calls 3 library calls 86604->86860 86757 40f520 86605->86757 86609 40d5fd GetFullPathNameW 86769 401460 86609->86769 86611 40d63b 86612 40d643 86611->86612 86613 42e231 SetCurrentDirectoryW 86611->86613 86614 40d64c 86612->86614 86861 432fee 6 API calls 86612->86861 86613->86612 86784 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86614->86784 86617 42e252 86617->86614 86619 42e25a GetModuleFileNameW 86617->86619 86621 42e274 86619->86621 86622 42e2cb GetForegroundWindow ShellExecuteW 86619->86622 86862 401b10 86621->86862 86624 40d688 86622->86624 86623 40d656 86626 40d669 86623->86626 86858 40e0c0 74 API calls __localtime64_s 86623->86858 86630 40d692 SetCurrentDirectoryW 86624->86630 86792 4091e0 86626->86792 86630->86512 86633 42e28d 86869 40d200 52 API calls 2 library calls 86633->86869 86636 42e299 GetForegroundWindow ShellExecuteW 86637 42e2c6 86636->86637 86637->86624 86638 40ec00 LoadLibraryA GetProcAddress 86638->86503 86640 40d72e 86639->86640 86641 40ebd6 LoadLibraryA 86639->86641 86640->86503 86640->86638 86641->86640 86642 40ebe7 GetProcAddress 86641->86642 86642->86640 86644 4182e0 86643->86644 86645 4182f3 EnterCriticalSection 86643->86645 86651 418209 86644->86651 86645->86588 86647 4182e6 86647->86645 86678 411924 46 API calls 3 library calls 86647->86678 86650->86590 86652 418215 __write 86651->86652 86653 418225 86652->86653 86654 41823d 86652->86654 86679 418901 46 API calls __NMSG_WRITE 86653->86679 86657 416b04 __malloc_crt 45 API calls 86654->86657 86660 41824b __write 86654->86660 86656 41822a 86680 418752 46 API calls 7 library calls 86656->86680 86659 418256 86657->86659 86662 41825d 86659->86662 86663 41826c 86659->86663 86660->86647 86661 418231 86681 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86661->86681 86682 417f77 46 API calls __getptd_noexit 86662->86682 86664 4182cb __lock 45 API calls 86663->86664 86667 418273 86664->86667 86669 4182a6 86667->86669 86670 41827b InitializeCriticalSectionAndSpinCount 86667->86670 86673 413748 _free 45 API calls 86669->86673 86671 418297 86670->86671 86672 41828b 86670->86672 86684 4182c2 LeaveCriticalSection _doexit 86671->86684 86674 413748 _free 45 API calls 86672->86674 86673->86671 86675 418291 86674->86675 86683 417f77 46 API calls __getptd_noexit 86675->86683 86679->86656 86680->86661 86682->86660 86683->86671 86684->86660 86685->86595 86686->86597 86870 40e6e0 86687->86870 86691 401f41 GetModuleFileNameW 86888 410100 86691->86888 86693 401f5c 86900 410960 86693->86900 86696 401b10 52 API calls 86697 401f81 86696->86697 86903 401980 86697->86903 86699 401f8e 86700 408f40 VariantClear 86699->86700 86701 401f9d 86700->86701 86702 401b10 52 API calls 86701->86702 86703 401fb4 86702->86703 86704 401980 53 API calls 86703->86704 86705 401fc3 86704->86705 86706 401b10 52 API calls 86705->86706 86707 401fd2 86706->86707 86911 40c2c0 86707->86911 86709 401fe1 86710 40bc70 52 API calls 86709->86710 86711 401ff3 86710->86711 86929 401a10 86711->86929 86713 401ffe 86936 4114ab 86713->86936 86716 428b05 86718 401a10 52 API calls 86716->86718 86717 402017 86719 4114ab __wcsicoll 58 API calls 86717->86719 86720 428b18 86718->86720 86721 402022 86719->86721 86723 401a10 52 API calls 86720->86723 86721->86720 86722 40202d 86721->86722 86724 4114ab __wcsicoll 58 API calls 86722->86724 86725 428b33 86723->86725 86726 402038 86724->86726 86728 428b3b GetModuleFileNameW 86725->86728 86727 402043 86726->86727 86726->86728 86729 4114ab __wcsicoll 58 API calls 86727->86729 86730 401a10 52 API calls 86728->86730 86731 40204e 86729->86731 86732 428b6c 86730->86732 86733 402092 86731->86733 86737 428b90 _wcscpy 86731->86737 86738 401a10 52 API calls 86731->86738 86734 40e0a0 52 API calls 86732->86734 86736 4020a3 86733->86736 86733->86737 86735 428b7a 86734->86735 86739 401a10 52 API calls 86735->86739 86740 428bc6 86736->86740 86944 40e830 53 API calls 86736->86944 86744 401a10 52 API calls 86737->86744 86741 402073 _wcscpy 86738->86741 86742 428b88 86739->86742 86747 401a10 52 API calls 86741->86747 86742->86737 86752 4020d0 86744->86752 86745 4020bb 86945 40cf00 53 API calls 86745->86945 86747->86733 86748 4020c6 86749 408f40 VariantClear 86748->86749 86749->86752 86751 402110 86754 408f40 VariantClear 86751->86754 86752->86751 86755 401a10 52 API calls 86752->86755 86946 40cf00 53 API calls 86752->86946 86947 40e6a0 53 API calls 86752->86947 86756 402120 moneypunct 86754->86756 86755->86752 86756->86601 86758 4295c9 __localtime64_s 86757->86758 86759 40f53c 86757->86759 86762 4295d9 GetOpenFileNameW 86758->86762 87626 410120 86759->87626 86761 40f545 87630 4102b0 SHGetMalloc 86761->87630 86762->86759 86764 40d5f5 86762->86764 86764->86609 86764->86611 86765 40f54c 87635 410190 GetFullPathNameW 86765->87635 86767 40f559 87646 40f570 86767->87646 87702 402400 86769->87702 86771 40146f 86774 428c29 _wcscat 86771->86774 87711 401500 86771->87711 86773 40147c 86773->86774 87719 40d440 86773->87719 86776 401489 86776->86774 86777 401491 GetFullPathNameW 86776->86777 86778 402160 52 API calls 86777->86778 86779 4014bb 86778->86779 86780 402160 52 API calls 86779->86780 86781 4014c8 86780->86781 86781->86774 86782 402160 52 API calls 86781->86782 86783 4014ee 86782->86783 86783->86611 86785 428361 86784->86785 86786 4103fc LoadImageW RegisterClassExW 86784->86786 87739 44395e EnumResourceNamesW LoadImageW 86785->87739 87738 410490 7 API calls 86786->87738 86789 40d651 86791 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86789->86791 86790 428368 86791->86623 86793 409202 86792->86793 86794 42d7ad 86792->86794 86853 409216 moneypunct 86793->86853 87876 410940 331 API calls 86793->87876 87879 45e737 90 API calls 3 library calls 86794->87879 86797 409386 86798 40939c 86797->86798 87877 40f190 10 API calls 86797->87877 86798->86624 86859 401000 Shell_NotifyIconW __localtime64_s 86798->86859 86800 4095b2 86800->86798 86802 4095bf 86800->86802 86801 409253 PeekMessageW 86801->86853 87878 401a50 331 API calls 86802->87878 86804 40d410 VariantClear 86804->86853 86805 42d8cd Sleep 86805->86853 86806 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86806->86798 86809 4095f9 86806->86809 86808 42e13b 87897 40d410 VariantClear 86808->87897 86812 42e158 TranslateMessage DispatchMessageW GetMessageW 86809->86812 86812->86812 86814 42e188 86812->86814 86813 409567 PeekMessageW 86813->86853 86814->86798 86817 40e0a0 52 API calls 86817->86853 86818 46fdbf 108 API calls 86857 4094e0 86818->86857 86819 46f3c1 107 API calls 86819->86853 86820 409551 TranslateMessage DispatchMessageW 86820->86813 86822 42dcd2 WaitForSingleObject 86823 42dcf0 GetExitCodeProcess CloseHandle 86822->86823 86822->86853 87886 40d410 VariantClear 86823->87886 86825 44c29d 52 API calls 86825->86857 86826 42dd3d Sleep 86826->86857 86828 4094cf Sleep 86828->86857 86831 42d94d timeGetTime 87882 465124 53 API calls 86831->87882 86833 40c620 timeGetTime 86833->86857 86836 42dd89 CloseHandle 86836->86857 86837 47d33e 309 API calls 86837->86853 86838 408f40 VariantClear 86838->86857 86840 465124 53 API calls 86840->86857 86841 42de19 GetExitCodeProcess CloseHandle 86841->86857 86843 401b10 52 API calls 86843->86857 86845 42de88 Sleep 86845->86853 86848 401980 53 API calls 86848->86857 86849 45e737 90 API calls 86849->86853 86852 42e0cc VariantClear 86852->86853 86853->86797 86853->86801 86853->86804 86853->86805 86853->86808 86853->86813 86853->86817 86853->86819 86853->86820 86853->86822 86853->86826 86853->86828 86853->86831 86853->86837 86853->86849 86853->86852 86854 408f40 VariantClear 86853->86854 86853->86857 87740 4091b0 86853->87740 87798 40afa0 86853->87798 87824 408fc0 86853->87824 87859 408cc0 86853->87859 87873 4096a0 331 API calls 4 library calls 86853->87873 87874 40d150 TranslateAcceleratorW 86853->87874 87875 40d170 IsDialogMessageW GetClassLongW 86853->87875 87880 465124 53 API calls 86853->87880 87881 40c620 timeGetTime 86853->87881 87896 40e270 VariantClear moneypunct 86853->87896 86854->86853 86857->86818 86857->86825 86857->86833 86857->86836 86857->86838 86857->86840 86857->86841 86857->86843 86857->86845 86857->86848 86857->86853 87883 45178a 54 API calls 86857->87883 87884 47d33e 331 API calls 86857->87884 87885 453bc6 54 API calls 86857->87885 87887 40d410 VariantClear 86857->87887 87888 443d19 67 API calls _wcslen 86857->87888 87889 4574b4 VariantClear 86857->87889 87890 403cd0 86857->87890 87894 4731e1 VariantClear 86857->87894 87895 4331a2 6 API calls 86857->87895 86858->86626 86859->86624 86860->86611 86861->86617 86863 401b16 _wcslen 86862->86863 86864 4115d7 52 API calls 86863->86864 86867 401b63 86863->86867 86865 401b4b _memmove 86864->86865 86866 4115d7 52 API calls 86865->86866 86866->86867 86868 40d200 52 API calls 2 library calls 86867->86868 86868->86633 86869->86636 86871 40bc70 52 API calls 86870->86871 86872 401f31 86871->86872 86873 402560 86872->86873 86874 40256d __write_nolock 86873->86874 86875 402160 52 API calls 86874->86875 86877 402593 86875->86877 86887 4025bd 86877->86887 86948 401c90 86877->86948 86878 4026f0 52 API calls 86878->86887 86879 4026a7 86880 401b10 52 API calls 86879->86880 86886 4026db 86879->86886 86882 4026d1 86880->86882 86881 401b10 52 API calls 86881->86887 86952 40d7c0 52 API calls 2 library calls 86882->86952 86884 401c90 52 API calls 86884->86887 86886->86691 86887->86878 86887->86879 86887->86881 86887->86884 86951 40d7c0 52 API calls 2 library calls 86887->86951 86953 40f760 86888->86953 86891 410118 86891->86693 86893 42805d 86894 42806a 86893->86894 87009 431e58 86893->87009 86896 413748 _free 46 API calls 86894->86896 86897 428078 86896->86897 86898 431e58 82 API calls 86897->86898 86899 428084 86898->86899 86899->86693 86901 4115d7 52 API calls 86900->86901 86902 401f74 86901->86902 86902->86696 86904 4019a3 86903->86904 86908 401985 86903->86908 86905 4019b8 86904->86905 86904->86908 87615 403e10 53 API calls 86905->87615 86906 40199f 86906->86699 86908->86906 87614 403e10 53 API calls 86908->87614 86910 4019c4 86910->86699 86912 40c2c7 86911->86912 86913 40c30e 86911->86913 86916 40c2d3 86912->86916 86917 426c79 86912->86917 86914 40c315 86913->86914 86915 426c2b 86913->86915 86918 40c321 86914->86918 86919 426c5a 86914->86919 86921 426c4b 86915->86921 86922 426c2e 86915->86922 87616 403ea0 52 API calls __cinit 86916->87616 87621 4534e3 52 API calls 86917->87621 87617 403ea0 52 API calls __cinit 86918->87617 87620 4534e3 52 API calls 86919->87620 87619 4534e3 52 API calls 86921->87619 86928 40c2de 86922->86928 87618 4534e3 52 API calls 86922->87618 86928->86709 86928->86928 86930 401a30 86929->86930 86931 401a17 86929->86931 86933 402160 52 API calls 86930->86933 86932 401a2d 86931->86932 87622 403c30 52 API calls _memmove 86931->87622 86932->86713 86935 401a3d 86933->86935 86935->86713 86937 411523 86936->86937 86938 4114ba 86936->86938 87625 4113a8 58 API calls 3 library calls 86937->87625 86943 40200c 86938->86943 87623 417f77 46 API calls __getptd_noexit 86938->87623 86941 4114c6 87624 417f25 10 API calls __write 86941->87624 86943->86716 86943->86717 86944->86745 86945->86748 86946->86752 86947->86752 86949 4026f0 52 API calls 86948->86949 86950 401c97 86949->86950 86950->86877 86951->86887 86952->86886 87013 40f6f0 86953->87013 86955 40f77b _strcat moneypunct 87021 40f850 86955->87021 86960 427c2a 87050 414d04 86960->87050 86962 40f7fc 86962->86960 86963 40f804 86962->86963 87037 414a46 86963->87037 86967 40f80e 86967->86891 86972 4528bd 86967->86972 86969 427c59 87056 414fe2 86969->87056 86971 427c79 86973 4150d1 _fseek 81 API calls 86972->86973 86974 452930 86973->86974 87556 452719 86974->87556 86977 452948 86977->86893 86978 414d04 __fread_nolock 61 API calls 86979 452966 86978->86979 86980 414d04 __fread_nolock 61 API calls 86979->86980 86981 452976 86980->86981 86982 414d04 __fread_nolock 61 API calls 86981->86982 86983 45298f 86982->86983 86984 414d04 __fread_nolock 61 API calls 86983->86984 86985 4529aa 86984->86985 86986 4150d1 _fseek 81 API calls 86985->86986 86987 4529c4 86986->86987 86988 4135bb _malloc 46 API calls 86987->86988 86989 4529cf 86988->86989 86990 4135bb _malloc 46 API calls 86989->86990 86991 4529db 86990->86991 86992 414d04 __fread_nolock 61 API calls 86991->86992 86993 4529ec 86992->86993 86994 44afef GetSystemTimeAsFileTime 86993->86994 86995 452a00 86994->86995 86996 452a36 86995->86996 86997 452a13 86995->86997 86998 452aa5 86996->86998 86999 452a3c 86996->86999 87000 413748 _free 46 API calls 86997->87000 87002 413748 _free 46 API calls 86998->87002 87562 44b1a9 86999->87562 87003 452a1c 87000->87003 87006 452aa3 87002->87006 87004 413748 _free 46 API calls 87003->87004 87007 452a25 87004->87007 87005 452a9d 87008 413748 _free 46 API calls 87005->87008 87006->86893 87007->86893 87008->87006 87010 431e64 87009->87010 87012 431e6a 87009->87012 87011 414a46 __fcloseall 82 API calls 87010->87011 87011->87012 87012->86894 87014 425de2 87013->87014 87015 40f6fc _wcslen 87013->87015 87014->86955 87016 40f710 WideCharToMultiByte 87015->87016 87017 40f756 87016->87017 87018 40f728 87016->87018 87017->86955 87019 4115d7 52 API calls 87018->87019 87020 40f735 WideCharToMultiByte 87019->87020 87020->86955 87023 40f85d __localtime64_s _strlen 87021->87023 87024 40f7ab 87023->87024 87069 414db8 87023->87069 87025 4149c2 87024->87025 87084 414904 87025->87084 87027 40f7e9 87027->86960 87028 40f5c0 87027->87028 87031 40f5cd _strcat __write_nolock _memmove 87028->87031 87029 414d04 __fread_nolock 61 API calls 87029->87031 87030 40f691 __tzset_nolock 87030->86962 87031->87029 87031->87030 87034 425d11 87031->87034 87172 4150d1 87031->87172 87033 4150d1 _fseek 81 API calls 87035 425d33 87033->87035 87034->87033 87036 414d04 __fread_nolock 61 API calls 87035->87036 87036->87030 87038 414a52 __write 87037->87038 87039 414a64 87038->87039 87040 414a79 87038->87040 87312 417f77 46 API calls __getptd_noexit 87039->87312 87043 415471 __lock_file 47 API calls 87040->87043 87047 414a74 __write 87040->87047 87042 414a69 87313 417f25 10 API calls __write 87042->87313 87045 414a92 87043->87045 87296 4149d9 87045->87296 87047->86967 87381 414c76 87050->87381 87052 414d1c 87053 44afef 87052->87053 87549 442c5a 87053->87549 87055 44b00d 87055->86969 87057 414fee __write 87056->87057 87058 414ffa 87057->87058 87059 41500f 87057->87059 87553 417f77 46 API calls __getptd_noexit 87058->87553 87061 415471 __lock_file 47 API calls 87059->87061 87063 415017 87061->87063 87062 414fff 87554 417f25 10 API calls __write 87062->87554 87065 414e4e __ftell_nolock 51 API calls 87063->87065 87066 415024 87065->87066 87555 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 87066->87555 87067 41500a __write 87067->86971 87070 414dd6 87069->87070 87071 414deb 87069->87071 87080 417f77 46 API calls __getptd_noexit 87070->87080 87071->87070 87073 414df2 87071->87073 87082 41b91b 79 API calls 12 library calls 87073->87082 87074 414ddb 87081 417f25 10 API calls __write 87074->87081 87077 414e18 87078 414de6 87077->87078 87083 418f98 77 API calls 5 library calls 87077->87083 87078->87023 87080->87074 87081->87078 87082->87077 87083->87078 87086 414910 __write 87084->87086 87085 414923 87140 417f77 46 API calls __getptd_noexit 87085->87140 87086->87085 87089 414951 87086->87089 87088 414928 87141 417f25 10 API calls __write 87088->87141 87103 41d4d1 87089->87103 87092 414956 87093 41496a 87092->87093 87094 41495d 87092->87094 87096 414992 87093->87096 87097 414972 87093->87097 87142 417f77 46 API calls __getptd_noexit 87094->87142 87120 41d218 87096->87120 87143 417f77 46 API calls __getptd_noexit 87097->87143 87099 414933 __write @_EH4_CallFilterFunc@8 87099->87027 87104 41d4dd __write 87103->87104 87105 4182cb __lock 46 API calls 87104->87105 87117 41d4eb 87105->87117 87106 41d560 87145 41d5fb 87106->87145 87107 41d567 87109 416b04 __malloc_crt 46 API calls 87107->87109 87111 41d56e 87109->87111 87110 41d5f0 __write 87110->87092 87111->87106 87112 41d57c InitializeCriticalSectionAndSpinCount 87111->87112 87114 41d59c 87112->87114 87115 41d5af EnterCriticalSection 87112->87115 87118 413748 _free 46 API calls 87114->87118 87115->87106 87116 418209 __mtinitlocknum 46 API calls 87116->87117 87117->87106 87117->87107 87117->87116 87148 4154b2 47 API calls __lock 87117->87148 87149 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87117->87149 87118->87106 87121 41d23a 87120->87121 87122 41d255 87121->87122 87134 41d26c __wopenfile 87121->87134 87154 417f77 46 API calls __getptd_noexit 87122->87154 87123 41d421 87126 41d47a 87123->87126 87127 41d48c 87123->87127 87125 41d25a 87155 417f25 10 API calls __write 87125->87155 87159 417f77 46 API calls __getptd_noexit 87126->87159 87151 422bf9 87127->87151 87131 41d47f 87160 417f25 10 API calls __write 87131->87160 87132 41499d 87144 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 87132->87144 87134->87123 87134->87126 87156 41341f 58 API calls 2 library calls 87134->87156 87136 41d41a 87136->87123 87157 41341f 58 API calls 2 library calls 87136->87157 87138 41d439 87138->87123 87158 41341f 58 API calls 2 library calls 87138->87158 87140->87088 87141->87099 87142->87099 87143->87099 87144->87099 87150 4181f2 LeaveCriticalSection 87145->87150 87147 41d602 87147->87110 87148->87117 87149->87117 87150->87147 87161 422b35 87151->87161 87153 422c14 87153->87132 87154->87125 87155->87132 87156->87136 87157->87138 87158->87123 87159->87131 87160->87132 87162 422b41 __write 87161->87162 87163 422b54 87162->87163 87165 422b8a 87162->87165 87164 417f77 __write 46 API calls 87163->87164 87166 422b59 87164->87166 87167 422400 __tsopen_nolock 109 API calls 87165->87167 87168 417f25 __write 10 API calls 87166->87168 87169 422ba4 87167->87169 87171 422b63 __write 87168->87171 87170 422bcb __wsopen_helper LeaveCriticalSection 87169->87170 87170->87171 87171->87153 87175 4150dd __write 87172->87175 87173 4150e9 87203 417f77 46 API calls __getptd_noexit 87173->87203 87175->87173 87176 41510f 87175->87176 87185 415471 87176->87185 87178 4150ee 87204 417f25 10 API calls __write 87178->87204 87182 4150f9 __write 87182->87031 87186 415483 87185->87186 87187 4154a5 EnterCriticalSection 87185->87187 87186->87187 87188 41548b 87186->87188 87189 415117 87187->87189 87190 4182cb __lock 46 API calls 87188->87190 87191 415047 87189->87191 87190->87189 87192 415067 87191->87192 87193 415057 87191->87193 87198 415079 87192->87198 87206 414e4e 87192->87206 87261 417f77 46 API calls __getptd_noexit 87193->87261 87196 41505c 87205 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 87196->87205 87223 41443c 87198->87223 87201 4150b9 87236 41e1f4 87201->87236 87203->87178 87204->87182 87205->87182 87207 414e61 87206->87207 87208 414e79 87206->87208 87262 417f77 46 API calls __getptd_noexit 87207->87262 87210 414139 __fclose_nolock 46 API calls 87208->87210 87212 414e80 87210->87212 87211 414e66 87263 417f25 10 API calls __write 87211->87263 87214 41e1f4 __write 51 API calls 87212->87214 87215 414e97 87214->87215 87216 414f09 87215->87216 87218 414ec9 87215->87218 87222 414e71 87215->87222 87264 417f77 46 API calls __getptd_noexit 87216->87264 87219 41e1f4 __write 51 API calls 87218->87219 87218->87222 87220 414f64 87219->87220 87221 41e1f4 __write 51 API calls 87220->87221 87220->87222 87221->87222 87222->87198 87224 414455 87223->87224 87228 414477 87223->87228 87225 414139 __fclose_nolock 46 API calls 87224->87225 87224->87228 87226 414470 87225->87226 87265 41b7b2 77 API calls 3 library calls 87226->87265 87229 414139 87228->87229 87230 414145 87229->87230 87231 41415a 87229->87231 87266 417f77 46 API calls __getptd_noexit 87230->87266 87231->87201 87233 41414a 87267 417f25 10 API calls __write 87233->87267 87235 414155 87235->87201 87237 41e200 __write 87236->87237 87238 41e223 87237->87238 87239 41e208 87237->87239 87241 41e22f 87238->87241 87244 41e269 87238->87244 87288 417f8a 46 API calls __getptd_noexit 87239->87288 87290 417f8a 46 API calls __getptd_noexit 87241->87290 87242 41e20d 87289 417f77 46 API calls __getptd_noexit 87242->87289 87268 41ae56 87244->87268 87246 41e234 87291 417f77 46 API calls __getptd_noexit 87246->87291 87249 41e26f 87252 41e291 87249->87252 87253 41e27d 87249->87253 87250 41e23c 87292 417f25 10 API calls __write 87250->87292 87293 417f77 46 API calls __getptd_noexit 87252->87293 87278 41e17f 87253->87278 87254 41e215 __write 87254->87196 87257 41e289 87295 41e2c0 LeaveCriticalSection __unlock_fhandle 87257->87295 87258 41e296 87294 417f8a 46 API calls __getptd_noexit 87258->87294 87261->87196 87262->87211 87263->87222 87264->87222 87265->87228 87266->87233 87267->87235 87269 41ae62 __write 87268->87269 87270 41aebc 87269->87270 87272 4182cb __lock 46 API calls 87269->87272 87271 41aec1 EnterCriticalSection 87270->87271 87273 41aede __write 87270->87273 87271->87273 87274 41ae8e 87272->87274 87273->87249 87275 41aeaa 87274->87275 87276 41ae97 InitializeCriticalSectionAndSpinCount 87274->87276 87277 41aeec ___lock_fhandle LeaveCriticalSection 87275->87277 87276->87275 87277->87270 87279 41aded __chsize_nolock 46 API calls 87278->87279 87280 41e18e 87279->87280 87281 41e1a4 SetFilePointer 87280->87281 87282 41e194 87280->87282 87284 41e1c3 87281->87284 87285 41e1bb GetLastError 87281->87285 87283 417f77 __write 46 API calls 87282->87283 87286 41e199 87283->87286 87284->87286 87287 417f9d __dosmaperr 46 API calls 87284->87287 87285->87284 87286->87257 87287->87286 87288->87242 87289->87254 87290->87246 87291->87250 87292->87254 87293->87258 87294->87257 87295->87254 87297 4149ea 87296->87297 87298 4149fe 87296->87298 87342 417f77 46 API calls __getptd_noexit 87297->87342 87300 41443c __flush 77 API calls 87298->87300 87304 4149fa 87298->87304 87303 414a0a 87300->87303 87301 4149ef 87343 417f25 10 API calls __write 87301->87343 87315 41d8c2 87303->87315 87314 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 87304->87314 87307 414139 __fclose_nolock 46 API calls 87308 414a18 87307->87308 87319 41d7fe 87308->87319 87310 414a1e 87310->87304 87311 413748 _free 46 API calls 87310->87311 87311->87304 87312->87042 87313->87047 87314->87047 87316 41d8d2 87315->87316 87318 414a12 87315->87318 87317 413748 _free 46 API calls 87316->87317 87316->87318 87317->87318 87318->87307 87320 41d80a __write 87319->87320 87321 41d812 87320->87321 87322 41d82d 87320->87322 87359 417f8a 46 API calls __getptd_noexit 87321->87359 87323 41d839 87322->87323 87329 41d873 87322->87329 87361 417f8a 46 API calls __getptd_noexit 87323->87361 87326 41d817 87360 417f77 46 API calls __getptd_noexit 87326->87360 87328 41d83e 87362 417f77 46 API calls __getptd_noexit 87328->87362 87331 41ae56 ___lock_fhandle 48 API calls 87329->87331 87333 41d879 87331->87333 87332 41d846 87363 417f25 10 API calls __write 87332->87363 87334 41d893 87333->87334 87335 41d887 87333->87335 87364 417f77 46 API calls __getptd_noexit 87334->87364 87344 41d762 87335->87344 87339 41d81f __write 87339->87310 87340 41d88d 87365 41d8ba LeaveCriticalSection __unlock_fhandle 87340->87365 87342->87301 87343->87304 87366 41aded 87344->87366 87346 41d7c8 87379 41ad67 47 API calls __write 87346->87379 87347 41d772 87347->87346 87349 41d7a6 87347->87349 87352 41aded __chsize_nolock 46 API calls 87347->87352 87349->87346 87350 41aded __chsize_nolock 46 API calls 87349->87350 87353 41d7b2 CloseHandle 87350->87353 87351 41d7d0 87354 41d7f2 87351->87354 87380 417f9d 46 API calls 2 library calls 87351->87380 87355 41d79d 87352->87355 87353->87346 87356 41d7be GetLastError 87353->87356 87354->87340 87358 41aded __chsize_nolock 46 API calls 87355->87358 87356->87346 87358->87349 87359->87326 87360->87339 87361->87328 87362->87332 87363->87339 87364->87340 87365->87339 87367 41ae12 87366->87367 87368 41adfa 87366->87368 87370 417f8a __write 46 API calls 87367->87370 87373 41ae51 87367->87373 87369 417f8a __write 46 API calls 87368->87369 87371 41adff 87369->87371 87372 41ae23 87370->87372 87374 417f77 __write 46 API calls 87371->87374 87375 417f77 __write 46 API calls 87372->87375 87373->87347 87376 41ae07 87374->87376 87377 41ae2b 87375->87377 87376->87347 87378 417f25 __write 10 API calls 87377->87378 87378->87376 87379->87351 87380->87354 87382 414c82 __write 87381->87382 87383 414cc3 87382->87383 87385 414c96 __localtime64_s 87382->87385 87393 414cbb __write 87382->87393 87384 415471 __lock_file 47 API calls 87383->87384 87386 414ccb 87384->87386 87408 417f77 46 API calls __getptd_noexit 87385->87408 87394 414aba 87386->87394 87389 414cb0 87409 417f25 10 API calls __write 87389->87409 87393->87052 87398 414ad8 __localtime64_s 87394->87398 87401 414af2 87394->87401 87395 414ae2 87461 417f77 46 API calls __getptd_noexit 87395->87461 87397 414ae7 87462 417f25 10 API calls __write 87397->87462 87398->87395 87398->87401 87405 414b2d 87398->87405 87410 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 87401->87410 87402 414c38 __localtime64_s 87464 417f77 46 API calls __getptd_noexit 87402->87464 87403 414139 __fclose_nolock 46 API calls 87403->87405 87405->87401 87405->87402 87405->87403 87411 41dfcc 87405->87411 87441 41d8f3 87405->87441 87463 41e0c2 46 API calls 3 library calls 87405->87463 87408->87389 87409->87393 87410->87393 87412 41dfd8 __write 87411->87412 87413 41dfe0 87412->87413 87414 41dffb 87412->87414 87534 417f8a 46 API calls __getptd_noexit 87413->87534 87416 41e007 87414->87416 87419 41e041 87414->87419 87536 417f8a 46 API calls __getptd_noexit 87416->87536 87417 41dfe5 87535 417f77 46 API calls __getptd_noexit 87417->87535 87422 41e063 87419->87422 87423 41e04e 87419->87423 87421 41e00c 87537 417f77 46 API calls __getptd_noexit 87421->87537 87426 41ae56 ___lock_fhandle 48 API calls 87422->87426 87539 417f8a 46 API calls __getptd_noexit 87423->87539 87429 41e069 87426->87429 87427 41e014 87538 417f25 10 API calls __write 87427->87538 87428 41e053 87540 417f77 46 API calls __getptd_noexit 87428->87540 87433 41e077 87429->87433 87434 41e08b 87429->87434 87432 41dfed __write 87432->87405 87465 41da15 87433->87465 87541 417f77 46 API calls __getptd_noexit 87434->87541 87437 41e090 87542 417f8a 46 API calls __getptd_noexit 87437->87542 87438 41e083 87543 41e0ba LeaveCriticalSection __unlock_fhandle 87438->87543 87442 41d900 87441->87442 87445 41d915 87441->87445 87547 417f77 46 API calls __getptd_noexit 87442->87547 87444 41d905 87548 417f25 10 API calls __write 87444->87548 87447 41d94a 87445->87447 87452 41d910 87445->87452 87544 420603 87445->87544 87449 414139 __fclose_nolock 46 API calls 87447->87449 87450 41d95e 87449->87450 87451 41dfcc __read 59 API calls 87450->87451 87453 41d965 87451->87453 87452->87405 87453->87452 87454 414139 __fclose_nolock 46 API calls 87453->87454 87455 41d988 87454->87455 87455->87452 87456 414139 __fclose_nolock 46 API calls 87455->87456 87457 41d994 87456->87457 87457->87452 87458 414139 __fclose_nolock 46 API calls 87457->87458 87459 41d9a1 87458->87459 87460 414139 __fclose_nolock 46 API calls 87459->87460 87460->87452 87461->87397 87462->87401 87463->87405 87464->87397 87466 41da31 87465->87466 87467 41da4c 87465->87467 87469 417f8a __write 46 API calls 87466->87469 87468 41da5b 87467->87468 87470 41da7a 87467->87470 87471 417f8a __write 46 API calls 87468->87471 87472 41da36 87469->87472 87474 41da98 87470->87474 87486 41daac 87470->87486 87473 41da60 87471->87473 87475 417f77 __write 46 API calls 87472->87475 87477 417f77 __write 46 API calls 87473->87477 87478 417f8a __write 46 API calls 87474->87478 87479 41da3e 87475->87479 87476 41db02 87481 417f8a __write 46 API calls 87476->87481 87480 41da67 87477->87480 87482 41da9d 87478->87482 87479->87438 87483 417f25 __write 10 API calls 87480->87483 87484 41db07 87481->87484 87485 417f77 __write 46 API calls 87482->87485 87483->87479 87487 417f77 __write 46 API calls 87484->87487 87488 41daa4 87485->87488 87486->87476 87486->87479 87489 41dae1 87486->87489 87491 41db1b 87486->87491 87487->87488 87492 417f25 __write 10 API calls 87488->87492 87489->87476 87490 41daec ReadFile 87489->87490 87496 41dc17 87490->87496 87497 41df8f GetLastError 87490->87497 87494 416b04 __malloc_crt 46 API calls 87491->87494 87492->87479 87495 41db31 87494->87495 87500 41db59 87495->87500 87501 41db3b 87495->87501 87496->87497 87504 41dc2b 87496->87504 87498 41de16 87497->87498 87499 41df9c 87497->87499 87508 417f9d __dosmaperr 46 API calls 87498->87508 87513 41dd9b 87498->87513 87502 417f77 __write 46 API calls 87499->87502 87505 420494 __lseeki64_nolock 48 API calls 87500->87505 87503 417f77 __write 46 API calls 87501->87503 87506 41dfa1 87502->87506 87507 41db40 87503->87507 87504->87513 87514 41dc47 87504->87514 87517 41de5b 87504->87517 87509 41db67 87505->87509 87510 417f8a __write 46 API calls 87506->87510 87511 417f8a __write 46 API calls 87507->87511 87508->87513 87509->87490 87510->87513 87511->87479 87512 413748 _free 46 API calls 87512->87479 87513->87479 87513->87512 87515 41dcab ReadFile 87514->87515 87522 41dd28 87514->87522 87520 41dcc9 GetLastError 87515->87520 87525 41dcd3 87515->87525 87516 41ded0 ReadFile 87518 41deef GetLastError 87516->87518 87526 41def9 87516->87526 87517->87513 87517->87516 87518->87517 87518->87526 87519 41ddec MultiByteToWideChar 87519->87513 87521 41de10 GetLastError 87519->87521 87520->87514 87520->87525 87521->87498 87522->87513 87523 41dda3 87522->87523 87524 41dd96 87522->87524 87530 41dd60 87522->87530 87523->87530 87531 41ddda 87523->87531 87527 417f77 __write 46 API calls 87524->87527 87525->87514 87528 420494 __lseeki64_nolock 48 API calls 87525->87528 87526->87517 87529 420494 __lseeki64_nolock 48 API calls 87526->87529 87527->87513 87528->87525 87529->87526 87530->87519 87532 420494 __lseeki64_nolock 48 API calls 87531->87532 87533 41dde9 87532->87533 87533->87519 87534->87417 87535->87432 87536->87421 87537->87427 87538->87432 87539->87428 87540->87427 87541->87437 87542->87438 87543->87432 87545 416b04 __malloc_crt 46 API calls 87544->87545 87546 420618 87545->87546 87546->87447 87547->87444 87548->87452 87552 4148b3 GetSystemTimeAsFileTime __aulldiv 87549->87552 87551 442c6b 87551->87055 87552->87551 87553->87062 87554->87067 87555->87067 87561 45272f __tzset_nolock _wcscpy 87556->87561 87557 414d04 61 API calls __fread_nolock 87557->87561 87558 44afef GetSystemTimeAsFileTime 87558->87561 87559 4528a4 87559->86977 87559->86978 87560 4150d1 81 API calls _fseek 87560->87561 87561->87557 87561->87558 87561->87559 87561->87560 87563 44b1bc 87562->87563 87564 44b1ca 87562->87564 87565 4149c2 116 API calls 87563->87565 87566 44b1e1 87564->87566 87567 4149c2 116 API calls 87564->87567 87568 44b1d8 87564->87568 87565->87564 87597 4321a4 87566->87597 87570 44b2db 87567->87570 87568->87005 87570->87566 87572 44b2e9 87570->87572 87571 44b224 87573 44b253 87571->87573 87574 44b228 87571->87574 87575 44b2f6 87572->87575 87577 414a46 __fcloseall 82 API calls 87572->87577 87601 43213d 87573->87601 87576 44b235 87574->87576 87579 414a46 __fcloseall 82 API calls 87574->87579 87575->87005 87580 44b245 87576->87580 87584 414a46 __fcloseall 82 API calls 87576->87584 87577->87575 87579->87576 87580->87005 87581 44b25a 87582 44b260 87581->87582 87583 44b289 87581->87583 87585 44b26d 87582->87585 87587 414a46 __fcloseall 82 API calls 87582->87587 87611 44b0bf 87 API calls 87583->87611 87584->87580 87589 414a46 __fcloseall 82 API calls 87585->87589 87591 44b27d 87585->87591 87587->87585 87588 44b28f 87612 4320f8 46 API calls _free 87588->87612 87589->87591 87591->87005 87592 44b295 87593 44b2a2 87592->87593 87595 414a46 __fcloseall 82 API calls 87592->87595 87594 44b2b2 87593->87594 87596 414a46 __fcloseall 82 API calls 87593->87596 87594->87005 87595->87593 87596->87594 87598 4321cb 87597->87598 87600 4321b4 __tzset_nolock _memmove 87597->87600 87599 414d04 __fread_nolock 61 API calls 87598->87599 87599->87600 87600->87571 87602 4135bb _malloc 46 API calls 87601->87602 87603 432150 87602->87603 87604 4135bb _malloc 46 API calls 87603->87604 87605 432162 87604->87605 87606 4135bb _malloc 46 API calls 87605->87606 87607 432174 87606->87607 87609 432189 87607->87609 87613 4320f8 46 API calls _free 87607->87613 87609->87581 87610 432198 87610->87581 87611->87588 87612->87592 87613->87610 87614->86906 87615->86910 87616->86928 87617->86928 87618->86928 87619->86919 87620->86928 87621->86928 87622->86932 87623->86941 87624->86943 87625->86943 87675 410160 87626->87675 87628 41012f GetFullPathNameW 87629 410147 moneypunct 87628->87629 87629->86761 87631 4102cb SHGetDesktopFolder 87630->87631 87632 410333 _wcsncpy 87630->87632 87631->87632 87633 4102e0 _wcsncpy 87631->87633 87632->86765 87633->87632 87634 41031c SHGetPathFromIDListW 87633->87634 87634->87632 87636 4101bb 87635->87636 87640 425f4a 87635->87640 87637 410160 52 API calls 87636->87637 87639 4101c7 87637->87639 87638 4114ab __wcsicoll 58 API calls 87638->87640 87679 410200 52 API calls 2 library calls 87639->87679 87640->87638 87642 425f6e 87640->87642 87642->86767 87643 4101d6 87680 410200 52 API calls 2 library calls 87643->87680 87645 4101e9 87645->86767 87647 40f760 128 API calls 87646->87647 87648 40f584 87647->87648 87649 429335 87648->87649 87650 40f58c 87648->87650 87651 4528bd 118 API calls 87649->87651 87652 40f598 87650->87652 87653 429358 87650->87653 87654 42934b 87651->87654 87698 4033c0 113 API calls 7 library calls 87652->87698 87699 434034 86 API calls _wprintf 87653->87699 87658 429373 87654->87658 87659 42934f 87654->87659 87657 40f5b4 87657->86764 87662 4115d7 52 API calls 87658->87662 87661 431e58 82 API calls 87659->87661 87660 429369 87660->87658 87661->87653 87674 4293c5 moneypunct 87662->87674 87663 42959c 87664 413748 _free 46 API calls 87663->87664 87665 4295a5 87664->87665 87666 431e58 82 API calls 87665->87666 87667 4295b1 87666->87667 87671 401b10 52 API calls 87671->87674 87674->87663 87674->87671 87681 444af8 87674->87681 87684 402780 87674->87684 87692 4022d0 87674->87692 87700 44c7dd 64 API calls 3 library calls 87674->87700 87701 44b41c 52 API calls 87674->87701 87676 410167 _wcslen 87675->87676 87677 4115d7 52 API calls 87676->87677 87678 41017e _wcscpy 87677->87678 87678->87628 87679->87643 87680->87645 87682 4115d7 52 API calls 87681->87682 87683 444b27 _memmove 87682->87683 87683->87674 87685 402827 87684->87685 87690 402790 moneypunct _memmove 87684->87690 87687 4115d7 52 API calls 87685->87687 87686 4115d7 52 API calls 87688 402797 87686->87688 87687->87690 87689 4115d7 52 API calls 87688->87689 87691 4027bd 87688->87691 87689->87691 87690->87686 87691->87674 87693 4022e0 87692->87693 87695 40239d 87692->87695 87694 4115d7 52 API calls 87693->87694 87693->87695 87696 402320 moneypunct 87693->87696 87694->87696 87695->87674 87696->87695 87697 4115d7 52 API calls 87696->87697 87697->87696 87698->87657 87699->87660 87700->87674 87701->87674 87703 402417 87702->87703 87707 402539 moneypunct 87702->87707 87704 4115d7 52 API calls 87703->87704 87703->87707 87705 402443 87704->87705 87706 4115d7 52 API calls 87705->87706 87708 4024b4 87706->87708 87707->86771 87708->87707 87708->87708 87710 4022d0 52 API calls 87708->87710 87731 402880 95 API calls 2 library calls 87708->87731 87710->87708 87715 401566 87711->87715 87712 401794 87732 40e9a0 90 API calls 87712->87732 87714 4017c0 87714->86773 87715->87712 87717 40167a 87715->87717 87718 4010a0 52 API calls 87715->87718 87717->87714 87733 45e737 90 API calls 3 library calls 87717->87733 87718->87715 87720 40bc70 52 API calls 87719->87720 87729 40d451 87720->87729 87721 40d50f 87736 410600 52 API calls 87721->87736 87723 427c01 87737 45e737 90 API calls 3 library calls 87723->87737 87724 40e0a0 52 API calls 87724->87729 87726 401b10 52 API calls 87726->87729 87727 40d519 87727->86776 87729->87721 87729->87723 87729->87724 87729->87726 87729->87727 87734 40f310 53 API calls 87729->87734 87735 40d860 91 API calls 87729->87735 87731->87708 87732->87717 87733->87714 87734->87729 87735->87729 87736->87727 87737->87727 87738->86789 87739->86790 87741 42c5fe 87740->87741 87793 4091c6 87740->87793 87742 40bc70 52 API calls 87741->87742 87741->87793 87743 42c64e InterlockedIncrement 87742->87743 87744 42c665 87743->87744 87750 42c697 87743->87750 87746 42c672 InterlockedDecrement Sleep InterlockedIncrement 87744->87746 87744->87750 87745 42c737 InterlockedDecrement 87747 42c74a 87745->87747 87746->87744 87746->87750 87749 408f40 VariantClear 87747->87749 87748 42c731 87748->87745 87751 42c752 87749->87751 87750->87745 87750->87748 87898 408e80 VariantClear 87750->87898 87904 410c60 VariantClear moneypunct 87751->87904 87754 42c6cf 87899 45340c 85 API calls 87754->87899 87756 42c6db 87757 402160 52 API calls 87756->87757 87758 42c6e5 87757->87758 87900 45340c 85 API calls 87758->87900 87760 42c6f1 87901 40d200 52 API calls 2 library calls 87760->87901 87762 42c6fb 87902 465124 53 API calls 87762->87902 87764 42c715 87765 42c76a 87764->87765 87766 42c719 87764->87766 87767 401b10 52 API calls 87765->87767 87903 46fe32 VariantClear 87766->87903 87769 42c77e 87767->87769 87770 401980 53 API calls 87769->87770 87776 42c796 87770->87776 87771 42c812 87906 46fe32 VariantClear 87771->87906 87773 42c82a InterlockedDecrement 87907 46ff07 54 API calls 87773->87907 87775 42c864 87908 45e737 90 API calls 3 library calls 87775->87908 87776->87771 87776->87775 87905 40ba10 52 API calls 2 library calls 87776->87905 87777 42c9ec 87951 47d33e 331 API calls 87777->87951 87781 42c9fe 87952 46feb1 VariantClear VariantClear 87781->87952 87783 42ca08 87786 401b10 52 API calls 87783->87786 87784 408f40 VariantClear 87794 42c849 87784->87794 87785 402780 52 API calls 87785->87794 87788 42ca15 87786->87788 87787 408f40 VariantClear 87789 42c891 87787->87789 87791 40c2c0 52 API calls 87788->87791 87909 410c60 VariantClear moneypunct 87789->87909 87790 401980 53 API calls 87790->87794 87795 42c874 87791->87795 87793->86853 87794->87777 87794->87784 87794->87785 87794->87790 87910 40a780 87794->87910 87795->87787 87797 42ca59 87795->87797 87797->87797 87799 40afc4 87798->87799 87800 40b156 87798->87800 87801 40afd5 87799->87801 87802 42d1e3 87799->87802 87962 45e737 90 API calls 3 library calls 87800->87962 87805 40a780 194 API calls 87801->87805 87823 40b11a moneypunct 87801->87823 87963 45e737 90 API calls 3 library calls 87802->87963 87808 40b00a 87805->87808 87806 42d1f8 87811 408f40 VariantClear 87806->87811 87807 40b143 87807->86853 87808->87806 87812 40b012 87808->87812 87810 42d4db 87810->87810 87811->87807 87813 42d231 VariantClear 87812->87813 87815 40b04a 87812->87815 87821 40b094 moneypunct 87812->87821 87817 40b05c moneypunct 87813->87817 87814 42d45a VariantClear 87814->87823 87815->87817 87964 40e270 VariantClear moneypunct 87815->87964 87816 40b108 87816->87823 87965 40e270 VariantClear moneypunct 87816->87965 87819 4115d7 52 API calls 87817->87819 87817->87821 87819->87821 87821->87816 87822 42d425 moneypunct 87821->87822 87822->87814 87822->87823 87823->87807 87966 45e737 90 API calls 3 library calls 87823->87966 87825 40900d 87824->87825 87826 408fff 87824->87826 87829 42c3f6 87825->87829 87831 42c44a 87825->87831 87832 40a780 194 API calls 87825->87832 87833 42c47b 87825->87833 87837 42c4cb 87825->87837 87838 42c564 87825->87838 87843 42c548 87825->87843 87844 409112 87825->87844 87846 42c528 87825->87846 87848 4090df 87825->87848 87849 4090ea 87825->87849 87858 4090f2 moneypunct 87825->87858 87970 4534e3 52 API calls 87825->87970 87972 40c4e0 194 API calls 87825->87972 87967 403ea0 52 API calls __cinit 87826->87967 87971 45e737 90 API calls 3 library calls 87829->87971 87973 45e737 90 API calls 3 library calls 87831->87973 87832->87825 87974 451b42 61 API calls 87833->87974 87976 47faae 233 API calls 87837->87976 87839 408f40 VariantClear 87838->87839 87839->87858 87840 42c491 87840->87858 87975 45e737 90 API calls 3 library calls 87840->87975 87842 42c4da 87842->87858 87977 45e737 90 API calls 3 library calls 87842->87977 87979 45e737 90 API calls 3 library calls 87843->87979 87844->87843 87852 40912b 87844->87852 87978 45e737 90 API calls 3 library calls 87846->87978 87848->87849 87968 408e80 VariantClear 87848->87968 87854 408f40 VariantClear 87849->87854 87852->87858 87969 403e10 53 API calls 87852->87969 87854->87858 87856 40914b 87857 408f40 VariantClear 87856->87857 87857->87858 87858->86853 87980 408d90 87859->87980 87861 429778 88008 410c60 VariantClear moneypunct 87861->88008 87863 408cf9 87863->87861 87865 42976c 87863->87865 87867 408d2d 87863->87867 87864 429780 88007 45e737 90 API calls 3 library calls 87865->88007 87997 403d10 87867->87997 87870 408d71 moneypunct 87870->86853 87871 408f40 VariantClear 87872 408d45 moneypunct 87871->87872 87872->87870 87872->87871 87873->86853 87874->86853 87875->86853 87876->86853 87877->86800 87878->86806 87879->86853 87880->86853 87881->86853 87882->86853 87883->86857 87884->86857 87885->86857 87886->86857 87887->86857 87888->86857 87889->86857 87891 403cdf 87890->87891 87892 408f40 VariantClear 87891->87892 87893 403ce7 87892->87893 87893->86845 87894->86857 87895->86857 87896->86853 87897->86797 87898->87754 87899->87756 87900->87760 87901->87762 87902->87764 87903->87748 87904->87793 87905->87776 87906->87773 87907->87794 87908->87795 87909->87793 87911 40a7a6 87910->87911 87912 40ae8c 87910->87912 87914 4115d7 52 API calls 87911->87914 87953 41130a 51 API calls __cinit 87912->87953 87948 40a7c6 moneypunct _memmove 87914->87948 87915 40a86d 87917 40abd1 87915->87917 87932 40a878 moneypunct 87915->87932 87916 408e80 VariantClear 87916->87948 87958 45e737 90 API calls 3 library calls 87917->87958 87919 40bc10 53 API calls 87919->87948 87920 401b10 52 API calls 87920->87948 87921 42b791 VariantClear 87921->87948 87922 42ba2d VariantClear 87922->87948 87923 408f40 VariantClear 87923->87932 87924 42b459 VariantClear 87924->87948 87925 40a884 moneypunct 87925->87794 87927 408cc0 187 API calls 87927->87948 87928 40e270 VariantClear 87928->87948 87929 42b6f6 VariantClear 87929->87948 87930 42bc5b 87930->87794 87931 4530c9 VariantClear 87931->87948 87932->87923 87932->87925 87933 4115d7 52 API calls 87933->87948 87934 42bbf5 87959 45e737 90 API calls 3 library calls 87934->87959 87935 42bb6a 87961 44b92d VariantClear 87935->87961 87936 4115d7 52 API calls 87939 42b5b3 VariantInit VariantCopy 87936->87939 87937 40b5f0 89 API calls 87937->87948 87942 42b5d7 VariantClear 87939->87942 87939->87948 87941 408f40 VariantClear 87941->87948 87942->87948 87945 42bc37 87960 45e737 90 API calls 3 library calls 87945->87960 87948->87915 87948->87916 87948->87917 87948->87919 87948->87920 87948->87921 87948->87922 87948->87924 87948->87927 87948->87928 87948->87929 87948->87931 87948->87933 87948->87934 87948->87935 87948->87936 87948->87937 87948->87941 87948->87945 87954 45308a 53 API calls 87948->87954 87955 470870 52 API calls 87948->87955 87956 457f66 87 API calls __write_nolock 87948->87956 87957 472f47 127 API calls 87948->87957 87949 42bc48 87949->87935 87950 408f40 VariantClear 87949->87950 87950->87935 87951->87781 87952->87783 87953->87948 87954->87948 87955->87948 87956->87948 87957->87948 87958->87935 87959->87935 87960->87949 87961->87930 87962->87802 87963->87806 87964->87817 87965->87823 87966->87810 87967->87825 87968->87849 87969->87856 87970->87825 87971->87858 87972->87825 87973->87858 87974->87840 87975->87858 87976->87842 87977->87858 87978->87858 87979->87838 87981 4289d2 87980->87981 87982 408db3 87980->87982 88011 45e737 90 API calls 3 library calls 87981->88011 88009 40bec0 90 API calls 87982->88009 87985 4289e5 88012 45e737 90 API calls 3 library calls 87985->88012 87986 408e6c 87986->87863 87989 428a05 87991 408f40 VariantClear 87989->87991 87990 408dc9 87990->87985 87990->87986 87990->87989 87992 40a780 194 API calls 87990->87992 87993 408e64 87990->87993 87995 408f40 VariantClear 87990->87995 87996 408e5a 87990->87996 88010 40ba10 52 API calls 2 library calls 87990->88010 87991->87986 87992->87990 87994 408f40 VariantClear 87993->87994 87994->87986 87995->87990 87996->87863 87998 408f40 VariantClear 87997->87998 87999 403d20 87998->87999 88000 403cd0 VariantClear 87999->88000 88001 403d4d 88000->88001 88013 46e91c 88001->88013 88016 45e17d 88001->88016 88026 4755ad 88001->88026 88029 467897 88001->88029 88002 403d76 88002->87861 88002->87872 88007->87861 88008->87864 88009->87990 88010->87990 88011->87985 88012->87989 88073 46e785 88013->88073 88015 46e92f 88015->88002 88017 45e198 88016->88017 88018 45e19c 88017->88018 88019 45e1b8 88017->88019 88020 408f40 VariantClear 88018->88020 88021 45e1cc 88019->88021 88022 45e1db FindClose 88019->88022 88023 45e1a4 88020->88023 88024 44ae3e CloseHandle 88021->88024 88025 45e1d9 moneypunct 88021->88025 88022->88025 88023->88002 88024->88025 88025->88002 88178 475077 88026->88178 88028 4755c0 88028->88002 88030 4678bb 88029->88030 88065 467954 88030->88065 88280 45340c 85 API calls 88030->88280 88031 4115d7 52 API calls 88032 467989 88031->88032 88034 467995 88032->88034 88284 40da60 53 API calls 88032->88284 88038 4533eb 85 API calls 88034->88038 88035 4678f6 88036 413a0e __wsplitpath 46 API calls 88035->88036 88039 4678fc 88036->88039 88040 4679b7 88038->88040 88041 401b10 52 API calls 88039->88041 88042 40de40 60 API calls 88040->88042 88043 46790c 88041->88043 88044 4679c3 88042->88044 88281 40d200 52 API calls 2 library calls 88043->88281 88046 4679c7 GetLastError 88044->88046 88053 467a05 88044->88053 88048 403cd0 VariantClear 88046->88048 88047 467917 88047->88065 88282 4339fa GetFileAttributesW FindFirstFileW FindClose 88047->88282 88051 4679dc 88048->88051 88049 467a2c 88054 4115d7 52 API calls 88049->88054 88050 467a4b 88055 4115d7 52 API calls 88050->88055 88056 4679e6 88051->88056 88061 44ae3e CloseHandle 88051->88061 88053->88049 88053->88050 88059 467a31 88054->88059 88060 467a49 88055->88060 88063 408f40 VariantClear 88056->88063 88057 467928 88062 46792f 88057->88062 88057->88065 88058 467964 88058->88002 88285 436299 52 API calls 2 library calls 88059->88285 88068 408f40 VariantClear 88060->88068 88061->88056 88283 4335cd 56 API calls 3 library calls 88062->88283 88067 4679ed 88063->88067 88065->88031 88065->88058 88067->88002 88070 467a88 88068->88070 88069 467939 88069->88065 88071 408f40 VariantClear 88069->88071 88070->88002 88072 467947 88071->88072 88072->88065 88074 46e7a2 88073->88074 88075 4115d7 52 API calls 88074->88075 88078 46e802 88074->88078 88076 46e7ad 88075->88076 88077 46e7b9 88076->88077 88121 40da60 53 API calls 88076->88121 88122 4533eb 88077->88122 88079 46e7e5 88078->88079 88086 46e82f 88078->88086 88081 408f40 VariantClear 88079->88081 88083 46e7ea 88081->88083 88083->88015 88085 46e8b5 88114 4680ed 88085->88114 88086->88085 88089 46e845 88086->88089 88092 4533eb 85 API calls 88089->88092 88091 46e8bb 88118 443fbe 88091->88118 88094 46e84b 88092->88094 88093 46e7db 88093->88079 88138 44ae3e 88093->88138 88095 46e87a 88094->88095 88099 46e883 88094->88099 88141 4689f4 59 API calls 88095->88141 88142 4013c0 52 API calls 88099->88142 88102 46e88f 88104 40e0a0 52 API calls 88102->88104 88103 408f40 VariantClear 88112 46e881 88103->88112 88105 46e899 88104->88105 88143 40d200 52 API calls 2 library calls 88105->88143 88107 46e911 88107->88015 88108 46e8a5 88144 4689f4 59 API calls 88108->88144 88111 46e903 88113 44ae3e CloseHandle 88111->88113 88112->88107 88145 40da20 88112->88145 88113->88107 88115 468100 88114->88115 88116 4680fa 88114->88116 88115->88091 88149 467ac4 55 API calls 2 library calls 88116->88149 88150 443e36 88118->88150 88120 443fd3 88120->88103 88120->88112 88121->88077 88123 453404 88122->88123 88124 4533f8 88122->88124 88126 40de40 88123->88126 88124->88123 88157 4531b1 85 API calls 5 library calls 88124->88157 88127 40da20 CloseHandle 88126->88127 88128 40de4e 88127->88128 88158 40f110 88128->88158 88131 4264fa 88133 40de84 88167 40e080 SetFilePointerEx SetFilePointerEx 88133->88167 88135 40de8b 88168 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88135->88168 88137 40de90 88137->88086 88137->88093 88139 44ae4b moneypunct 88138->88139 88170 443fdf 88138->88170 88139->88079 88141->88112 88142->88102 88143->88108 88144->88112 88146 40da37 88145->88146 88147 40da29 88145->88147 88146->88147 88148 40da3c CloseHandle 88146->88148 88147->88111 88148->88111 88149->88115 88153 443e19 88150->88153 88154 443e26 88153->88154 88155 443e32 WriteFile 88153->88155 88156 443db4 SetFilePointerEx SetFilePointerEx 88154->88156 88155->88120 88156->88155 88157->88123 88159 40f125 CreateFileW 88158->88159 88160 42630c 88158->88160 88162 40de74 88159->88162 88161 426311 CreateFileW 88160->88161 88160->88162 88161->88162 88163 426337 88161->88163 88162->88131 88166 40dea0 55 API calls moneypunct 88162->88166 88169 40df90 SetFilePointerEx SetFilePointerEx 88163->88169 88165 426342 88165->88162 88166->88133 88167->88135 88168->88137 88169->88165 88171 40da20 CloseHandle 88170->88171 88172 443feb 88171->88172 88175 4340db 88172->88175 88174 444001 88174->88139 88176 40da20 CloseHandle 88175->88176 88177 4340e7 moneypunct 88176->88177 88177->88174 88179 4533eb 85 API calls 88178->88179 88180 4750b8 88179->88180 88181 4750ee 88180->88181 88182 475129 88180->88182 88184 408f40 VariantClear 88181->88184 88231 4646e0 88182->88231 88189 4750f5 88184->88189 88185 47515e 88186 475162 88185->88186 88222 47518e 88185->88222 88187 408f40 VariantClear 88186->88187 88219 475169 88187->88219 88188 475357 88190 475365 88188->88190 88191 4754ea 88188->88191 88189->88028 88265 44b3ac 57 API calls 88190->88265 88272 464812 92 API calls 88191->88272 88195 4754fc 88196 475374 88195->88196 88198 475508 88195->88198 88244 430d31 88196->88244 88197 4533eb 85 API calls 88197->88222 88200 408f40 VariantClear 88198->88200 88203 47550f 88200->88203 88201 475388 88251 4577e9 88201->88251 88203->88219 88205 47539e 88259 410cfc 88205->88259 88206 475480 88208 408f40 VariantClear 88206->88208 88208->88219 88210 4753d4 88267 40e830 53 API calls 88210->88267 88211 4753b8 88266 45e737 90 API calls 3 library calls 88211->88266 88214 4753c5 GetCurrentProcess TerminateProcess 88214->88210 88215 4753e3 88229 475406 88215->88229 88268 40cf00 53 API calls 88215->88268 88216 4754b5 88217 408f40 VariantClear 88216->88217 88217->88219 88218 475556 88218->88219 88225 47556e FreeLibrary 88218->88225 88219->88028 88221 4753f8 88269 46c43e 106 API calls 2 library calls 88221->88269 88222->88188 88222->88197 88222->88206 88222->88216 88263 436299 52 API calls 2 library calls 88222->88263 88264 463ad5 64 API calls __wcsicoll 88222->88264 88225->88219 88229->88218 88230 408f40 VariantClear 88229->88230 88270 40cf00 53 API calls 88229->88270 88271 408e80 VariantClear 88229->88271 88273 44b3ac 57 API calls 88229->88273 88274 46c43e 106 API calls 2 library calls 88229->88274 88230->88229 88275 4536f7 53 API calls 88231->88275 88233 4646fc 88276 4426cd 59 API calls _wcslen 88233->88276 88235 464711 88237 40bc70 52 API calls 88235->88237 88243 46474b 88235->88243 88238 46472c 88237->88238 88277 461465 52 API calls _memmove 88238->88277 88240 464741 88241 40c600 52 API calls 88240->88241 88241->88243 88242 464793 88242->88185 88243->88242 88278 463ad5 64 API calls __wcsicoll 88243->88278 88245 430db2 88244->88245 88246 430d54 88244->88246 88245->88201 88247 4115d7 52 API calls 88246->88247 88248 430d74 88247->88248 88249 430da9 88248->88249 88250 4115d7 52 API calls 88248->88250 88249->88201 88250->88248 88252 457a84 88251->88252 88258 45780c _strcat moneypunct _wcslen _wcscpy 88251->88258 88252->88205 88253 443006 57 API calls 88253->88258 88255 4135bb 46 API calls _malloc 88255->88258 88256 45340c 85 API calls 88256->88258 88257 40f6f0 54 API calls 88257->88258 88258->88252 88258->88253 88258->88255 88258->88256 88258->88257 88279 44b3ac 57 API calls 88258->88279 88262 410d11 88259->88262 88260 410da9 VirtualProtect 88261 410d77 88260->88261 88261->88210 88261->88211 88262->88260 88262->88261 88263->88222 88264->88222 88265->88196 88266->88214 88267->88215 88268->88221 88269->88229 88270->88229 88271->88229 88272->88195 88273->88229 88274->88229 88275->88233 88276->88235 88277->88240 88278->88242 88279->88258 88280->88035 88281->88047 88282->88057 88283->88069 88284->88034 88285->88060 88286 42d154 88290 480a8d 88286->88290 88288 42d161 88289 480a8d 194 API calls 88288->88289 88289->88288 88291 480ae4 88290->88291 88292 480b26 88290->88292 88294 480aeb 88291->88294 88295 480b15 88291->88295 88293 40bc70 52 API calls 88292->88293 88319 480b2e 88293->88319 88297 480aee 88294->88297 88298 480b04 88294->88298 88323 4805bf 194 API calls 88295->88323 88297->88292 88299 480af3 88297->88299 88322 47fea2 194 API calls __itow_s 88298->88322 88321 47f135 194 API calls 88299->88321 88301 40e0a0 52 API calls 88301->88319 88303 408f40 VariantClear 88306 481156 88303->88306 88305 480aff 88305->88303 88307 408f40 VariantClear 88306->88307 88308 48115e 88307->88308 88308->88288 88309 480ff5 88329 45e737 90 API calls 3 library calls 88309->88329 88310 40e710 53 API calls 88310->88319 88311 401980 53 API calls 88311->88319 88313 40c2c0 52 API calls 88313->88319 88314 408e80 VariantClear 88314->88319 88315 40a780 194 API calls 88315->88319 88319->88301 88319->88305 88319->88309 88319->88310 88319->88311 88319->88313 88319->88314 88319->88315 88324 45377f 52 API calls 88319->88324 88325 45e951 53 API calls 88319->88325 88326 40e830 53 API calls 88319->88326 88327 47925f 53 API calls 88319->88327 88328 47fcff 194 API calls 88319->88328 88321->88305 88322->88305 88323->88305 88324->88319 88325->88319 88326->88319 88327->88319 88328->88319 88329->88305 88330 3f231ab 88331 3f231b0 88330->88331 88332 3f20850 GetPEB 88331->88332 88333 3f231bc 88332->88333 88334 3f23270 88333->88334 88335 3f231da 88333->88335 88352 3f23b20 9 API calls 88334->88352 88339 3f22e80 88335->88339 88338 3f23257 88340 3f20850 GetPEB 88339->88340 88343 3f22f1f 88340->88343 88342 3f22f50 CreateFileW 88342->88343 88349 3f22f5d 88342->88349 88344 3f22f79 VirtualAlloc 88343->88344 88343->88349 88350 3f23080 CloseHandle 88343->88350 88351 3f23090 VirtualFree 88343->88351 88353 3f23d90 GetPEB 88343->88353 88345 3f22f9a ReadFile 88344->88345 88344->88349 88348 3f22fb8 VirtualAlloc 88345->88348 88345->88349 88346 3f2317a 88346->88338 88347 3f2316c VirtualFree 88347->88346 88348->88343 88348->88349 88349->88346 88349->88347 88350->88343 88351->88343 88352->88338 88354 3f23dba 88353->88354 88354->88342 88355 425b2b 88360 40f000 88355->88360 88359 425b3a 88361 4115d7 52 API calls 88360->88361 88362 40f007 88361->88362 88363 4276ea 88362->88363 88369 40f030 88362->88369 88368 41130a 51 API calls __cinit 88368->88359 88370 40f039 88369->88370 88371 40f01a 88369->88371 88399 41130a 51 API calls __cinit 88370->88399 88373 40e500 88371->88373 88374 40bc70 52 API calls 88373->88374 88375 40e515 GetVersionExW 88374->88375 88376 402160 52 API calls 88375->88376 88377 40e557 88376->88377 88400 40e660 88377->88400 88383 427674 88385 4276c6 GetSystemInfo 88383->88385 88389 4276d5 GetSystemInfo 88385->88389 88386 40e5e0 88386->88389 88414 40efd0 88386->88414 88387 40e5cd GetCurrentProcess 88421 40ef20 LoadLibraryA GetProcAddress 88387->88421 88392 40e629 88418 40ef90 88392->88418 88395 40e641 FreeLibrary 88396 40e644 88395->88396 88397 40e653 FreeLibrary 88396->88397 88398 40e656 88396->88398 88397->88398 88398->88368 88399->88371 88401 40e667 88400->88401 88402 42761d 88401->88402 88403 40c600 52 API calls 88401->88403 88404 40e55c 88403->88404 88405 40e680 88404->88405 88406 40e687 88405->88406 88407 427616 88406->88407 88408 40c600 52 API calls 88406->88408 88409 40e566 88408->88409 88409->88383 88410 40ef60 88409->88410 88411 40e5c8 88410->88411 88412 40ef66 LoadLibraryA 88410->88412 88411->88386 88411->88387 88412->88411 88413 40ef77 GetProcAddress 88412->88413 88413->88411 88415 40e620 88414->88415 88416 40efd6 LoadLibraryA 88414->88416 88415->88385 88415->88392 88416->88415 88417 40efe7 GetProcAddress 88416->88417 88417->88415 88422 40efb0 LoadLibraryA GetProcAddress 88418->88422 88420 40e632 GetNativeSystemInfo 88420->88395 88420->88396 88421->88386 88422->88420 88423 425b5e 88428 40c7f0 88423->88428 88427 425b6d 88463 40db10 52 API calls 88428->88463 88430 40c82a 88464 410ab0 6 API calls 88430->88464 88432 40c86d 88433 40bc70 52 API calls 88432->88433 88434 40c877 88433->88434 88435 40bc70 52 API calls 88434->88435 88436 40c881 88435->88436 88437 40bc70 52 API calls 88436->88437 88438 40c88b 88437->88438 88439 40bc70 52 API calls 88438->88439 88440 40c8d1 88439->88440 88441 40bc70 52 API calls 88440->88441 88442 40c991 88441->88442 88465 40d2c0 52 API calls 88442->88465 88444 40c99b 88466 40d0d0 53 API calls 88444->88466 88446 40c9c1 88447 40bc70 52 API calls 88446->88447 88448 40c9cb 88447->88448 88467 40e310 53 API calls 88448->88467 88450 40ca28 88451 408f40 VariantClear 88450->88451 88452 40ca30 88451->88452 88453 408f40 VariantClear 88452->88453 88454 40ca38 GetStdHandle 88453->88454 88455 429630 88454->88455 88456 40ca87 88454->88456 88455->88456 88457 429639 88455->88457 88462 41130a 51 API calls __cinit 88456->88462 88468 4432c0 57 API calls 88457->88468 88459 429641 88469 44b6ab CreateThread 88459->88469 88461 42964f CloseHandle 88461->88456 88462->88427 88463->88430 88464->88432 88465->88444 88466->88446 88467->88450 88468->88459 88469->88461 88470 44b5cb 58 API calls 88469->88470 88471 425b6f 88476 40dc90 88471->88476 88475 425b7e 88477 40bc70 52 API calls 88476->88477 88478 40dd03 88477->88478 88484 40f210 88478->88484 88481 40dd96 88482 40ddb7 88481->88482 88487 40dc00 52 API calls 2 library calls 88481->88487 88483 41130a 51 API calls __cinit 88482->88483 88483->88475 88488 40f250 RegOpenKeyExW 88484->88488 88486 40f230 88486->88481 88487->88481 88489 425e17 88488->88489 88490 40f275 RegQueryValueExW 88488->88490 88489->88486 88491 40f2c3 RegCloseKey 88490->88491 88492 40f298 88490->88492 88491->88486 88493 40f2a9 RegCloseKey 88492->88493 88494 425e1d 88492->88494 88493->88486

                                    Control-flow Graph

                                    APIs
                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO#150003191.exe,00000104,?), ref: 00401F4C
                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                    • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\PO#150003191.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                    • String ID: C:\Users\user\Desktop\PO#150003191.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                    • API String ID: 2495805114-4228747839
                                    • Opcode ID: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                    • Opcode Fuzzy Hash: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1004 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1013 40e582-40e583 1004->1013 1014 427674-427679 1004->1014 1017 40e585-40e596 1013->1017 1018 40e5ba-40e5cb call 40ef60 1013->1018 1015 427683-427686 1014->1015 1016 42767b-427681 1014->1016 1020 427693-427696 1015->1020 1021 427688-427691 1015->1021 1019 4276b4-4276be 1016->1019 1022 427625-427629 1017->1022 1023 40e59c-40e59f 1017->1023 1037 40e5ec-40e60c 1018->1037 1038 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1018->1038 1031 4276c6-4276ca GetSystemInfo 1019->1031 1020->1019 1029 427698-4276a8 1020->1029 1021->1019 1025 427636-427640 1022->1025 1026 42762b-427631 1022->1026 1027 40e5a5-40e5ae 1023->1027 1028 427654-427657 1023->1028 1025->1018 1026->1018 1033 40e5b4 1027->1033 1034 427645-42764f 1027->1034 1028->1018 1032 42765d-42766f 1028->1032 1035 4276b0 1029->1035 1036 4276aa-4276ae 1029->1036 1041 4276d5-4276df GetSystemInfo 1031->1041 1032->1018 1033->1018 1034->1018 1035->1019 1036->1019 1040 40e612-40e623 call 40efd0 1037->1040 1037->1041 1038->1037 1047 40e5e8 1038->1047 1040->1031 1046 40e629-40e63f call 40ef90 GetNativeSystemInfo 1040->1046 1050 40e641-40e642 FreeLibrary 1046->1050 1051 40e644-40e651 1046->1051 1047->1037 1050->1051 1052 40e653-40e654 FreeLibrary 1051->1052 1053 40e656-40e65d 1051->1053 1052->1053
                                    APIs
                                    • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                    • FreeLibrary.KERNEL32(?), ref: 0040E642
                                    • FreeLibrary.KERNEL32(?), ref: 0040E654
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                    • String ID: 0SH
                                    • API String ID: 3363477735-851180471
                                    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                    APIs
                                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: IsThemeActive$uxtheme.dll
                                    • API String ID: 2574300362-3542929980
                                    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                    APIs
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                    • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                    • TranslateMessage.USER32(?), ref: 00409556
                                    • DispatchMessageW.USER32(?), ref: 00409561
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Message$Peek$DispatchSleepTranslate
                                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                    • API String ID: 1762048999-758534266
                                    • Opcode ID: 230208aa29ab6d04e6d17a77ab66c18202fa9fbe0bb8c521ee9ec5454df47b9a
                                    • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                    • Opcode Fuzzy Hash: 230208aa29ab6d04e6d17a77ab66c18202fa9fbe0bb8c521ee9ec5454df47b9a
                                    • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                    Control-flow Graph

                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO#150003191.exe,00000104,?), ref: 00401F4C
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • __wcsicoll.LIBCMT ref: 00402007
                                    • __wcsicoll.LIBCMT ref: 0040201D
                                    • __wcsicoll.LIBCMT ref: 00402033
                                      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                    • __wcsicoll.LIBCMT ref: 00402049
                                    • _wcscpy.LIBCMT ref: 0040207C
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO#150003191.exe,00000104), ref: 00428B5B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\PO#150003191.exe$CMDLINE$CMDLINERAW
                                    • API String ID: 3948761352-1215910856
                                    • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                    • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __fread_nolock$_fseek_wcscpy
                                    • String ID: D)E$D)E$FILE
                                    • API String ID: 3888824918-361185794
                                    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                    • __wsplitpath.LIBCMT ref: 0040E41C
                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                    • _wcsncat.LIBCMT ref: 0040E433
                                    • __wmakepath.LIBCMT ref: 0040E44F
                                      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                    • _wcscpy.LIBCMT ref: 0040E487
                                      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                    • _wcscat.LIBCMT ref: 00427541
                                    • _wcslen.LIBCMT ref: 00427551
                                    • _wcslen.LIBCMT ref: 00427562
                                    • _wcscat.LIBCMT ref: 0042757C
                                    • _wcsncpy.LIBCMT ref: 004275BC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                    • String ID: Include$\
                                    • API String ID: 3173733714-3429789819
                                    • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                    • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                    Control-flow Graph

                                    APIs
                                    • _fseek.LIBCMT ref: 0045292B
                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                    • __fread_nolock.LIBCMT ref: 00452961
                                    • __fread_nolock.LIBCMT ref: 00452971
                                    • __fread_nolock.LIBCMT ref: 0045298A
                                    • __fread_nolock.LIBCMT ref: 004529A5
                                    • _fseek.LIBCMT ref: 004529BF
                                    • _malloc.LIBCMT ref: 004529CA
                                    • _malloc.LIBCMT ref: 004529D6
                                    • __fread_nolock.LIBCMT ref: 004529E7
                                    • _free.LIBCMT ref: 00452A17
                                    • _free.LIBCMT ref: 00452A20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                    • String ID:
                                    • API String ID: 1255752989-0
                                    • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                    • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                    Control-flow Graph

                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                    • RegisterClassExW.USER32(00000030), ref: 004104ED
                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                    • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                    • ImageList_ReplaceIcon.COMCTL32(00AB07B0,000000FF,00000000), ref: 00410552
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                    • API String ID: 2914291525-1005189915
                                    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                    Control-flow Graph

                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                    • LoadIconW.USER32(?,00000063), ref: 004103C0
                                    • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                    • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                    • RegisterClassExW.USER32(?), ref: 0041045D
                                      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                      • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AB07B0,000000FF,00000000), ref: 00410552
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                    • String ID: #$0$AutoIt v3
                                    • API String ID: 423443420-4155596026
                                    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _malloc
                                    • String ID: Default
                                    • API String ID: 1579825452-753088835
                                    • Opcode ID: 8d6a693bc28ede282e6a55fdab6cf0c37e3d7becfc9ec4ad637a350fdd6cb948
                                    • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                    • Opcode Fuzzy Hash: 8d6a693bc28ede282e6a55fdab6cf0c37e3d7becfc9ec4ad637a350fdd6cb948
                                    • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1054 40f5c0-40f5cf call 422240 1057 40f5d0-40f5e8 1054->1057 1057->1057 1058 40f5ea-40f613 call 413650 call 410e60 1057->1058 1063 40f614-40f633 call 414d04 1058->1063 1066 40f691 1063->1066 1067 40f635-40f63c 1063->1067 1068 40f696-40f69c 1066->1068 1069 40f660-40f674 call 4150d1 1067->1069 1070 40f63e 1067->1070 1074 40f679-40f67c 1069->1074 1071 40f640 1070->1071 1073 40f642-40f650 1071->1073 1075 40f652-40f655 1073->1075 1076 40f67e-40f68c 1073->1076 1074->1063 1077 40f65b-40f65e 1075->1077 1078 425d1e-425d3e call 4150d1 call 414d04 1075->1078 1079 40f68e-40f68f 1076->1079 1080 40f69f-40f6ad 1076->1080 1077->1069 1077->1071 1090 425d43-425d5f call 414d30 1078->1090 1079->1075 1081 40f6b4-40f6c2 1080->1081 1082 40f6af-40f6b2 1080->1082 1084 425d16 1081->1084 1085 40f6c8-40f6d6 1081->1085 1082->1075 1084->1078 1087 425d05-425d0b 1085->1087 1088 40f6dc-40f6df 1085->1088 1087->1073 1091 425d11 1087->1091 1088->1075 1090->1068 1091->1084
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __fread_nolock_fseek_memmove_strcat
                                    • String ID: AU3!$EA06
                                    • API String ID: 1268643489-2658333250
                                    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1094 401100-401111 1095 401113-401119 1094->1095 1096 401179-401180 1094->1096 1098 401144-40114a 1095->1098 1099 40111b-40111e 1095->1099 1096->1095 1097 401182 1096->1097 1102 40112c-401141 DefWindowProcW 1097->1102 1100 401184-40118e call 401250 1098->1100 1101 40114c-40114f 1098->1101 1099->1098 1103 401120-401126 1099->1103 1111 401193-40119a 1100->1111 1105 401151-401157 1101->1105 1106 40119d 1101->1106 1103->1102 1104 42b038-42b03f 1103->1104 1104->1102 1110 42b045-42b059 call 401000 call 40e0c0 1104->1110 1108 401219-40121f 1105->1108 1109 40115d 1105->1109 1112 4011a3-4011a9 1106->1112 1113 42afb4-42afc5 call 40f190 1106->1113 1108->1103 1116 401225-42b06d call 468b0e 1108->1116 1114 401163-401166 1109->1114 1115 42b01d-42b024 1109->1115 1110->1102 1112->1103 1119 4011af 1112->1119 1113->1111 1123 42afe9-42b018 call 40f190 call 401a50 1114->1123 1124 40116c-401172 1114->1124 1115->1102 1122 42b02a-42b033 call 4370f4 1115->1122 1116->1111 1119->1103 1120 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 1119->1120 1121 4011db-401202 SetTimer RegisterWindowMessageW 1119->1121 1121->1111 1129 401204-401216 CreatePopupMenu 1121->1129 1122->1102 1123->1102 1124->1103 1131 401174-42afde call 45fd57 1124->1131 1131->1102 1145 42afe4 1131->1145 1145->1111
                                    APIs
                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                    • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                    • PostQuitMessage.USER32(00000000), ref: 004011CB
                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                    • CreatePopupMenu.USER32 ref: 00401204
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                    • String ID: TaskbarCreated
                                    • API String ID: 129472671-2362178303
                                    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1146 4115d7-4115df 1147 4115ee-4115f9 call 4135bb 1146->1147 1150 4115e1-4115ec call 411988 1147->1150 1151 4115fb-4115fc 1147->1151 1150->1147 1154 4115fd-41160e 1150->1154 1155 411610-41163b call 417fc0 call 41130a 1154->1155 1156 41163c-411656 call 4180af call 418105 1154->1156 1155->1156
                                    APIs
                                    • _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                    • std::exception::exception.LIBCMT ref: 00411626
                                    • std::exception::exception.LIBCMT ref: 00411640
                                    • __CxxThrowException@8.LIBCMT ref: 00411651
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                    • String ID: ,*H$4*H$@fI
                                    • API String ID: 615853336-1459471987
                                    • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                    • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1165 3f22e80-3f22f2e call 3f20850 1168 3f22f35-3f22f5b call 3f23d90 CreateFileW 1165->1168 1171 3f22f62-3f22f72 1168->1171 1172 3f22f5d 1168->1172 1179 3f22f74 1171->1179 1180 3f22f79-3f22f93 VirtualAlloc 1171->1180 1173 3f230ad-3f230b1 1172->1173 1174 3f230f3-3f230f6 1173->1174 1175 3f230b3-3f230b7 1173->1175 1181 3f230f9-3f23100 1174->1181 1177 3f230c3-3f230c7 1175->1177 1178 3f230b9-3f230bc 1175->1178 1182 3f230d7-3f230db 1177->1182 1183 3f230c9-3f230d3 1177->1183 1178->1177 1179->1173 1184 3f22f95 1180->1184 1185 3f22f9a-3f22fb1 ReadFile 1180->1185 1186 3f23102-3f2310d 1181->1186 1187 3f23155-3f2316a 1181->1187 1190 3f230eb 1182->1190 1191 3f230dd-3f230e7 1182->1191 1183->1182 1184->1173 1192 3f22fb3 1185->1192 1193 3f22fb8-3f22ff8 VirtualAlloc 1185->1193 1194 3f23111-3f2311d 1186->1194 1195 3f2310f 1186->1195 1188 3f2317a-3f23182 1187->1188 1189 3f2316c-3f23177 VirtualFree 1187->1189 1189->1188 1190->1174 1191->1190 1192->1173 1198 3f22ffa 1193->1198 1199 3f22fff-3f2301a call 3f23fe0 1193->1199 1196 3f23131-3f2313d 1194->1196 1197 3f2311f-3f2312f 1194->1197 1195->1187 1201 3f2314a-3f23150 1196->1201 1202 3f2313f-3f23148 1196->1202 1200 3f23153 1197->1200 1198->1173 1205 3f23025-3f2302f 1199->1205 1200->1181 1201->1200 1202->1200 1206 3f23062-3f23076 call 3f23df0 1205->1206 1207 3f23031-3f23060 call 3f23fe0 1205->1207 1213 3f2307a-3f2307e 1206->1213 1214 3f23078 1206->1214 1207->1205 1215 3f23080-3f23084 CloseHandle 1213->1215 1216 3f2308a-3f2308e 1213->1216 1214->1173 1215->1216 1217 3f23090-3f2309b VirtualFree 1216->1217 1218 3f2309e-3f230a7 1216->1218 1217->1218 1218->1168 1218->1173
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F22F51
                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F23177
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateFileFreeVirtual
                                    • String ID:
                                    • API String ID: 204039940-0
                                    • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                    • Instruction ID: 593d8d5986245d23231d3c02f31c81a6a3f31213034fb323a8adb43213813667
                                    • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                    • Instruction Fuzzy Hash: 34A14B75E00219EBDB14CFA4C894BEEBBB5FF48304F24859AE505BB290C7799A41CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1219 4102b0-4102c5 SHGetMalloc 1220 4102cb-4102da SHGetDesktopFolder 1219->1220 1221 425dfd-425e0e call 433244 1219->1221 1223 4102e0-41031a call 412fba 1220->1223 1224 41036b-410379 1220->1224 1231 410360-410368 1223->1231 1232 41031c-410331 SHGetPathFromIDListW 1223->1232 1224->1221 1229 41037f-410384 1224->1229 1231->1224 1233 410351-41035d 1232->1233 1234 410333-41034a call 412fba 1232->1234 1233->1231 1234->1233
                                    APIs
                                    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                    • _wcsncpy.LIBCMT ref: 004102ED
                                    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                    • _wcsncpy.LIBCMT ref: 00410340
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                    • String ID: C:\Users\user\Desktop\PO#150003191.exe
                                    • API String ID: 3170942423-2283733958
                                    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1237 40e4c0-40e4e5 call 403350 RegOpenKeyExW 1240 427190-4271ae RegQueryValueExW 1237->1240 1241 40e4eb-40e4f0 1237->1241 1242 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 1240->1242 1243 42721a-42722a RegCloseKey 1240->1243 1248 427210-427219 call 436508 1242->1248 1249 4271f7-42720e call 402160 1242->1249 1248->1243 1249->1248
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: QueryValue$CloseOpen
                                    • String ID: Include$Software\AutoIt v3\AutoIt
                                    • API String ID: 1586453840-614718249
                                    • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                    • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1254 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                    APIs
                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                    • ShowWindow.USER32(?,00000000), ref: 004105E4
                                    • ShowWindow.USER32(?,00000000), ref: 004105EE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$CreateShow
                                    • String ID: AutoIt v3$edit
                                    • API String ID: 1584632944-3779509399
                                    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                    APIs
                                      • Part of subcall function 03F22AF0: Sleep.KERNELBASE(000001F4), ref: 03F22B01
                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F22D70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateFileSleep
                                    • String ID: MKZ5GP99LDU5BNXNT2Z4VZN8WDA2W
                                    • API String ID: 2694422964-3001303862
                                    • Opcode ID: c5cfa3d910b2658a5897738d71ca8d073a6518e163341c7a37d9f0e18cf65bae
                                    • Instruction ID: 6a0351119ad2628c93b2b8fd22676410196fc6758b4c4c66c1fb0d3256c84ba7
                                    • Opcode Fuzzy Hash: c5cfa3d910b2658a5897738d71ca8d073a6518e163341c7a37d9f0e18cf65bae
                                    • Instruction Fuzzy Hash: B0718230D04399EAEF11DBE4D854BEEBF75AF19304F044599E2487B2C0D7BA0A49CB66
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Close$OpenQueryValue
                                    • String ID: Control Panel\Mouse
                                    • API String ID: 1607946009-824357125
                                    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03F2231D
                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F22341
                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F22363
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                    • String ID:
                                    • API String ID: 2438371351-0
                                    • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                                    • Instruction ID: 912a93500577c4fa61729b6e79a5de7489fb0d09baf36c3803ad74d64e80aacd
                                    • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                                    • Instruction Fuzzy Hash: 57621A34A14218DBEB24CFA4C850BDEB776EF58300F1095A9D10DEB394E77A9E81CB59
                                    APIs
                                      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                    • _free.LIBCMT ref: 004295A0
                                      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                    • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\PO#150003191.exe
                                    • API String ID: 3938964917-2718324101
                                    • Opcode ID: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                                    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                    • Opcode Fuzzy Hash: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                                    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: Error:
                                    • API String ID: 4104443479-232661952
                                    • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                    • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                    APIs
                                    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\PO#150003191.exe,0040F545,C:\Users\user\Desktop\PO#150003191.exe,004A90E8,C:\Users\user\Desktop\PO#150003191.exe,?,0040F545), ref: 0041013C
                                      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                    • String ID: X$pWH
                                    • API String ID: 85490731-941433119
                                    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                    Strings
                                    • C:\Users\user\Desktop\PO#150003191.exe, xrefs: 00410107
                                    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _strcat
                                    • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\PO#150003191.exe
                                    • API String ID: 1765576173-1342884648
                                    • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                    • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                    • Opcode Fuzzy Hash: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                    • String ID:
                                    • API String ID: 1794320848-0
                                    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$CurrentTerminate
                                    • String ID:
                                    • API String ID: 2429186680-0
                                    • Opcode ID: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                    • Opcode Fuzzy Hash: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                    APIs
                                    • _malloc.LIBCMT ref: 0043214B
                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                    • _malloc.LIBCMT ref: 0043215D
                                    • _malloc.LIBCMT ref: 0043216F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _malloc$AllocateHeap
                                    • String ID:
                                    • API String ID: 680241177-0
                                    • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                    • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                    • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                    • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                    APIs
                                    • __wsplitpath.LIBCMT ref: 004678F7
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLast__wsplitpath_malloc
                                    • String ID:
                                    • API String ID: 4163294574-0
                                    • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                    • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                    • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                    • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                    APIs
                                      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                    • _strcat.LIBCMT ref: 0040F786
                                      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                    • String ID:
                                    • API String ID: 3199840319-0
                                    • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                    • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                    APIs
                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                    • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FreeInfoLibraryParametersSystem
                                    • String ID:
                                    • API String ID: 3403648963-0
                                    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                    • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                    • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                    • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                    APIs
                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                    • __lock_file.LIBCMT ref: 00414A8D
                                      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                    • __fclose_nolock.LIBCMT ref: 00414A98
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                    • String ID:
                                    • API String ID: 2800547568-0
                                    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                    APIs
                                    • __lock_file.LIBCMT ref: 00415012
                                    • __ftell_nolock.LIBCMT ref: 0041501F
                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                                    • String ID:
                                    • API String ID: 2999321469-0
                                    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03F2231D
                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F22341
                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F22363
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                    • String ID:
                                    • API String ID: 2438371351-0
                                    • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                    • Instruction ID: 50d7457c97cc81ebe34f5a35076fb656c5b46902e7cf16379226385c0376e2d4
                                    • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                    • Instruction Fuzzy Hash: EA12CF24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID:
                                    • API String ID: 4104443479-0
                                    • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                                    • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                    • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                                    • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID:
                                    • API String ID: 4104443479-0
                                    • Opcode ID: 68aa9c4c5b5d14d70cb59537a1bb621dd1898131db9d16ab95866e5cac0f1ede
                                    • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                    • Opcode Fuzzy Hash: 68aa9c4c5b5d14d70cb59537a1bb621dd1898131db9d16ab95866e5cac0f1ede
                                    • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                    • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                    • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                    • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                    • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                    • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                    • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                    • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                    • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • _memmove.LIBCMT ref: 00444B34
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _malloc_memmove
                                    • String ID:
                                    • API String ID: 1183979061-0
                                    • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                    • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                    • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                    • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __lock_file
                                    • String ID:
                                    • API String ID: 3031932315-0
                                    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                    • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                    • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                    • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wfsopen
                                    • String ID:
                                    • API String ID: 197181222-0
                                    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                    APIs
                                    • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                    • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                    • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                    • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                    APIs
                                    • Sleep.KERNELBASE(000001F4), ref: 03F22B01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                    • Instruction ID: 134498ec947f9e8d457741e8b14467ed4307ab686dfe5a795d336f41e85a52ab
                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                    • Instruction Fuzzy Hash: CDE0BF7494010DEFDB00EFA8D5496DE7FB8EF04302F1005A1FD05D7681DB309E549A62
                                    APIs
                                    • Sleep.KERNELBASE(000001F4), ref: 03F22B01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                    • Instruction ID: b2b62d93eb37ed9f116bdeecb0a3aa1471d1872af910a4b8b464c273d6718228
                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                    • Instruction Fuzzy Hash: CBE0E67494010DEFDB00EFB8D54969E7FB4EF04302F1005A1FD01D2281D6309D509A62
                                    APIs
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                    • GetKeyState.USER32(00000011), ref: 0047C92D
                                    • GetKeyState.USER32(00000009), ref: 0047C936
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                    • GetKeyState.USER32(00000010), ref: 0047C953
                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                    • _wcsncpy.LIBCMT ref: 0047CA29
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                    • SendMessageW.USER32 ref: 0047CA7F
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                    • ImageList_SetDragCursorImage.COMCTL32(00AB07B0,00000000,00000000,00000000), ref: 0047CB9B
                                    • ImageList_BeginDrag.COMCTL32(00AB07B0,00000000,000000F8,000000F0), ref: 0047CBAC
                                    • SetCapture.USER32(?), ref: 0047CBB6
                                    • ClientToScreen.USER32(?,?), ref: 0047CC17
                                    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                    • ReleaseCapture.USER32 ref: 0047CC3A
                                    • GetCursorPos.USER32(?), ref: 0047CC72
                                    • ScreenToClient.USER32(?,?), ref: 0047CC80
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                    • SendMessageW.USER32 ref: 0047CD12
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                    • SendMessageW.USER32 ref: 0047CD80
                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                    • GetCursorPos.USER32(?), ref: 0047CDC8
                                    • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                    • GetParent.USER32(00000000), ref: 0047CDF7
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                    • SendMessageW.USER32 ref: 0047CE93
                                    • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,01761B90,00000000,?,?,?,?), ref: 0047CF1C
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                    • SendMessageW.USER32 ref: 0047CF6B
                                    • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,01761B90,00000000,?,?,?,?), ref: 0047CFE6
                                    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                    • String ID: @GUI_DRAGID$F
                                    • API String ID: 3100379633-4164748364
                                    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 00434420
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                    • IsIconic.USER32(?), ref: 0043444F
                                    • ShowWindow.USER32(?,00000009), ref: 0043445C
                                    • SetForegroundWindow.USER32(?), ref: 0043446A
                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                    • GetCurrentThreadId.KERNEL32 ref: 00434485
                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                    • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                    • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                    • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                    • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                    • keybd_event.USER32(00000012,00000000), ref: 00434514
                                    • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 2889586943-2988720461
                                    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                    APIs
                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                    • CloseHandle.KERNEL32(?), ref: 004463A0
                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                    • GetProcessWindowStation.USER32 ref: 004463D1
                                    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                    • _wcslen.LIBCMT ref: 00446498
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • _wcsncpy.LIBCMT ref: 004464C0
                                    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                    • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                    • CloseWindowStation.USER32(00000000), ref: 0044656C
                                    • CloseDesktop.USER32(?), ref: 0044657A
                                    • SetProcessWindowStation.USER32(?), ref: 00446588
                                    • CloseHandle.KERNEL32(?), ref: 00446592
                                    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                    • String ID: $@OH$default$winsta0
                                    • API String ID: 3324942560-3791954436
                                    • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                                    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                    • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                                    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                    APIs
                                    • _wcslen.LIBCMT ref: 004096C1
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • _memmove.LIBCMT ref: 0040970C
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                    • _memmove.LIBCMT ref: 00409D96
                                    • _memmove.LIBCMT ref: 0040A6C4
                                    • _memmove.LIBCMT ref: 004297E5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                    • String ID:
                                    • API String ID: 2383988440-0
                                    • Opcode ID: b038371bcf1c5dd0eef4ce0c8f02f873b5b7968284c29e04085d9bb22d62c8a1
                                    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                    • Opcode Fuzzy Hash: b038371bcf1c5dd0eef4ce0c8f02f873b5b7968284c29e04085d9bb22d62c8a1
                                    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
                                    APIs
                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\PO#150003191.exe,0040F545,C:\Users\user\Desktop\PO#150003191.exe,004A90E8,C:\Users\user\Desktop\PO#150003191.exe,?,0040F545), ref: 0041013C
                                      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                      • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                    • _wcscat.LIBCMT ref: 0044BD94
                                    • _wcscat.LIBCMT ref: 0044BDBD
                                    • __wsplitpath.LIBCMT ref: 0044BDEA
                                    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                    • _wcscpy.LIBCMT ref: 0044BE71
                                    • _wcscat.LIBCMT ref: 0044BE83
                                    • _wcscat.LIBCMT ref: 0044BE95
                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                    • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                    • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                    • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                    • FindClose.KERNEL32(00000000), ref: 0044BF33
                                    • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                    • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                    • String ID: \*.*
                                    • API String ID: 2188072990-1173974218
                                    • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                    • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                    • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                    • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                    • FindClose.KERNEL32(00000000), ref: 00478924
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                    • __swprintf.LIBCMT ref: 004789D3
                                    • __swprintf.LIBCMT ref: 00478A1D
                                    • __swprintf.LIBCMT ref: 00478A4B
                                    • __swprintf.LIBCMT ref: 00478A79
                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                    • __swprintf.LIBCMT ref: 00478AA7
                                    • __swprintf.LIBCMT ref: 00478AD5
                                    • __swprintf.LIBCMT ref: 00478B03
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                    • API String ID: 999945258-2428617273
                                    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                    • __wsplitpath.LIBCMT ref: 00403492
                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                    • _wcscpy.LIBCMT ref: 004034A7
                                    • _wcscat.LIBCMT ref: 004034BC
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                    • _wcscpy.LIBCMT ref: 004035A0
                                    • _wcslen.LIBCMT ref: 00403623
                                    • _wcslen.LIBCMT ref: 0040367D
                                    Strings
                                    • Error opening the file, xrefs: 00428231
                                    • Unterminated string, xrefs: 00428348
                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                    • _, xrefs: 0040371C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                    • API String ID: 3393021363-188983378
                                    • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                                    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                    • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                                    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                    • FindClose.KERNEL32(00000000), ref: 00431B20
                                    • FindClose.KERNEL32(00000000), ref: 00431B34
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                    • FindClose.KERNEL32(00000000), ref: 00431BCD
                                    • FindClose.KERNEL32(00000000), ref: 00431BDB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                    • String ID: *.*
                                    • API String ID: 1409584000-438819550
                                    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                    APIs
                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                    • __swprintf.LIBCMT ref: 00431C2E
                                    • _wcslen.LIBCMT ref: 00431C3A
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                    • String ID: :$\$\??\%s
                                    • API String ID: 2192556992-3457252023
                                    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                    APIs
                                    • GetLocalTime.KERNEL32(?), ref: 004722A2
                                    • __swprintf.LIBCMT ref: 004722B9
                                    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FolderPath$LocalTime__swprintf
                                    • String ID: %.3d
                                    • API String ID: 3337348382-986655627
                                    • Opcode ID: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                    • Opcode Fuzzy Hash: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                    • FindClose.KERNEL32(00000000), ref: 0044291C
                                    • FindClose.KERNEL32(00000000), ref: 00442930
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                    • FindClose.KERNEL32(00000000), ref: 004429D4
                                      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                    • FindClose.KERNEL32(00000000), ref: 004429E2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                    • String ID: *.*
                                    • API String ID: 2640511053-438819550
                                    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                    • GetLastError.KERNEL32 ref: 00433414
                                    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 2938487562-3733053543
                                    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                    APIs
                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                    • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                    • GetLengthSid.ADVAPI32(?), ref: 00446241
                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                    • CopySid.ADVAPI32(00000000), ref: 00446271
                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                    • String ID:
                                    • API String ID: 1255039815-0
                                    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                    APIs
                                    • __swprintf.LIBCMT ref: 00433073
                                    • __swprintf.LIBCMT ref: 00433085
                                    • __wcsicoll.LIBCMT ref: 00433092
                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                    • LockResource.KERNEL32(00000000), ref: 004330CA
                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                    • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                    • LockResource.KERNEL32(?), ref: 00433120
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                    • String ID:
                                    • API String ID: 1158019794-0
                                    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                    • String ID:
                                    • API String ID: 1737998785-0
                                    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                    • GetLastError.KERNEL32 ref: 0045D6BF
                                    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Error$Mode$DiskFreeLastSpace
                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                    • API String ID: 4194297153-14809454
                                    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove$_strncmp
                                    • String ID: @oH$\$^$h
                                    • API String ID: 2175499884-3701065813
                                    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                    APIs
                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                    • listen.WSOCK32(00000000,00000005), ref: 00465381
                                    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                    • String ID:
                                    • API String ID: 540024437-0
                                    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                    • API String ID: 0-2872873767
                                    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                    • __wsplitpath.LIBCMT ref: 00475644
                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                    • _wcscat.LIBCMT ref: 00475657
                                    • __wcsicoll.LIBCMT ref: 0047567B
                                    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                    • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                    • String ID:
                                    • API String ID: 2547909840-0
                                    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                    • Sleep.KERNEL32(0000000A), ref: 0045250B
                                    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                    • FindClose.KERNEL32(?), ref: 004525FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                    • String ID: *.*$\VH
                                    • API String ID: 2786137511-2657498754
                                    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                    • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID: pqI
                                    • API String ID: 2579439406-2459173057
                                    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                    APIs
                                    • __wcsicoll.LIBCMT ref: 00433349
                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                    • __wcsicoll.LIBCMT ref: 00433375
                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicollmouse_event
                                    • String ID: DOWN
                                    • API String ID: 1033544147-711622031
                                    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 0044C3D2
                                    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: KeyboardMessagePostState$InputSend
                                    • String ID:
                                    • API String ID: 3031425849-0
                                    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                    APIs
                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLastinet_addrsocket
                                    • String ID:
                                    • API String ID: 4170576061-0
                                    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                    APIs
                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                    • IsWindowVisible.USER32 ref: 0047A368
                                    • IsWindowEnabled.USER32 ref: 0047A378
                                    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                    • IsIconic.USER32 ref: 0047A393
                                    • IsZoomed.USER32 ref: 0047A3A1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                    • String ID:
                                    • API String ID: 292994002-0
                                    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                    APIs
                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                    • CoInitialize.OLE32(00000000), ref: 00478442
                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                    • CoUninitialize.OLE32 ref: 0047863C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                    • String ID: .lnk
                                    • API String ID: 886957087-24824748
                                    • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                    • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                    APIs
                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                    • CloseClipboard.USER32 ref: 0046DD0D
                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                    • CloseClipboard.USER32 ref: 0046DD41
                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                    • CloseClipboard.USER32 ref: 0046DD99
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                    • String ID:
                                    • API String ID: 15083398-0
                                    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: U$\
                                    • API String ID: 4104443479-100911408
                                    • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                    • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                    • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                    • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Find$File$CloseFirstNext
                                    • String ID:
                                    • API String ID: 3541575487-0
                                    • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                    • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                    APIs
                                    • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                    • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                    • FindClose.KERNEL32(00000000), ref: 004339EB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FileFind$AttributesCloseFirst
                                    • String ID:
                                    • API String ID: 48322524-0
                                    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                    APIs
                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                    • String ID:
                                    • API String ID: 901099227-0
                                    • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                    • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                    APIs
                                    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Proc
                                    • String ID:
                                    • API String ID: 2346855178-0
                                    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                    APIs
                                    • BlockInput.USER32(00000001), ref: 0045A38B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: BlockInput
                                    • String ID:
                                    • API String ID: 3456056419-0
                                    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                    APIs
                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: LogonUser
                                    • String ID:
                                    • API String ID: 1244722697-0
                                    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                    APIs
                                    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: N@
                                    • API String ID: 0-1509896676
                                    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                    • Instruction ID: 071dca6b0fd874d721770afc0f977029d17ac9280d2280e3f2d28375089e8569
                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                    • Instruction Fuzzy Hash: 8641C2B1D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D734AB41DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                    • Instruction ID: 5f5b7f213d75b9c8f4bc1fd27f904379409a77efe3aebf78d8959dbc8f93bfd6
                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                    • Instruction Fuzzy Hash: 6D018078A00219EFCB44DF98C5909AEFBB5FB48310B60859AD809A7301E734AE42DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                    • Instruction ID: 982d0d0f4b3c6402fb980d4c9463caeab98de56d8a9f7102e00fab299efe2a34
                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                    • Instruction Fuzzy Hash: 460180B9A00219EFCB44DF98C5909AEFBB6FB48210B60859AD809A7301D734AE41DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2060642461.0000000003F20000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_3f20000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                    APIs
                                    • DeleteObject.GDI32(?), ref: 0045953B
                                    • DeleteObject.GDI32(?), ref: 00459551
                                    • DestroyWindow.USER32(?), ref: 00459563
                                    • GetDesktopWindow.USER32 ref: 00459581
                                    • GetWindowRect.USER32(00000000), ref: 00459588
                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                    • GetClientRect.USER32(00000000,?), ref: 004596F8
                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                    • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                    • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                    • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                    • ShowWindow.USER32(?,00000004), ref: 00459865
                                    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                    • GetStockObject.GDI32(00000011), ref: 004598CD
                                    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                    • DeleteDC.GDI32(00000000), ref: 004598F8
                                    • _wcslen.LIBCMT ref: 00459916
                                    • _wcscpy.LIBCMT ref: 0045993A
                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                    • GetDC.USER32(00000000), ref: 004599FC
                                    • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                    • String ID: $AutoIt v3$DISPLAY$static
                                    • API String ID: 4040870279-2373415609
                                    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                    APIs
                                    • GetSysColor.USER32(00000012), ref: 0044181E
                                    • SetTextColor.GDI32(?,?), ref: 00441826
                                    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                    • GetSysColor.USER32(0000000F), ref: 00441849
                                    • SetBkColor.GDI32(?,?), ref: 00441864
                                    • SelectObject.GDI32(?,?), ref: 00441874
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                    • GetSysColor.USER32(00000010), ref: 004418B2
                                    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                    • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                    • DeleteObject.GDI32(?), ref: 004418D5
                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                    • FillRect.USER32(?,?,?), ref: 00441970
                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                    • String ID:
                                    • API String ID: 69173610-0
                                    • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                                    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                    • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                                    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                    APIs
                                    • DestroyWindow.USER32(?), ref: 004590F2
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                    • GetClientRect.USER32(00000000,?), ref: 0045924E
                                    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                    • GetStockObject.GDI32(00000011), ref: 004592AC
                                    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                    • DeleteDC.GDI32(00000000), ref: 004592D6
                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                    • GetStockObject.GDI32(00000011), ref: 004593D3
                                    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                    • API String ID: 2910397461-517079104
                                    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsnicmp
                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                    • API String ID: 1038674560-3360698832
                                    • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                    • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                    APIs
                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                    • SetCursor.USER32(00000000), ref: 0043075B
                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                    • SetCursor.USER32(00000000), ref: 00430773
                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                    • SetCursor.USER32(00000000), ref: 0043078B
                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                    • SetCursor.USER32(00000000), ref: 004307A3
                                    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                    • SetCursor.USER32(00000000), ref: 004307BB
                                    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                    • SetCursor.USER32(00000000), ref: 004307D3
                                    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                    • SetCursor.USER32(00000000), ref: 004307EB
                                    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                    • SetCursor.USER32(00000000), ref: 00430803
                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                    • SetCursor.USER32(00000000), ref: 0043081B
                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                    • SetCursor.USER32(00000000), ref: 00430833
                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                    • SetCursor.USER32(00000000), ref: 0043084B
                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                    • SetCursor.USER32(00000000), ref: 00430863
                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                    • SetCursor.USER32(00000000), ref: 0043087B
                                    • SetCursor.USER32(00000000), ref: 00430887
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                    • SetCursor.USER32(00000000), ref: 0043089F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Cursor$Load
                                    • String ID:
                                    • API String ID: 1675784387-0
                                    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                    APIs
                                    • GetSysColor.USER32(0000000E), ref: 00430913
                                    • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                    • GetSysColor.USER32(00000012), ref: 00430933
                                    • SetTextColor.GDI32(?,?), ref: 0043093B
                                    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                    • GetSysColor.USER32(0000000F), ref: 00430959
                                    • CreateSolidBrush.GDI32(?), ref: 00430962
                                    • GetSysColor.USER32(00000011), ref: 00430979
                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                    • SelectObject.GDI32(?,00000000), ref: 0043099C
                                    • SetBkColor.GDI32(?,?), ref: 004309A6
                                    • SelectObject.GDI32(?,?), ref: 004309B4
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                    • DrawFocusRect.USER32(?,?), ref: 00430A91
                                    • GetSysColor.USER32(00000011), ref: 00430A9F
                                    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                    • SelectObject.GDI32(?,?), ref: 00430AD0
                                    • DeleteObject.GDI32(00000105), ref: 00430ADC
                                    • SelectObject.GDI32(?,?), ref: 00430AE3
                                    • DeleteObject.GDI32(?), ref: 00430AE9
                                    • SetTextColor.GDI32(?,?), ref: 00430AF0
                                    • SetBkColor.GDI32(?,?), ref: 00430AFB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                    • String ID:
                                    • API String ID: 1582027408-0
                                    • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                                    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                    • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                                    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                    APIs
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseConnectCreateRegistry
                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                    • API String ID: 3217815495-966354055
                                    • Opcode ID: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                                    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                    • Opcode Fuzzy Hash: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                                    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 004566AE
                                    • GetDesktopWindow.USER32 ref: 004566C3
                                    • GetWindowRect.USER32(00000000), ref: 004566CA
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                    • DestroyWindow.USER32(?), ref: 00456746
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                    • IsWindowVisible.USER32(?), ref: 0045682C
                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                    • GetWindowRect.USER32(?,?), ref: 00456873
                                    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                    • CopyRect.USER32(?,?), ref: 004568BE
                                    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                    • String ID: ($,$tooltips_class32
                                    • API String ID: 225202481-3320066284
                                    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                    APIs
                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                    • CloseClipboard.USER32 ref: 0046DD0D
                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                    • CloseClipboard.USER32 ref: 0046DD41
                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                    • CloseClipboard.USER32 ref: 0046DD99
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                    • String ID:
                                    • API String ID: 15083398-0
                                    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • GetWindowRect.USER32(?,?), ref: 00471CF7
                                    • GetClientRect.USER32(?,?), ref: 00471D05
                                    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                    • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                    • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                    • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                    • GetClientRect.USER32(?,?), ref: 00471E8A
                                    • GetStockObject.GDI32(00000011), ref: 00471EA6
                                    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                    • String ID: @$AutoIt v3 GUI
                                    • API String ID: 867697134-3359773793
                                    • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                    • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                    • API String ID: 1503153545-1459072770
                                    • Opcode ID: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                                    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                    • Opcode Fuzzy Hash: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                                    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll$__wcsnicmp
                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                    • API String ID: 790654849-32604322
                                    • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                    • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                                    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                    • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                                    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                    APIs
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window
                                    • String ID: 0
                                    • API String ID: 2353593579-4108050209
                                    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                    APIs
                                    • GetSysColor.USER32(0000000F), ref: 0044A05E
                                    • GetClientRect.USER32(?,?), ref: 0044A0D1
                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                    • GetWindowDC.USER32(?), ref: 0044A0F6
                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                    • ReleaseDC.USER32(?,?), ref: 0044A11B
                                    • GetSysColor.USER32(0000000F), ref: 0044A131
                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                    • GetSysColor.USER32(0000000F), ref: 0044A14F
                                    • GetSysColor.USER32(00000005), ref: 0044A15B
                                    • GetWindowDC.USER32(?), ref: 0044A1BE
                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                    • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                    • GetSysColor.USER32(00000008), ref: 0044A265
                                    • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                    • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                    • GetStockObject.GDI32(00000005), ref: 0044A28A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                    • String ID:
                                    • API String ID: 1744303182-0
                                    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                    • __mtterm.LIBCMT ref: 00417C34
                                      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                    • __init_pointers.LIBCMT ref: 00417CE6
                                    • __calloc_crt.LIBCMT ref: 00417D54
                                    • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                    • API String ID: 4163708885-3819984048
                                    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: >>>AUTOIT SCRIPT<<<$\
                                    • API String ID: 0-1896584978
                                    • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                    • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll$IconLoad
                                    • String ID: blank$info$question$stop$warning
                                    • API String ID: 2485277191-404129466
                                    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                    APIs
                                    • LoadIconW.USER32(?,00000063), ref: 0045464C
                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                    • SetWindowTextW.USER32(?,?), ref: 00454678
                                    • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                    • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                    • GetWindowRect.USER32(?,?), ref: 004546F5
                                    • SetWindowTextW.USER32(?,?), ref: 00454765
                                    • GetDesktopWindow.USER32 ref: 0045476F
                                    • GetWindowRect.USER32(00000000), ref: 00454776
                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                    • GetClientRect.USER32(?,?), ref: 004547D2
                                    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                    • String ID:
                                    • API String ID: 3869813825-0
                                    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                    APIs
                                    • _wcslen.LIBCMT ref: 00464B28
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                    • _wcslen.LIBCMT ref: 00464C28
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                    • _wcslen.LIBCMT ref: 00464CBA
                                    • _wcslen.LIBCMT ref: 00464CD0
                                    • _wcslen.LIBCMT ref: 00464CEF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$Directory$CurrentSystem
                                    • String ID: D
                                    • API String ID: 1914653954-2746444292
                                    • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                                    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                    • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                                    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                    APIs
                                    • _wcsncpy.LIBCMT ref: 0045CE39
                                    • __wsplitpath.LIBCMT ref: 0045CE78
                                    • _wcscat.LIBCMT ref: 0045CE8B
                                    • _wcscat.LIBCMT ref: 0045CE9E
                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                    • _wcscpy.LIBCMT ref: 0045CF61
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                    • String ID: *.*
                                    • API String ID: 1153243558-438819550
                                    • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                    • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                    • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                    • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll
                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                    • API String ID: 3832890014-4202584635
                                    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                    APIs
                                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                    • GetFocus.USER32 ref: 0046A0DD
                                    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessagePost$CtrlFocus
                                    • String ID: 0
                                    • API String ID: 1534620443-4108050209
                                    • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                                    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                    • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                                    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                    APIs
                                    • DestroyWindow.USER32(?), ref: 004558E3
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$CreateDestroy
                                    • String ID: ,$tooltips_class32
                                    • API String ID: 1109047481-3856767331
                                    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                    • GetMenuItemCount.USER32(?), ref: 00468C45
                                    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                    • GetMenuItemCount.USER32 ref: 00468CFD
                                    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                    • GetCursorPos.USER32(?), ref: 00468D3F
                                    • SetForegroundWindow.USER32(?), ref: 00468D49
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                    • String ID: 0
                                    • API String ID: 1441871840-4108050209
                                    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                    • __swprintf.LIBCMT ref: 00460915
                                    • __swprintf.LIBCMT ref: 0046092D
                                    • _wprintf.LIBCMT ref: 004609E1
                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                    • API String ID: 3631882475-2268648507
                                    • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                    • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                    APIs
                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                    • SendMessageW.USER32 ref: 00471740
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                    • SendMessageW.USER32 ref: 0047184F
                                    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                    • String ID:
                                    • API String ID: 4116747274-0
                                    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: InfoItemMenu$Sleep
                                    • String ID: 0
                                    • API String ID: 1196289194-4108050209
                                    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                    APIs
                                    • GetDC.USER32(00000000), ref: 0043143E
                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                    • SelectObject.GDI32(00000000,?), ref: 00431466
                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                    • String ID: (
                                    • API String ID: 3300687185-3887548279
                                    • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                                    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                    • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                                    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                    APIs
                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                    • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                    • API String ID: 1976180769-4113822522
                                    • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                    • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                    • String ID:
                                    • API String ID: 461458858-0
                                    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                    APIs
                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                    • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                    • CloseHandle.KERNEL32(00000000), ref: 00430113
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                    • GlobalFree.KERNEL32(00000000), ref: 00430150
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                    • DeleteObject.GDI32(?), ref: 004301D0
                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                    • String ID:
                                    • API String ID: 3969911579-0
                                    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                    • String ID: 0
                                    • API String ID: 956284711-4108050209
                                    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                    • String ID: 0.0.0.0
                                    • API String ID: 1965227024-3771769585
                                    • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                    • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                    APIs
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: SendString$_memmove_wcslen
                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                    • API String ID: 369157077-1007645807
                                    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                    APIs
                                    • GetParent.USER32 ref: 00445BF8
                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                    • __wcsicoll.LIBCMT ref: 00445C33
                                    • __wcsicoll.LIBCMT ref: 00445C4F
                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                    • API String ID: 3125838495-3381328864
                                    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                    APIs
                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                    • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$CharNext
                                    • String ID:
                                    • API String ID: 1350042424-0
                                    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                    APIs
                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                    • _wcscpy.LIBCMT ref: 004787E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                    • API String ID: 3052893215-2127371420
                                    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                    APIs
                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                    • __swprintf.LIBCMT ref: 0045E7F7
                                    • _wprintf.LIBCMT ref: 0045E8B3
                                    • _wprintf.LIBCMT ref: 0045E8D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                    • API String ID: 2295938435-2354261254
                                    • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                    • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                    • String ID: %.15g$0x%p$False$True
                                    • API String ID: 3038501623-2263619337
                                    • Opcode ID: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                                    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                    • Opcode Fuzzy Hash: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                                    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                    APIs
                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                    • __swprintf.LIBCMT ref: 0045E5F6
                                    • _wprintf.LIBCMT ref: 0045E6A3
                                    • _wprintf.LIBCMT ref: 0045E6C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                    • API String ID: 2295938435-8599901
                                    • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                    • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                    APIs
                                    • timeGetTime.WINMM ref: 00443B67
                                      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                    • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                    • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                    • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                    • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                    • IsWindow.USER32(00000000), ref: 00443C3A
                                    • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                    • String ID: BUTTON
                                    • API String ID: 1834419854-3405671355
                                    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                    • LoadStringW.USER32(00000000), ref: 00454040
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • _wprintf.LIBCMT ref: 00454074
                                    • __swprintf.LIBCMT ref: 004540A3
                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                    • API String ID: 455036304-4153970271
                                    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                    APIs
                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                    • _memmove.LIBCMT ref: 00467EB8
                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                    • _memmove.LIBCMT ref: 00467F6C
                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                    • String ID:
                                    • API String ID: 2170234536-0
                                    • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                    • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 00453CE0
                                    • SetKeyboardState.USER32(?), ref: 00453D3B
                                    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                    • GetKeyState.USER32(000000A0), ref: 00453D75
                                    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                    • GetKeyState.USER32(000000A1), ref: 00453DB5
                                    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                    • GetKeyState.USER32(00000011), ref: 00453DEF
                                    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                    • GetKeyState.USER32(00000012), ref: 00453E26
                                    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                    • GetKeyState.USER32(0000005B), ref: 00453E5D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                    APIs
                                    • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                    • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                    • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                    • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                    • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                    • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$ItemMoveRect$Invalidate
                                    • String ID:
                                    • API String ID: 3096461208-0
                                    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                    APIs
                                    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                    • DeleteObject.GDI32(?), ref: 0047151E
                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                    • DeleteObject.GDI32(?), ref: 004715EA
                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                    • String ID:
                                    • API String ID: 3218148540-0
                                    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                    • String ID:
                                    • API String ID: 136442275-0
                                    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                    APIs
                                    • _wcsncpy.LIBCMT ref: 00467490
                                    • _wcsncpy.LIBCMT ref: 004674BC
                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                    • _wcstok.LIBCMT ref: 004674FF
                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                    • _wcstok.LIBCMT ref: 004675B2
                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                    • _wcslen.LIBCMT ref: 00467793
                                    • _wcscpy.LIBCMT ref: 00467641
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • _wcslen.LIBCMT ref: 004677BD
                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                    • String ID: X
                                    • API String ID: 3104067586-3081909835
                                    • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                    • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                    • _wcslen.LIBCMT ref: 0046CDB0
                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                    • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                    Strings
                                    • NULL Pointer assignment, xrefs: 0046CEA6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                    • String ID: NULL Pointer assignment
                                    • API String ID: 440038798-2785691316
                                    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                    APIs
                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                    • _wcslen.LIBCMT ref: 004610A3
                                    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                    • GetWindowRect.USER32(?,?), ref: 00461248
                                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                    • String ID: ThumbnailClass
                                    • API String ID: 4136854206-1241985126
                                    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                    APIs
                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                    • GetClientRect.USER32(?,?), ref: 00471A1A
                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                    • String ID: 2
                                    • API String ID: 1331449709-450215437
                                    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                    • __swprintf.LIBCMT ref: 00460915
                                    • __swprintf.LIBCMT ref: 0046092D
                                    • _wprintf.LIBCMT ref: 004609E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                    • API String ID: 3054410614-2561132961
                                    • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                    • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                    APIs
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                    • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                    • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                    • API String ID: 600699880-22481851
                                    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DestroyWindow
                                    • String ID: static
                                    • API String ID: 3375834691-2160076837
                                    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DriveType
                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                    • API String ID: 2907320926-3566645568
                                    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                    APIs
                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                    • DeleteObject.GDI32(00440000), ref: 00470A04
                                    • DestroyIcon.USER32(004D004F), ref: 00470A1C
                                    • DeleteObject.GDI32(EB029987), ref: 00470A34
                                    • DestroyWindow.USER32(005C006C), ref: 00470A4C
                                    • DestroyIcon.USER32(?), ref: 00470A73
                                    • DestroyIcon.USER32(?), ref: 00470A81
                                    • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                    • String ID:
                                    • API String ID: 1237572874-0
                                    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                    APIs
                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                    • VariantInit.OLEAUT32(?), ref: 004793E1
                                    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                    • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                    • VariantClear.OLEAUT32(?), ref: 00479489
                                    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                    • VariantClear.OLEAUT32(?), ref: 004794CA
                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                    • String ID:
                                    • API String ID: 2706829360-0
                                    • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                    • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 0044480E
                                    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                    • GetKeyState.USER32(000000A0), ref: 004448AA
                                    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                    • GetKeyState.USER32(000000A1), ref: 004448D9
                                    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                    • GetKeyState.USER32(00000011), ref: 00444903
                                    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                    • GetKeyState.USER32(00000012), ref: 0044492D
                                    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                    • GetKeyState.USER32(0000005B), ref: 00444958
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                    • String ID:
                                    • API String ID: 3413494760-0
                                    • Opcode ID: 8449772dd4c4864e53668d518338167b5f7124ec3e85df06159a96bd08f47b13
                                    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                    • Opcode Fuzzy Hash: 8449772dd4c4864e53668d518338167b5f7124ec3e85df06159a96bd08f47b13
                                    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressProc_free_malloc$_strcat_strlen
                                    • String ID: AU3_FreeVar
                                    • API String ID: 2634073740-771828931
                                    • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                    • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                    APIs
                                    • CoInitialize.OLE32 ref: 0046C63A
                                    • CoUninitialize.OLE32 ref: 0046C645
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                    • IIDFromString.OLE32(?,?), ref: 0046C705
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                    • API String ID: 2294789929-1287834457
                                    • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                    • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                    APIs
                                      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                    • ImageList_EndDrag.COMCTL32 ref: 00471169
                                    • ReleaseCapture.USER32 ref: 0047116F
                                    • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                    • API String ID: 2483343779-2107944366
                                    • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                    • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                    APIs
                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                    • _wcslen.LIBCMT ref: 00450720
                                    • _wcscat.LIBCMT ref: 00450733
                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window_wcscat_wcslen
                                    • String ID: -----$SysListView32
                                    • API String ID: 4008455318-3975388722
                                    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                    • GetParent.USER32 ref: 00469C98
                                    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                    • GetParent.USER32 ref: 00469CBC
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 2360848162-1403004172
                                    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                    • String ID:
                                    • API String ID: 262282135-0
                                    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                    APIs
                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$LongWindow
                                    • String ID:
                                    • API String ID: 312131281-0
                                    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                    APIs
                                      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                    • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                    • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                    • String ID:
                                    • API String ID: 3771399671-0
                                    • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                    • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                    • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                    • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 00434643
                                    • GetForegroundWindow.USER32(00000000), ref: 00434655
                                    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                    • String ID:
                                    • API String ID: 2156557900-0
                                    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                    • API String ID: 0-1603158881
                                    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                    APIs
                                    • CreateMenu.USER32 ref: 00448603
                                    • SetMenu.USER32(?,00000000), ref: 00448613
                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                    • IsMenu.USER32(?), ref: 004486AB
                                    • CreatePopupMenu.USER32 ref: 004486B5
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                    • DrawMenuBar.USER32 ref: 004486F5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                    • String ID: 0
                                    • API String ID: 161812096-4108050209
                                    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\PO#150003191.exe), ref: 00434057
                                    • LoadStringW.USER32(00000000), ref: 00434060
                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                    • LoadStringW.USER32(00000000), ref: 00434078
                                    • _wprintf.LIBCMT ref: 004340A1
                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                    Strings
                                    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                    • C:\Users\user\Desktop\PO#150003191.exe, xrefs: 00434040
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString$Message_wprintf
                                    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\PO#150003191.exe
                                    • API String ID: 3648134473-2395818326
                                    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                                    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                    • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                                    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                    APIs
                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\PO#150003191.exe,0040F545,C:\Users\user\Desktop\PO#150003191.exe,004A90E8,C:\Users\user\Desktop\PO#150003191.exe,?,0040F545), ref: 0041013C
                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                    • MoveFileW.KERNEL32(?,?), ref: 00453932
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                    • String ID:
                                    • API String ID: 978794511-0
                                    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ClearVariant
                                    • String ID:
                                    • API String ID: 1473721057-0
                                    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove$_memcmp
                                    • String ID: '$\$h
                                    • API String ID: 2205784470-1303700344
                                    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                    APIs
                                    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                    • VariantClear.OLEAUT32 ref: 0045EA6D
                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                    • __swprintf.LIBCMT ref: 0045EC33
                                    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                    Strings
                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                    • String ID: %4d%02d%02d%02d%02d%02d
                                    • API String ID: 2441338619-1568723262
                                    • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                                    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                    • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                                    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                    APIs
                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                    • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                    • String ID: @COM_EVENTOBJ
                                    • API String ID: 327565842-2228938565
                                    • Opcode ID: 2d2e6611baaaed01bf0ac91f3b08fe096b6b0ff8b1e1267574a63fcd06cc1b28
                                    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                    • Opcode Fuzzy Hash: 2d2e6611baaaed01bf0ac91f3b08fe096b6b0ff8b1e1267574a63fcd06cc1b28
                                    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                    APIs
                                    • VariantClear.OLEAUT32(?), ref: 0047031B
                                    • VariantClear.OLEAUT32(?), ref: 0047044F
                                    • VariantInit.OLEAUT32(?), ref: 004704A3
                                    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                    • VariantClear.OLEAUT32(?), ref: 00470516
                                      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                    • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$Clear$Copy$CallDispFuncInit
                                    • String ID: H
                                    • API String ID: 3613100350-2852464175
                                    • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                                    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                    • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                                    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                    APIs
                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                    • DestroyWindow.USER32(?), ref: 00426F50
                                    • UnregisterHotKey.USER32(?), ref: 00426F77
                                    • FreeLibrary.KERNEL32(?), ref: 0042701F
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                    • String ID: close all
                                    • API String ID: 4174999648-3243417748
                                    • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                    • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                    APIs
                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                    • String ID:
                                    • API String ID: 1291720006-3916222277
                                    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                    • IsMenu.USER32(?), ref: 0045FC5F
                                    • CreatePopupMenu.USER32 ref: 0045FC97
                                    • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                    • String ID: 0$2
                                    • API String ID: 93392585-3793063076
                                    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                    APIs
                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                    • VariantClear.OLEAUT32(?), ref: 00435320
                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                    • VariantClear.OLEAUT32(?), ref: 004353B3
                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                    • String ID: crts
                                    • API String ID: 586820018-3724388283
                                    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                    APIs
                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\PO#150003191.exe,0040F545,C:\Users\user\Desktop\PO#150003191.exe,004A90E8,C:\Users\user\Desktop\PO#150003191.exe,?,0040F545), ref: 0041013C
                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                    • _wcscat.LIBCMT ref: 0044BCAF
                                    • _wcslen.LIBCMT ref: 0044BCBB
                                    • _wcslen.LIBCMT ref: 0044BCD1
                                    • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                    • String ID: \*.*
                                    • API String ID: 2326526234-1173974218
                                    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                    APIs
                                      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                    • _wcslen.LIBCMT ref: 004335F2
                                    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                    • GetLastError.KERNEL32 ref: 0043362B
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                    • _wcsrchr.LIBCMT ref: 00433666
                                      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                    • String ID: \
                                    • API String ID: 321622961-2967466578
                                    • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                    • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsnicmp
                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                    • API String ID: 1038674560-2734436370
                                    • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                    • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                    • __lock.LIBCMT ref: 00417981
                                      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                    • __lock.LIBCMT ref: 004179A2
                                    • ___addlocaleref.LIBCMT ref: 004179C0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                    • String ID: KERNEL32.DLL$pI
                                    • API String ID: 637971194-197072765
                                    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove$_malloc
                                    • String ID:
                                    • API String ID: 1938898002-0
                                    • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                                    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                    • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                                    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                    APIs
                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                    • _memmove.LIBCMT ref: 0044B555
                                    • _memmove.LIBCMT ref: 0044B578
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                    • String ID:
                                    • API String ID: 2737351978-0
                                    • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                                    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                    • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                                    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                    • __calloc_crt.LIBCMT ref: 00415246
                                    • __getptd.LIBCMT ref: 00415253
                                    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                    • _free.LIBCMT ref: 0041529E
                                    • __dosmaperr.LIBCMT ref: 004152A9
                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                    • String ID:
                                    • API String ID: 3638380555-0
                                    • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                    • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 0046C96E
                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$Copy$ClearErrorInitLast
                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                    • API String ID: 3207048006-625585964
                                    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                    APIs
                                    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                    • gethostbyname.WSOCK32(?), ref: 004655A6
                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                    • _memmove.LIBCMT ref: 004656CA
                                    • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                    • WSACleanup.WSOCK32 ref: 00465762
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                    • String ID:
                                    • API String ID: 2945290962-0
                                    • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                    • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                    APIs
                                    • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                    • String ID:
                                    • API String ID: 1457242333-0
                                    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ConnectRegistry_memmove_wcslen
                                    • String ID:
                                    • API String ID: 15295421-0
                                    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                    APIs
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • _wcstok.LIBCMT ref: 004675B2
                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                    • _wcscpy.LIBCMT ref: 00467641
                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                    • _wcslen.LIBCMT ref: 00467793
                                    • _wcslen.LIBCMT ref: 004677BD
                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                    • String ID: X
                                    • API String ID: 780548581-3081909835
                                    • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                    • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                    APIs
                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                    • CloseFigure.GDI32(?), ref: 0044751F
                                    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                    • String ID:
                                    • API String ID: 4082120231-0
                                    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                    • String ID:
                                    • API String ID: 2027346449-0
                                    • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                    • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                    • GetMenu.USER32 ref: 0047A703
                                    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                    • _wcslen.LIBCMT ref: 0047A79E
                                    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                    • String ID:
                                    • API String ID: 3257027151-0
                                    • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                    • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                    APIs
                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLastselect
                                    • String ID:
                                    • API String ID: 215497628-0
                                    • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                                    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                    • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                                    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                    APIs
                                    • GetParent.USER32(?), ref: 0044443B
                                    • GetKeyboardState.USER32(?), ref: 00444450
                                    • SetKeyboardState.USER32(?), ref: 004444A4
                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                    APIs
                                    • GetParent.USER32(?), ref: 00444633
                                    • GetKeyboardState.USER32(?), ref: 00444648
                                    • SetKeyboardState.USER32(?), ref: 0044469C
                                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                    APIs
                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                    • DeleteObject.GDI32(?), ref: 00455736
                                    • DeleteObject.GDI32(?), ref: 00455744
                                    • DestroyIcon.USER32(?), ref: 00455752
                                    • DestroyWindow.USER32(?), ref: 00455760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                    • String ID:
                                    • API String ID: 2354583917-0
                                    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                    APIs
                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Enable$Show$MessageMoveSend
                                    • String ID:
                                    • API String ID: 896007046-0
                                    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                    APIs
                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                    • GetFocus.USER32 ref: 00448ACF
                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Enable$Show$FocusMessageSend
                                    • String ID:
                                    • API String ID: 3429747543-0
                                    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                    APIs
                                      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                    • String ID:
                                    • API String ID: 3300667738-0
                                    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                    • __swprintf.LIBCMT ref: 0045D4E9
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$InformationVolume__swprintf
                                    • String ID: %lu$\VH
                                    • API String ID: 3164766367-2432546070
                                    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                    APIs
                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: Msctls_Progress32
                                    • API String ID: 3850602802-3636473452
                                    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                    APIs
                                    • _malloc.LIBCMT ref: 0041F707
                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                    • _free.LIBCMT ref: 0041F71A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free_malloc
                                    • String ID: [B
                                    • API String ID: 1020059152-632041663
                                    • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                    • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                    • __calloc_crt.LIBCMT ref: 00413DB0
                                    • __getptd.LIBCMT ref: 00413DBD
                                    • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                    • _free.LIBCMT ref: 00413E07
                                    • __dosmaperr.LIBCMT ref: 00413E12
                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                    • String ID:
                                    • API String ID: 155776804-0
                                    • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                    • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                    • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                    • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                    APIs
                                      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                    • String ID:
                                    • API String ID: 1957940570-0
                                    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                    • ExitThread.KERNEL32 ref: 00413D4E
                                    • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                    • __freefls@4.LIBCMT ref: 00413D74
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                    • String ID:
                                    • API String ID: 259663610-0
                                    • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                    • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                    • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                    • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 004302E6
                                    • GetWindowRect.USER32(00000000,?), ref: 00430316
                                    • GetClientRect.USER32(?,?), ref: 00430364
                                    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                    • GetWindowRect.USER32(?,?), ref: 004303C3
                                    • ScreenToClient.USER32(?,?), ref: 004303EC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                    • String ID:
                                    • API String ID: 3220332590-0
                                    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                    • String ID:
                                    • API String ID: 1612042205-0
                                    • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                    • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove_strncmp
                                    • String ID: >$U$\
                                    • API String ID: 2666721431-237099441
                                    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 0044C570
                                    • SetKeyboardState.USER32(00000080), ref: 0044C594
                                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$InputSend
                                    • String ID:
                                    • API String ID: 2221674350-0
                                    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcscpy$_wcscat
                                    • String ID:
                                    • API String ID: 2037614760-0
                                    • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                    • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                    APIs
                                    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                    • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                    • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                    • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$Copy$AllocClearErrorLastString
                                    • String ID:
                                    • API String ID: 960795272-0
                                    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: File$Delete$Copy__fread_nolock
                                    • String ID:
                                    • API String ID: 2446588422-0
                                    • Opcode ID: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                    • Instruction ID: e3b766f0d7570c057f36e817525b07a345c540c94ec9958bdefdc59333e68e6d
                                    • Opcode Fuzzy Hash: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                    • Instruction Fuzzy Hash: D9517CB26083409BC320DF6AD984AAFB7E8FBD9740F10492FF68983201DA75D548CB56
                                    APIs
                                    • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                    • EndPaint.USER32(?,?), ref: 00447D13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                    • String ID:
                                    • API String ID: 4189319755-0
                                    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                    APIs
                                    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                    • String ID:
                                    • API String ID: 1976402638-0
                                    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                    APIs
                                    • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                    • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                    • ShowWindow.USER32(?,00000000), ref: 00440B18
                                    • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                    • EnableWindow.USER32(?,00000001), ref: 00440B50
                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Show$Enable$MessageSend
                                    • String ID:
                                    • API String ID: 642888154-0
                                    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$Copy$ClearErrorLast
                                    • String ID: NULL Pointer assignment$Not an Object type
                                    • API String ID: 2487901850-572801152
                                    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                    APIs
                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Enable$Show$MessageSend
                                    • String ID:
                                    • API String ID: 1871949834-0
                                    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                    APIs
                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                    • SendMessageW.USER32 ref: 00471AE3
                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                    • String ID:
                                    • API String ID: 3611059338-0
                                    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                    • String ID:
                                    • API String ID: 1640429340-0
                                    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                    APIs
                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                    • _wcslen.LIBCMT ref: 004438CD
                                    • _wcslen.LIBCMT ref: 004438E6
                                    • _wcstok.LIBCMT ref: 004438F8
                                    • _wcslen.LIBCMT ref: 0044390C
                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                    • _wcstok.LIBCMT ref: 00443931
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                    • String ID:
                                    • API String ID: 3632110297-0
                                    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                    • String ID:
                                    • API String ID: 752480666-0
                                    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                    • String ID:
                                    • API String ID: 3275902921-0
                                    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                    • String ID:
                                    • API String ID: 3275902921-0
                                    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                    APIs
                                    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                    • String ID:
                                    • API String ID: 2833360925-0
                                    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                    APIs
                                    • SendMessageW.USER32 ref: 004555C7
                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                    • DeleteObject.GDI32(?), ref: 00455736
                                    • DeleteObject.GDI32(?), ref: 00455744
                                    • DestroyIcon.USER32(?), ref: 00455752
                                    • DestroyWindow.USER32(?), ref: 00455760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                    • String ID:
                                    • API String ID: 3691411573-0
                                    • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                    • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                                    • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                    • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                                    APIs
                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                    • LineTo.GDI32(?,?,?), ref: 004472AC
                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                    • LineTo.GDI32(?,?,?), ref: 004472C6
                                    • EndPath.GDI32(?), ref: 004472D6
                                    • StrokePath.GDI32(?), ref: 004472E4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                    • String ID:
                                    • API String ID: 372113273-0
                                    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                    APIs
                                    • GetDC.USER32(00000000), ref: 0044CC6D
                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CapsDevice$Release
                                    • String ID:
                                    • API String ID: 1035833867-0
                                    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                    APIs
                                    • __getptd.LIBCMT ref: 0041708E
                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                    • __amsg_exit.LIBCMT ref: 004170AE
                                    • __lock.LIBCMT ref: 004170BE
                                    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                    • _free.LIBCMT ref: 004170EE
                                    • InterlockedIncrement.KERNEL32(01762D08), ref: 00417106
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 3470314060-0
                                    • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                    • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                    APIs
                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                    • String ID:
                                    • API String ID: 3495660284-0
                                    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                    APIs
                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Virtual
                                    • String ID:
                                    • API String ID: 4278518827-0
                                    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                    • ExitThread.KERNEL32 ref: 004151ED
                                    • __freefls@4.LIBCMT ref: 00415209
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                    • String ID:
                                    • API String ID: 442100245-0
                                    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                    APIs
                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                    • _wcslen.LIBCMT ref: 0045F94A
                                    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                    • String ID: 0
                                    • API String ID: 621800784-4108050209
                                    • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                    • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • SetErrorMode.KERNEL32 ref: 004781CE
                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                    • SetErrorMode.KERNEL32(?), ref: 00478270
                                    • SetErrorMode.KERNEL32(?), ref: 00478340
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                    • String ID: \VH
                                    • API String ID: 3884216118-234962358
                                    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                    • IsMenu.USER32(?), ref: 0044854D
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                    • DrawMenuBar.USER32 ref: 004485AF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$Item$DrawInfoInsert
                                    • String ID: 0
                                    • API String ID: 3076010158-4108050209
                                    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$_memmove_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 1589278365-1403004172
                                    • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                                    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                    • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                                    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Handle
                                    • String ID: nul
                                    • API String ID: 2519475695-2873401336
                                    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Handle
                                    • String ID: nul
                                    • API String ID: 2519475695-2873401336
                                    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                    APIs
                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                    • _wcsncpy.LIBCMT ref: 00401C41
                                    • _wcscpy.LIBCMT ref: 00401C5D
                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                    • String ID: Line:
                                    • API String ID: 1874344091-1585850449
                                    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: SysAnimate32
                                    • API String ID: 0-1011021900
                                    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                    APIs
                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                    • GetFocus.USER32 ref: 0046157B
                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                    • __swprintf.LIBCMT ref: 00461608
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                    • String ID: %s%d
                                    • API String ID: 2645982514-1110647743
                                    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                    APIs
                                    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                    • String ID:
                                    • API String ID: 3488606520-0
                                    • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                    • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                    APIs
                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ConnectRegistry_memmove_wcslen
                                    • String ID:
                                    • API String ID: 15295421-0
                                    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                    APIs
                                    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID:
                                    • API String ID: 2449869053-0
                                    • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                    • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 004563A6
                                    • ScreenToClient.USER32(?,?), ref: 004563C3
                                    • GetAsyncKeyState.USER32(?), ref: 00456400
                                    • GetAsyncKeyState.USER32(?), ref: 00456410
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                    • String ID:
                                    • API String ID: 3539004672-0
                                    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                    APIs
                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                    • Sleep.KERNEL32(0000000A), ref: 0047D455
                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                    • String ID:
                                    • API String ID: 327565842-0
                                    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                    APIs
                                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: PrivateProfile$SectionWrite$String
                                    • String ID:
                                    • API String ID: 2832842796-0
                                    • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                    • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                    APIs
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Enum$CloseDeleteOpen
                                    • String ID:
                                    • API String ID: 2095303065-0
                                    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00436A24
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: RectWindow
                                    • String ID:
                                    • API String ID: 861336768-0
                                    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                    APIs
                                    • SendMessageW.USER32 ref: 00449598
                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                    • _wcslen.LIBCMT ref: 0044960D
                                    • _wcslen.LIBCMT ref: 0044961A
                                    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$_wcslen$_wcspbrk
                                    • String ID:
                                    • API String ID: 1856069659-0
                                    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 004478E2
                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                    • GetCursorPos.USER32(00000000), ref: 0044796A
                                    • TrackPopupMenuEx.USER32(017663F0,00000000,00000000,?,?,00000000), ref: 00447991
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CursorMenuPopupTrack$Proc
                                    • String ID:
                                    • API String ID: 1300944170-0
                                    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 004479CC
                                    • GetCursorPos.USER32(?), ref: 004479D7
                                    • ScreenToClient.USER32(?,?), ref: 004479F3
                                    • WindowFromPoint.USER32(?,?), ref: 00447A34
                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                    • String ID:
                                    • API String ID: 1822080540-0
                                    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                    • EndPaint.USER32(?,?), ref: 00447D13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                    • String ID:
                                    • API String ID: 659298297-0
                                    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                    APIs
                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                      • Part of subcall function 00440D98: SendMessageW.USER32(01761B90,000000F1,00000000,00000000), ref: 00440E6E
                                      • Part of subcall function 00440D98: SendMessageW.USER32(01761B90,000000F1,00000001,00000000), ref: 00440E9A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$EnableMessageSend$LongShow
                                    • String ID:
                                    • API String ID: 142311417-0
                                    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00445879
                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                    • _wcslen.LIBCMT ref: 004458FB
                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                    • String ID:
                                    • API String ID: 3087257052-0
                                    • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                                    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                    • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                                    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                    APIs
                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                    • String ID:
                                    • API String ID: 245547762-0
                                    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                    APIs
                                    • DeleteObject.GDI32(00000000), ref: 004471D8
                                    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                    • SelectObject.GDI32(?,00000000), ref: 00447228
                                    • BeginPath.GDI32(?), ref: 0044723D
                                    • SelectObject.GDI32(?,00000000), ref: 00447266
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Object$Select$BeginCreateDeletePath
                                    • String ID:
                                    • API String ID: 2338827641-0
                                    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                    APIs
                                    • Sleep.KERNEL32(00000000), ref: 00434598
                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                    • Sleep.KERNEL32(00000000), ref: 004345D4
                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CounterPerformanceQuerySleep
                                    • String ID:
                                    • API String ID: 2875609808-0
                                    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                    • MessageBeep.USER32(00000000), ref: 00460C46
                                    • KillTimer.USER32(?,0000040A), ref: 00460C68
                                    • EndDialog.USER32(?,00000001), ref: 00460C83
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                    • String ID:
                                    • API String ID: 3741023627-0
                                    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                    • String ID:
                                    • API String ID: 4023252218-0
                                    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                    APIs
                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                    • DeleteObject.GDI32(?), ref: 00455736
                                    • DeleteObject.GDI32(?), ref: 00455744
                                    • DestroyIcon.USER32(?), ref: 00455752
                                    • DestroyWindow.USER32(?), ref: 00455760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                    • String ID:
                                    • API String ID: 1489400265-0
                                    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                    APIs
                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                    • DestroyWindow.USER32(?), ref: 00455728
                                    • DeleteObject.GDI32(?), ref: 00455736
                                    • DeleteObject.GDI32(?), ref: 00455744
                                    • DestroyIcon.USER32(?), ref: 00455752
                                    • DestroyWindow.USER32(?), ref: 00455760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                    • String ID:
                                    • API String ID: 1042038666-0
                                    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                    • String ID:
                                    • API String ID: 2625713937-0
                                    • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                    • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                    • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                    • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                    APIs
                                    • __getptd.LIBCMT ref: 0041780F
                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                    • __getptd.LIBCMT ref: 00417826
                                    • __amsg_exit.LIBCMT ref: 00417834
                                    • __lock.LIBCMT ref: 00417844
                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                    • String ID:
                                    • API String ID: 938513278-0
                                    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                    APIs
                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                    • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                    • ExitThread.KERNEL32 ref: 00413D4E
                                    • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                    • __freefls@4.LIBCMT ref: 00413D74
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                    • String ID:
                                    • API String ID: 2403457894-0
                                    • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                    • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                    • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                    • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                    APIs
                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                    • ExitThread.KERNEL32 ref: 004151ED
                                    • __freefls@4.LIBCMT ref: 00415209
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                    • String ID:
                                    • API String ID: 4247068974-0
                                    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )$U$\
                                    • API String ID: 0-3705770531
                                    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                    APIs
                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                    • CoInitialize.OLE32(00000000), ref: 0046E505
                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                    • CoUninitialize.OLE32 ref: 0046E53D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                    • String ID: .lnk
                                    • API String ID: 886957087-24824748
                                    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \
                                    • API String ID: 4104443479-2967466578
                                    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \
                                    • API String ID: 4104443479-2967466578
                                    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \
                                    • API String ID: 4104443479-2967466578
                                    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                    Strings
                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                    • API String ID: 708495834-557222456
                                    • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                    • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                    APIs
                                      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                    • String ID: @
                                    • API String ID: 4150878124-2766056989
                                    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \$]$h
                                    • API String ID: 4104443479-3262404753
                                    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                    APIs
                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                    • CloseHandle.KERNEL32(?), ref: 00457E09
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                    • String ID: <$@
                                    • API String ID: 2417854910-1426351568
                                    • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                    • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                    APIs
                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                    • String ID:
                                    • API String ID: 3705125965-3916222277
                                    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                    APIs
                                    • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$Delete$InfoItem
                                    • String ID: 0
                                    • API String ID: 135850232-4108050209
                                    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                    APIs
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Long
                                    • String ID: SysTreeView32
                                    • API String ID: 847901565-1698111956
                                    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                    APIs
                                    • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                    • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: AU3_GetPluginDetails
                                    • API String ID: 145871493-4132174516
                                    • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                                    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                    • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                                    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                    APIs
                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window
                                    • String ID: SysMonthCal32
                                    • API String ID: 2326795674-1439706946
                                    • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                    • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                    • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                    • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                    APIs
                                    • DestroyWindow.USER32(00000000), ref: 00450A2F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DestroyWindow
                                    • String ID: msctls_updown32
                                    • API String ID: 3375834691-2298589950
                                    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: $<
                                    • API String ID: 4104443479-428540627
                                    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DiskFreeSpace
                                    • String ID: \VH
                                    • API String ID: 1682464887-234962358
                                    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DiskFreeSpace
                                    • String ID: \VH
                                    • API String ID: 1682464887-234962358
                                    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DiskFreeSpace
                                    • String ID: \VH
                                    • API String ID: 1682464887-234962358
                                    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$InformationVolume
                                    • String ID: \VH
                                    • API String ID: 2507767853-234962358
                                    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$InformationVolume
                                    • String ID: \VH
                                    • API String ID: 2507767853-234962358
                                    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                    APIs
                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: msctls_trackbar32
                                    • API String ID: 3850602802-1010561917
                                    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                    • String ID: crts
                                    • API String ID: 943502515-3724388283
                                    • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                                    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                    • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                                    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                    • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorMode$LabelVolume
                                    • String ID: \VH
                                    • API String ID: 2006950084-234962358
                                    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                    APIs
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • GetMenuItemInfoW.USER32 ref: 00449727
                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                    • DrawMenuBar.USER32 ref: 00449761
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Menu$InfoItem$Draw_malloc
                                    • String ID: 0
                                    • API String ID: 772068139-4108050209
                                    • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                                    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                    • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                                    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$_wcscpy
                                    • String ID: 3, 3, 8, 1
                                    • API String ID: 3469035223-357260408
                                    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                    APIs
                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                    • API String ID: 2574300362-3530519716
                                    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                    APIs
                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: ICMP.DLL$IcmpCreateFile
                                    • API String ID: 2574300362-275556492
                                    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                    APIs
                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: ICMP.DLL$IcmpSendEcho
                                    • API String ID: 2574300362-58917771
                                    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                    APIs
                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                    • API String ID: 2574300362-4033151799
                                    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                    • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                    • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                    • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 0047950F
                                    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                    • VariantClear.OLEAUT32(?), ref: 00479650
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$AllocClearCopyInitString
                                    • String ID:
                                    • API String ID: 2808897238-0
                                    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                    APIs
                                    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                    • __itow.LIBCMT ref: 004699CD
                                      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                    • __itow.LIBCMT ref: 00469A97
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$__itow
                                    • String ID:
                                    • API String ID: 3379773720-0
                                    • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                    • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00449A4A
                                    • ScreenToClient.USER32(?,?), ref: 00449A80
                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$ClientMoveRectScreen
                                    • String ID:
                                    • API String ID: 3880355969-0
                                    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                    • String ID:
                                    • API String ID: 2782032738-0
                                    • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                    • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                    APIs
                                    • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                    • GetWindowRect.USER32(?,?), ref: 00441722
                                    • PtInRect.USER32(?,?,?), ref: 00441734
                                    • MessageBeep.USER32(00000000), ref: 004417AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Rect$BeepClientMessageScreenWindow
                                    • String ID:
                                    • API String ID: 1352109105-0
                                    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                    APIs
                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                    • String ID:
                                    • API String ID: 3321077145-0
                                    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                    • __isleadbyte_l.LIBCMT ref: 004208A6
                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                    APIs
                                    • GetParent.USER32(?), ref: 004503C8
                                    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Proc$Parent
                                    • String ID:
                                    • API String ID: 2351499541-0
                                    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                    APIs
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                    • TranslateMessage.USER32(?), ref: 00442B01
                                    • DispatchMessageW.USER32(?), ref: 00442B0B
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Message$Peek$DispatchTranslate
                                    • String ID:
                                    • API String ID: 1795658109-0
                                    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                    APIs
                                    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                    • GetCaretPos.USER32(?), ref: 004743B2
                                    • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                    • GetForegroundWindow.USER32 ref: 004743EE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                    • String ID:
                                    • API String ID: 2759813231-0
                                    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                    APIs
                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                    • _wcslen.LIBCMT ref: 00449519
                                    • _wcslen.LIBCMT ref: 00449526
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend_wcslen$_wcspbrk
                                    • String ID:
                                    • API String ID: 2886238975-0
                                    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __setmode$DebugOutputString_fprintf
                                    • String ID:
                                    • API String ID: 1792727568-0
                                    • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                    • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                    APIs
                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$Long$AttributesLayered
                                    • String ID:
                                    • API String ID: 2169480361-0
                                    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                    APIs
                                      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                    • lstrlenW.KERNEL32(?), ref: 00434CF6
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: lstrcmpilstrcpylstrlen$_malloc
                                    • String ID: cdecl
                                    • API String ID: 3850814276-3896280584
                                    • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                                    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                    • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                                    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                    APIs
                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                    • _memmove.LIBCMT ref: 0046D475
                                    • inet_ntoa.WSOCK32(?), ref: 0046D481
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                    • String ID:
                                    • API String ID: 2502553879-0
                                    • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                    • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                    APIs
                                    • SendMessageW.USER32 ref: 00448C69
                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend$LongWindow
                                    • String ID:
                                    • API String ID: 312131281-0
                                    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                    APIs
                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLastacceptselect
                                    • String ID:
                                    • API String ID: 385091864-0
                                    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                    APIs
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                    • GetStockObject.GDI32(00000011), ref: 00430258
                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Window$CreateMessageObjectSendShowStock
                                    • String ID:
                                    • API String ID: 1358664141-0
                                    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                    • String ID:
                                    • API String ID: 2880819207-0
                                    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00430BA2
                                    • ScreenToClient.USER32(?,?), ref: 00430BC1
                                    • ScreenToClient.USER32(?,?), ref: 00430BE2
                                    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ClientRectScreen$InvalidateWindow
                                    • String ID:
                                    • API String ID: 357397906-0
                                    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                    APIs
                                    • __wsplitpath.LIBCMT ref: 0043392E
                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                    • __wsplitpath.LIBCMT ref: 00433950
                                    • __wcsicoll.LIBCMT ref: 00433974
                                    • __wcsicoll.LIBCMT ref: 0043398A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                    • String ID:
                                    • API String ID: 1187119602-0
                                    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                    • String ID:
                                    • API String ID: 1597257046-0
                                    • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                                    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                    • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                                    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                    • __malloc_crt.LIBCMT ref: 0041F5B6
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: EnvironmentStrings$Free__malloc_crt
                                    • String ID:
                                    • API String ID: 237123855-0
                                    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: DeleteDestroyObject$IconWindow
                                    • String ID:
                                    • API String ID: 3349847261-0
                                    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                    • String ID:
                                    • API String ID: 2223660684-0
                                    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                    APIs
                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                    • LineTo.GDI32(?,?,?), ref: 00447326
                                    • EndPath.GDI32(?), ref: 00447336
                                    • StrokePath.GDI32(?), ref: 00447344
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                    • String ID:
                                    • API String ID: 2783949968-0
                                    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                    APIs
                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                    • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                    • AttachThreadInput.USER32(00000000), ref: 004364AA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                    • String ID:
                                    • API String ID: 2710830443-0
                                    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                    • String ID:
                                    • API String ID: 146765662-0
                                    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 00472B63
                                    • GetDC.USER32(00000000), ref: 00472B6C
                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                    • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 00472BB2
                                    • GetDC.USER32(00000000), ref: 00472BBB
                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                    APIs
                                    • __getptd_noexit.LIBCMT ref: 00415150
                                      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                    • __freeptd.LIBCMT ref: 0041516B
                                    • ExitThread.KERNEL32 ref: 00415173
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                    • String ID:
                                    • API String ID: 1454798553-0
                                    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _strncmp
                                    • String ID: Q\E
                                    • API String ID: 909875538-2189900498
                                    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                    APIs
                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                    • String ID: AutoIt3GUI$Container
                                    • API String ID: 2652923123-3941886329
                                    • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                    • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove_strncmp
                                    • String ID: U$\
                                    • API String ID: 2666721431-100911408
                                    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                    APIs
                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                    • __wcsnicmp.LIBCMT ref: 00467288
                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                    • String ID: LPT
                                    • API String ID: 3035604524-1350329615
                                    • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                    • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \$h
                                    • API String ID: 4104443479-677774858
                                    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memcmp
                                    • String ID: &
                                    • API String ID: 2931989736-1010288
                                    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: \
                                    • API String ID: 4104443479-2967466578
                                    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                    APIs
                                    • _wcslen.LIBCMT ref: 00466825
                                    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CrackInternet_wcslen
                                    • String ID: |
                                    • API String ID: 596671847-2343686810
                                    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                    APIs
                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: '
                                    • API String ID: 3850602802-1997036262
                                    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                    APIs
                                    • _strlen.LIBCMT ref: 0040F858
                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                    • _sprintf.LIBCMT ref: 0040F9AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove$_sprintf_strlen
                                    • String ID: %02X
                                    • API String ID: 1921645428-436463671
                                    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                    APIs
                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: Combobox
                                    • API String ID: 3850602802-2096851135
                                    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                    APIs
                                    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: LengthMessageSendTextWindow
                                    • String ID: edit
                                    • API String ID: 2978978980-2167791130
                                    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                    APIs
                                    • Sleep.KERNEL32(00000000), ref: 00476CB0
                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: GlobalMemorySleepStatus
                                    • String ID: @
                                    • API String ID: 2783356886-2766056989
                                    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: htonsinet_addr
                                    • String ID: 255.255.255.255
                                    • API String ID: 3832099526-2422070025
                                    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                    APIs
                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: InternetOpen
                                    • String ID: <local>
                                    • API String ID: 2038078732-4266983199
                                    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: __fread_nolock_memmove
                                    • String ID: EA06
                                    • API String ID: 1988441806-3962188686
                                    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _memmove
                                    • String ID: u,D
                                    • API String ID: 4104443479-3858472334
                                    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                    APIs
                                    • _wcslen.LIBCMT ref: 00401B11
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • _memmove.LIBCMT ref: 00401B57
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                    • String ID: @EXITCODE
                                    • API String ID: 2734553683-3436989551
                                    • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                    • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                    APIs
                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                    • wsprintfW.USER32 ref: 0045612A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: MessageSend_mallocwsprintf
                                    • String ID: %d/%02d/%02d
                                    • API String ID: 1262938277-328681919
                                    • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                    • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                    APIs
                                    • InternetCloseHandle.WININET(?), ref: 00442663
                                    • InternetCloseHandle.WININET ref: 00442668
                                      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: CloseHandleInternet$ObjectSingleWait
                                    • String ID: aeB
                                    • API String ID: 857135153-906807131
                                    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: _wcsncpy
                                    • String ID: ^B$C:\Users\user\Desktop\PO#150003191.exe
                                    • API String ID: 1735881322-1202725926
                                    • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                    • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                    • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                    • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                    APIs
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                    • PostMessageW.USER32(00000000), ref: 00441C05
                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FindMessagePostSleepWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 529655941-2988720461
                                    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                    APIs
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: FindMessagePostSleepWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 529655941-2988720461
                                    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                    APIs
                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2057468275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2057455472.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057565200.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057582668.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057597786.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057611123.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2057650704.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PO#150003191.jbxd
                                    Similarity
                                    • API ID: Message_doexit
                                    • String ID: AutoIt$Error allocating memory.
                                    • API String ID: 1993061046-4017498283
                                    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D