Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eddzD2MA12.exe

Overview

General Information

Sample name:eddzD2MA12.exe
renamed because original name is a hash value
Original sample name:1bc68d708e953bf10bbf6744a6b91b28.exe
Analysis ID:1559926
MD5:1bc68d708e953bf10bbf6744a6b91b28
SHA1:a6938a273e7a82cf4909ca40d224a6430f6a2860
SHA256:9c46859695bed9bd827e2292e634c39e2982f40d9be6b170d185ae154a1a6a5f
Tags:exeuser-abuse_ch
Infos:

Detection

Stealc, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Copy From or To System Directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • eddzD2MA12.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\eddzD2MA12.exe" MD5: 1BC68D708E953BF10BBF6744A6B91B28)
    • cmd.exe (PID: 7340 cmdline: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7408 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7424 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7452 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7460 cmdline: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7520 cmdline: cmd /c md 436117 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 7536 cmdline: findstr /V "NuclearRemarksReliabilityComputation" Young MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7552 cmdline: cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Mother.pif (PID: 7568 cmdline: Mother.pif v MD5: 18CE19B57F43CE0A5AF149C96AECC685)
      • choice.exe (PID: 7584 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": ["https://steamcommunity.com/profiles/76561199800374635", "https://t.me/gos90t"], "Botnet": "583ba11aa826bd4d97a3a14cb18c8fac"}
SourceRuleDescriptionAuthorStrings
0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
          0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 35 entries
            SourceRuleDescriptionAuthorStrings
            10.2.Mother.pif.120f980.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              10.2.Mother.pif.120f980.1.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                10.2.Mother.pif.120f980.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  10.2.Mother.pif.120f980.1.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                    10.2.Mother.pif.120f980.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                      Click to see the 4 entries
                      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Mother.pif v, CommandLine: Mother.pif v, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\436117\Mother.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\436117\Mother.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\436117\Mother.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7340, ParentProcessName: cmd.exe, ProcessCommandLine: Mother.pif v, ProcessId: 7568, ProcessName: Mother.pif
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\eddzD2MA12.exe", ParentImage: C:\Users\user\Desktop\eddzD2MA12.exe, ParentProcessId: 7292, ParentProcessName: eddzD2MA12.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat, ProcessId: 7340, ProcessName: cmd.exe

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7340, ParentProcessName: cmd.exe, ProcessCommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , ProcessId: 7460, ProcessName: findstr.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199800374635", "https://t.me/gos90t"], "Botnet": "583ba11aa826bd4d97a3a14cb18c8fac"}
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifVirustotal: Detection: 10%Perma Link
                      Source: eddzD2MA12.exeReversingLabs: Detection: 31%
                      Source: eddzD2MA12.exeVirustotal: Detection: 15%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.4% probability
                      Source: eddzD2MA12.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49883 version: TLS 1.2
                      Source: eddzD2MA12.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_001C4005
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_001CC2FF
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_001C494A
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CCD14 FindFirstFileW,FindClose,10_2_001CCD14
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_001CCD9F
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_001CF5D8
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_001CF735
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_001CFA36
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_001C3CE2
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\436117Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\436117\Jump to behavior

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199800374635
                      Source: Malware configuration extractorURLs: https://t.me/gos90t
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_001D29BA
                      Source: global trafficDNS traffic detected: DNS query: EMlHLrRfRkqrlGndWg.EMlHLrRfRkqrlGndWg
                      Source: global trafficDNS traffic detected: DNS query: t.me
                      Source: eddzD2MA12.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: eddzD2MA12.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: eddzD2MA12.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: eddzD2MA12.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
                      Source: eddzD2MA12.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: eddzD2MA12.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: eddzD2MA12.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: eddzD2MA12.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: eddzD2MA12.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: eddzD2MA12.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: eddzD2MA12.exeString found in binary or memory: http://ocsp.digicert.com0
                      Source: eddzD2MA12.exeString found in binary or memory: http://ocsp.digicert.com0A
                      Source: eddzD2MA12.exeString found in binary or memory: http://ocsp.digicert.com0C
                      Source: eddzD2MA12.exeString found in binary or memory: http://ocsp.digicert.com0X
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
                      Source: eddzD2MA12.exeString found in binary or memory: http://www.digicert.com/CPS0
                      Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199800374635
                      Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199800374635do88eqMozilla/5.0
                      Source: Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                      Source: Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/1
                      Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928444243.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/gos90t
                      Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/gos90t213
                      Source: Mother.pif, 0000000A.00000002.2928444243.0000000000EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/gos90tD
                      Source: Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/gos90tdo88eqsqlo.dllMozilla/5.0
                      Source: Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/r
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                      Source: Mother.pif.1.drString found in binary or memory: https://www.globalsign.com/repository/0
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drString found in binary or memory: https://www.globalsign.com/repository/06
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49883 version: TLS 1.2
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_001D4830
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_001D4632
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001ED164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_001ED164
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00180E38 CloseHandle,NtProtectVirtualMemory,10_2_00180E38
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C4254: CreateFileW,DeviceIoControl,CloseHandle,10_2_001C4254
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_001B8F2E
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_00403883
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_001C5778
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeFile created: C:\Windows\DirectiveTommyJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_0040497C0_2_0040497C
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00406ED20_2_00406ED2
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004074BB0_2_004074BB
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0016B02010_2_0016B020
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001694E010_2_001694E0
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00169C8010_2_00169C80
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001823F510_2_001823F5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001E840010_2_001E8400
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0019650210_2_00196502
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0019265E10_2_0019265E
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0016E6F010_2_0016E6F0
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018282A10_2_0018282A
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001989BF10_2_001989BF
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001E0A3A10_2_001E0A3A
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00196A7410_2_00196A74
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00170BE010_2_00170BE0
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018CD5110_2_0018CD51
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001BEDB210_2_001BEDB2
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C8E4410_2_001C8E44
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001E0EB710_2_001E0EB7
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00196FE610_2_00196FE6
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001833B710_2_001833B7
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018F40910_2_0018F409
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0017D45D10_2_0017D45D
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0017F62810_2_0017F628
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0016166310_2_00161663
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001816B410_2_001816B4
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0016F6A010_2_0016F6A0
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001878C310_2_001878C3
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00181BA810_2_00181BA8
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018DBA510_2_0018DBA5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00199CE510_2_00199CE5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0017DD2810_2_0017DD28
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018BFD610_2_0018BFD6
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00181FC010_2_00181FC0
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\436117\Mother.pif D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: String function: 00171A36 appears 34 times
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: String function: 00188B30 appears 42 times
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: String function: 00180D17 appears 70 times
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: String function: 004062A3 appears 58 times
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs eddzD2MA12.exe
                      Source: eddzD2MA12.exe, 00000000.00000003.1744427736.00000000007A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs eddzD2MA12.exe
                      Source: eddzD2MA12.exe, 00000000.00000002.1745172242.00000000007A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs eddzD2MA12.exe
                      Source: eddzD2MA12.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/14@2/1
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CA6AD GetLastError,FormatMessageW,10_2_001CA6AD
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B8DE9 AdjustTokenPrivileges,CloseHandle,10_2_001B8DE9
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_001B9399
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_001C4148
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,10_2_001C443D
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7348:120:WilError_03
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeFile created: C:\Users\user\AppData\Local\Temp\nsb7CB5.tmpJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat
                      Source: eddzD2MA12.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: eddzD2MA12.exeReversingLabs: Detection: 31%
                      Source: eddzD2MA12.exeVirustotal: Detection: 15%
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeFile read: C:\Users\user\Desktop\eddzD2MA12.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\eddzD2MA12.exe "C:\Users\user\Desktop\eddzD2MA12.exe"
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif v
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.batJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol vJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif vJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: shfolder.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: napinsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: wshbth.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: winrnr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: eddzD2MA12.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00188B75 push ecx; ret 10_2_00188B88

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\436117\Mother.pifJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\436117\Mother.pifJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001E59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_001E59B3
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00175EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00175EDA
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001833B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_001833B7
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INMPM20IXQUGN9:-?5(\C!7%{->^WALLET_PATHSOFTWARE\MONERO-PROJECT\MONERO-CORE.KEYS\MONERO\WALLET.KEYS\\\*.*\\...\\\\\\\\\\\\HAL9THJOHNDOEDISPLAYAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL03:00:4503:00:4503:00:4503:00:4503:00:4503:00:45DELAYS.TMP%S%SNTDLL.DLL
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_10-100756
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifAPI coverage: 4.1 %
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_001C4005
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_001CC2FF
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_001C494A
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CCD14 FindFirstFileW,FindClose,10_2_001CCD14
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_001CCD9F
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_001CF5D8
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_001CF735
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_001CFA36
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_001C3CE2
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00175D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00175D13
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\436117Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\436117\Jump to behavior
                      Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwarey
                      Source: Mother.pif, 0000000A.00000002.2928983225.00000000013F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D45D5 BlockInput,10_2_001D45D5
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00175240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00175240
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00195CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00195CAC
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_001B88CD
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018A354 SetUnhandledExceptionFilter,10_2_0018A354
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0018A385

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B9369 LogonUserW,10_2_001B9369
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_00175240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00175240
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C1AC6 SendInput,keybd_event,10_2_001C1AC6
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C51E2 mouse_event,10_2_001C51E2
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.batJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 436117Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "NuclearRemarksReliabilityComputation" Young Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol vJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\436117\Mother.pif Mother.pif vJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001B88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_001B88CD
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001C4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_001C4F1C
                      Source: eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmp, Purchased.0.dr, Mother.pif.1.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                      Source: Mother.pifBinary or memory string: Shell_TrayWnd
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0018885B cpuid 10_2_0018885B
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001A0030 GetLocalTime,__swprintf,10_2_001A0030
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001A0722 GetUserNameW,10_2_001A0722
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_0019416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_0019416A
                      Source: C:\Users\user\Desktop\eddzD2MA12.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: Mother.pifBinary or memory string: WIN_81
                      Source: Mother.pifBinary or memory string: WIN_XP
                      Source: Mother.pifBinary or memory string: WIN_XPe
                      Source: Mother.pifBinary or memory string: WIN_VISTA
                      Source: Mother.pifBinary or memory string: WIN_7
                      Source: Mother.pifBinary or memory string: WIN_8
                      Source: Mother.pif.1.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.120f980.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.Mother.pif.4220000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Mother.pif PID: 7568, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_001D696E
                      Source: C:\Users\user\AppData\Local\Temp\436117\Mother.pifCode function: 10_2_001D6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_001D6E32
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      2
                      Valid Accounts
                      1
                      Windows Management Instrumentation
                      1
                      Scripting
                      1
                      Exploitation for Privilege Escalation
                      1
                      Disable or Modify Tools
                      21
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts2
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop Protocol21
                      Input Capture
                      12
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt2
                      Valid Accounts
                      2
                      Valid Accounts
                      2
                      Obfuscated Files or Information
                      Security Account Manager3
                      File and Directory Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      NTDS16
                      System Information Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                      Process Injection
                      11
                      Masquerading
                      LSA Secrets231
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Valid Accounts
                      Cached Domain Credentials4
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                      Access Token Manipulation
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                      Process Injection
                      Proc Filesystem1
                      System Owner/User Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559926 Sample: eddzD2MA12.exe Startdate: 21/11/2024 Architecture: WINDOWS Score: 100 26 t.me 2->26 28 EMlHLrRfRkqrlGndWg.EMlHLrRfRkqrlGndWg 2->28 32 Found malware configuration 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Stealc 2->36 38 6 other signatures 2->38 8 eddzD2MA12.exe 19 2->8         started        signatures3 process4 process5 10 cmd.exe 3 8->10         started        file6 24 C:\Users\user\AppData\Local\...\Mother.pif, PE32 10->24 dropped 40 Drops PE files with a suspicious file extension 10->40 14 Mother.pif 143 10->14         started        18 cmd.exe 2 10->18         started        20 conhost.exe 10->20         started        22 7 other processes 10->22 signatures7 process8 dnsIp9 30 t.me 149.154.167.99, 443, 49883 TELEGRAMRU United Kingdom 14->30 42 Multi AV Scanner detection for dropped file 14->42 44 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->44 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      eddzD2MA12.exe32%ReversingLabsWin32.Trojan.Generic
                      eddzD2MA12.exe16%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\436117\Mother.pif5%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\436117\Mother.pif11%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      t.me
                      149.154.167.99
                      truefalse
                        high
                        EMlHLrRfRkqrlGndWg.EMlHLrRfRkqrlGndWg
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://steamcommunity.com/profiles/76561199800374635false
                            high
                            https://t.me/gos90tfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.autoitscript.com/autoit3/JeddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmp, Purchased.0.dr, Mother.pif.1.drfalse
                                high
                                https://t.me/Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://t.me/gos90tDMother.pif, 0000000A.00000002.2928444243.0000000000EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://nsis.sf.net/NSIS_ErrorErroreddzD2MA12.exefalse
                                      high
                                      https://t.me/gos90t213Mother.pif, 0000000A.00000002.2928795702.0000000001254000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://steamcommunity.com/profiles/76561199800374635do88eqMozilla/5.0Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.autoitscript.com/autoit3/eddzD2MA12.exe, 00000000.00000003.1691283902.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, eddzD2MA12.exe, 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Purchased.0.dr, Mother.pif.1.drfalse
                                            high
                                            https://t.me/gos90tdo88eqsqlo.dllMozilla/5.0Mother.pif, 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Mother.pif, 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://t.me/rMother.pif, 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://t.me/1Mother.pif, 0000000A.00000002.2928795702.00000000011A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  149.154.167.99
                                                  t.meUnited Kingdom
                                                  62041TELEGRAMRUfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1559926
                                                  Start date and time:2024-11-21 07:15:05 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 7m 30s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:16
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:eddzD2MA12.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:1bc68d708e953bf10bbf6744a6b91b28.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@22/14@2/1
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:
                                                  • Successful, ratio: 100%
                                                  • Number of executed functions: 94
                                                  • Number of non-executed functions: 300
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                                  TimeTypeDescription
                                                  01:16:03API Interceptor2224x Sleep call for process: Mother.pif modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  149.154.167.99http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                                                  • telegram.org/img/favicon.ico
                                                  http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/
                                                  http://cache.netflix.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/dl?tme=fe3233c08ff79d4814_5062105595184761217
                                                  http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/
                                                  http://bekaaviator.kz/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/
                                                  http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/?setln=pl
                                                  http://makkko.kz/Get hashmaliciousUnknownBrowse
                                                  • telegram.org/
                                                  http://telegram.dogGet hashmaliciousUnknownBrowse
                                                  • telegram.dog/
                                                  LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                                                  • t.me/cinoshibot
                                                  jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                                  • t.me/cinoshibot
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  t.mehttps://usapress.info/inside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years/Get hashmaliciousUnknownBrowse
                                                  • 46.105.201.240
                                                  https://l.facebook.com/l.php?u=https%3A%2F%2Fusapress.info%2Finside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0r3IVxCUPtQPPqP5Ce0_adoAsiHgG3Oy1cYDq3k1JXBIrTGLtjToxlazM_aem_q02YsKkKY0QB_fm5suzUDw&h=AT1Xo_CkNlagO29_sds-m5zdTBZ6-H70m0J__7wjjmSNinwNGqBfRUFK3cH2zXJWNO7msrJPRkNulrkTmUCLkRNMcfCJTNK-cs4SfUQyRy7nw3vP1DNmFisBvlttaen8fHfi-N3lXN_BGQgdBw&__tn__=R%5D-R&c%5B0%5D=AT3euz91upHKeMVK8p24ktUFKClJ0GKt_3lJnV9tGakx0Tro3u7Ymk1z4tOG4eBZxcuD-Ny10eAla4iUyfdG04Fh4GryHwAMuELGG4dQctfWKiu4mfB-eLJ8Qktnq0ptzD_TaZEPEMHQnvP4W65jDpc-XBmWlMSmaRM-2soPhaPGYAODWegqP8h47S90Q2hmwQvQgUDdb35OgV1duzzqudMAyOk7e8E7mfpnrlwhIvWwUkK53AUNuPTqYkQGet hashmaliciousUnknownBrowse
                                                  • 46.105.201.240
                                                  Unlock_Tool_v2.6.5.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 149.154.167.99
                                                  S0FTWARE.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 149.154.167.99
                                                  SOfQumBuFd.exeGet hashmaliciousBinder HackTool, Stealc, VidarBrowse
                                                  • 149.154.167.99
                                                  https://page-speed-2950.my.salesforce-sites.com/supportGet hashmaliciousUnknownBrowse
                                                  • 104.26.6.129
                                                  https://saas-agility-1324.my.salesforce-sites.com/supportGet hashmaliciousUnknownBrowse
                                                  • 104.26.7.129
                                                  FW Important Exploit Has Been Identified In Your Account Steps to Resolve.msgGet hashmaliciousUnknownBrowse
                                                  • 104.26.7.129
                                                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                                  • 188.114.96.3
                                                  AcroCEF.exeGet hashmaliciousStealc, VidarBrowse
                                                  • 149.154.167.99
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  TELEGRAMRUDocuments.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 149.154.167.220
                                                  DEVIS_VALIDE.jsGet hashmaliciousXWormBrowse
                                                  • 149.154.167.220
                                                  PayeeAdvice_HK54912_R0038704_37504.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 149.154.167.220
                                                  GST DRC-01A - DIN-20230359XL050081843E_msg.exeGet hashmaliciousGuLoaderBrowse
                                                  • 149.154.167.220
                                                  Quote document and order list.exeGet hashmaliciousGuLoaderBrowse
                                                  • 149.154.167.220
                                                  new order #738833.exeGet hashmaliciousGuLoaderBrowse
                                                  • 149.154.167.220
                                                  FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 149.154.167.220
                                                  114117914 - Rebound Electronics.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 149.154.167.220
                                                  #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 149.154.167.220
                                                  BOQ and Full Specification.exeGet hashmaliciousGuLoaderBrowse
                                                  • 149.154.167.220
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  37f463bf4616ecd445d4a1937da06e19HnJdZm51Xl.exeGet hashmaliciousAmadey, Clipboard HijackerBrowse
                                                  • 149.154.167.99
                                                  YyA4O1TBSW.dllGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  zlibwapi.dll.dllGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  YyA4O1TBSW.dllGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  zlibwapi.dll.dllGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  REQUEST SCHL-30112023-M1 Quotation_1033855_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                  • 149.154.167.99
                                                  STAFF RECORD_pdf.arj.exeGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  LxvS6uMf0g.exeGet hashmaliciousAcrid StealerBrowse
                                                  • 149.154.167.99
                                                  LxvS6uMf0g.exeGet hashmaliciousUnknownBrowse
                                                  • 149.154.167.99
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Users\user\AppData\Local\Temp\436117\Mother.piffile.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                    file.exeGet hashmaliciousXWormBrowse
                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                                                          ohDGVKFUNe.exeGet hashmaliciousUnknownBrowse
                                                            dX0P4SX3vv.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                              invoice_template.pdf.lnkGet hashmaliciousSmokeLoaderBrowse
                                                                KfoiTvEwmD.exeGet hashmaliciousLummaC StealerBrowse
                                                                  invoice_template.pdf.lnkGet hashmaliciousSmokeLoaderBrowse
                                                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:modified
                                                                      Size (bytes):893608
                                                                      Entropy (8bit):6.62028134425878
                                                                      Encrypted:false
                                                                      SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                                      MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                                      SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                                      SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                                      SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                                      • Antivirus: Virustotal, Detection: 11%, Browse
                                                                      Joe Sandbox View:
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: ohDGVKFUNe.exe, Detection: malicious, Browse
                                                                      • Filename: dX0P4SX3vv.exe, Detection: malicious, Browse
                                                                      • Filename: invoice_template.pdf.lnk, Detection: malicious, Browse
                                                                      • Filename: KfoiTvEwmD.exe, Detection: malicious, Browse
                                                                      • Filename: invoice_template.pdf.lnk, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):445985
                                                                      Entropy (8bit):7.999553135122847
                                                                      Encrypted:true
                                                                      SSDEEP:12288:9aaVTTa5fGCVppcVcUYDbGiymi2d1Ftq4O:tTTifGCFcY6LmicrJO
                                                                      MD5:7DF1DBCDF8A4E466D1DE8C37E037A3B6
                                                                      SHA1:48B543C6E57EAEB31182D8156A4E1B4A10C63626
                                                                      SHA-256:FA5DF192AD32BF8D2894A42A3D4DA71D8095B815A0AE35CD1C96274540741216
                                                                      SHA-512:0C51DBBB2DC4CAD2A0008854F98D335505FAC2D432349F3F0A7B43025B7A6388FCB0B26B088993D814F89405598B507A109FD77D2AC432E9DA805727F4A73315
                                                                      Malicious:false
                                                                      Preview:..O-.d.we..=...=.......U......&......D>S./c.6E2(O....efoq..[)......5..VC..&.=..S..p.c.SlKx.....9..a.a.]g#i@.3.@d...{..e.0..."..fCn.......+.D.?",Q._[.:..w..yFT....r-......9i..}.8f..3.....Qb..|w1m.....I......u.....|.....Nb.s.*.}.R./%.3...1Ae-....2g.....`....$.f...I.....1 ....[..UO..*..A..m.... $%..."C....[.hlh.z....vb5...KY..yB.S.,.a....D..}.xw.[Tr`o.(.}.....&..`M.Ph.\.....;u...\.A..........hT*......P....A>.8?#.7/...H..8.eO...)HGW...2.J..5..D5.pAn.....K..k~....r..R`.;mb.5 ..e~..z......-.9.f..y....*.~^UF.*s....1~..e.Zj2m.i..Y........W.x....3.R.\K...]..a|.Zi;...y8v.....`..yw.c.X.[..i.J.b\.^9......;(k...~...=((|....m*RRbt.....ss.......`... ..z..Q.....L:..i......e....(yZ.SAc..F.|.sQ....VO.Z..aV........T.s..,.cS_f.V..h[pM.1.....[..v........)...uaV.Q:.t._`.4.....s..p.....#....{....B..o9......X..*...E.^..<]....i#..1.(6.....I.+~.X...ras@d3....9i...P.....g.jq1.-.h.~T...C.Z.E....9U..I..%......`~"r..<70..V.`G..7...kX.Y..0.H3.z...O..._.}c..
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):54272
                                                                      Entropy (8bit):7.996466576826274
                                                                      Encrypted:true
                                                                      SSDEEP:1536:DNCQZDfS0TBhXTCJQa+sUAMMlP7/kWJIOF7WtyS3CK:e02qQ/Pu4qj3H
                                                                      MD5:C5573F90C6D3ACDF359D137009ECF238
                                                                      SHA1:735942B7B1048344942109F71C200BC6E0291C52
                                                                      SHA-256:E51F1F69861837446D756F6CB863C4A8B6B1CF4D89B604A02CAE79BD05230E23
                                                                      SHA-512:5A971247F0AE4A37568B2EE8C84F32AE62A443B323FC0E63D422861575C52C9134870FF1BA4E73937ACE29FDA2BFD656B2D84FE88F89A22C7311A265DF0344B2
                                                                      Malicious:false
                                                                      Preview:.. .O.:~....#%..E.$...[w.-....m...U4....PX....h.|n.xq.......k.4..a.Z...P..b...a..(..q.lj=.yp........MK..v.G..,J...+..h...$iz8...=...v$[|.:.."J..o..."....X8..e.._.vR.d..i5.R.K.*G*.7..p.|...09>-...Q.R......!Q.e....+U...e.q<H..]k1..tH.-..0...9.L.~.).....O;.r.`...6H.....CQ. <.v......W....|....:c.....X.'CQv.g.......lKv^..c.....k5..-.mrD...I..l....~.,.@..#../%(.Z...}.0.^b...........+...+y...$.UC... ..GD^*..y.7.Z...l...$.>.......4.:..[.P..MKX`4......6.!...6....R ...Fa[0Y.;....."......;3..w.e.j)e.L.0B.?...'.c..+.N.YT..U.}.sl.O....[.Gb../%uc.<.>.R:.}.....o.g'V..~.r...v.NN.t.].<...........'.........@..`V.I..M...-..}!....K....\xY.2..g.._..Yg.;~.a.XY.G9.+......).....nR.:1.....,.!...mzL.ox......\</I.d.._B.n......r......NO.?..)....\....~.i.h..u.t..).b..}w.(.pX..<.pkC.4,<}T..l...F..%....RH.2....)....H...4....e..A..~...?....:...J.......4.;...2.Yj.uS..yi+..1...n.%..|{....%5K.S}Kx...........Q+\^..1..l.=Cw.?...T......=}l..6.*..4..*.m...O.....
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):100352
                                                                      Entropy (8bit):7.998412135835442
                                                                      Encrypted:true
                                                                      SSDEEP:3072:47T+hZtp9BKhvJpUE5gx5ZmWucopj19oiKr057F:k+ZVcUESDuDpj1Giy0ZF
                                                                      MD5:A97BE012E03C4ADB9383B78B56857E04
                                                                      SHA1:804675871B186B4608746B41181D9C8035E8DAF2
                                                                      SHA-256:76E970842B79B21169B2C2A4A78467B686B56828072A863201EC0B00ED5D8367
                                                                      SHA-512:3DA11EC6F76B47FC625F98E66828CFED1A5D429508A08C57A2207298CF8D39351FA0E257CAE54ED4B92E27A6C8D3592BE2304B8393B5A18A38D0B8648F0F2903
                                                                      Malicious:false
                                                                      Preview:.....I. ..#6,....7B..Q..@....y....e.....N.......p.bKQ.C......Hk....v..*{......w.QG.Oy\.(.....1..D...]..9{.y..`&...B..-fY.{...I......1OI....c....|..Gr.R...W......R$..........g..Q..`M7c......f.\..)8...l...|-c.$.Ra'.....5....9...{..@.G.L.P.....y..a.K.9.w...g..'.`.F+.xY..\.{.}.7.W.........>$.?....GM.p.U..:`..\7...{...i.....Azu|... ..o..=...P..p7R..(WS.*.Rh;>..h. ..o.^...P..........cwx.,RA..].o_A..$b...10....!.......),...m......?[m.B;?K..|w.....*%.Of.1K...1.y.Z....V..4L.._.=.n.cho...Z........#..TU...U]^3..m....<Ysb5.U....'.1R.(....,Vyi....GyX..].aG... .*..g..]...Q..U.iFH..@.@V..Mm...B3..[...b..n.g.......&.!,o=..^g.I.t.a.G.5N.......\.c........X..z.S.r..(...X.TF.5.%.......`.o.QJ...Q.U.6._.N<......W.X.t.6...re:.....hCy#...s.'K..&f.n..d..J.#....q.6+...k..`7.}VR:..9...:(...+N....g'.FIvJ...OT..}T.u=4...<..Y.a..t...\..@h.0.q.....4...w).T$e..E.}3..6..L....z..E.E..0m\..C....jk#..8...*..!.E.B...i.....Roc..:.}.1...o. ...h....3..`.9......|XiD...
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):77824
                                                                      Entropy (8bit):7.997381347592521
                                                                      Encrypted:true
                                                                      SSDEEP:1536:AQdgtq99TD+B2/EFCk7EpOWe230L2qv0Z2BOn7+hJa:Dt99T1KCGEL9gvsZWu7H
                                                                      MD5:67AD7FCD7D2CC18081670270833FAF90
                                                                      SHA1:AD6286A0AD9B8E97C74AEE1157FA2E3784FE6F51
                                                                      SHA-256:18D43ED8EB3F314AF1E3D7A910686AA9866B0991AF1FC68291C4E96B69AD3128
                                                                      SHA-512:B5BD93D90798435721CB24A4758CE251377E338B53AD387BBBCCBCE0ECFC413F9612D0BF749851BE72DE15C3D093EA13C2BBB5347CE67973CCB999DA11C89272
                                                                      Malicious:false
                                                                      Preview:......`<.M0./nm.....3../P\...q.o.&9....r..z.....OF.Ymlal...".Vv.." p.w[{.#.ac....]Z...j..].t.......<b|}.z.....$_....6#iL.4.!h...?.....-.N;%.cU.,..M..#.......e*.@...e...g.i.-..{...u...d.2.......VWOOEG?.&....P.Q..........14...O..i.]..n..w.M.s....I.wr.q.\.r._.@.X..'\A..v.........5.P@Q....*....Em..=..%..bo..>53....)...S_......W^P.-..j]......B4.y../.....(?!4o....F..BnG........j..|.W<d.....mH`.....9Z>[>....w7.,.......j..?_..Qv..A....+...^...\....K.....mf..$.N<C..7.u..`8c%~..l...E.d....p>M..%.~.E.N......]....9...d.GH..J.XJ..++.D.yd.0.0..`.w.xO/..9.+..%.Q0..!XO9...%...Q|...?I..>Q.3x.Ld.l..z<~.rD....a>d.......BB......mh..d....9..I....`.p....V2\...1.D,-q}..q....{@@....>...G..<..`...x.AQ.^........3..(..qWz>K#..(...)\.\A6.}.!..qH....+K.g..._...7x...u..@3U.Y.6..Wi.....Rk.{.ma:^.4.h..2^......v..5......Xm....<".Rsv..#g....'...1Z.Q.d.r.o*.......#.G.o.G....ll:C...M.PS[",.6..O..."f.d..2'...(.#|...SV.9T.y T......rc..s......3fs #....$..0...t...vA..6.2ma.S
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):55296
                                                                      Entropy (8bit):7.996612473291405
                                                                      Encrypted:true
                                                                      SSDEEP:1536:AlWpehUdc2LAnaKrBqRCCIPtgPCaFHLip/MA:AEZdc2+aKNN18dFH+CA
                                                                      MD5:A416958F4CE3467BC4A4885C89650C63
                                                                      SHA1:D47A69CBA5A83FA4DED5FE6E1243FFDEF62768E2
                                                                      SHA-256:76B3187698AC2A4BEC709E28D0FF790955BCF2298174844070342F0B9E13409B
                                                                      SHA-512:5A4205384F8EC6F8DB8FCAFD521B04CC6370960E5951E03FC87CB7B25FA79E58F828A0B7BC623EE3ADAF19858C9B7CD82C385EC3EEC2BD1D9C0FD26DDBDA7845
                                                                      Malicious:false
                                                                      Preview:..p....i\.T.wAo.....)k"...z.p...@.W..7}.h.G.ZHx..<'...L.TN...S7..(b;M..S9..[...l.....0\.@|.....e......r.Oz...A. ...!....}.vd.Ja.rvp..SZ.7B.d..].'......[1.`.h..V...?.BG.jO.5.T......1..W..T;.o.KX'..O&.Z'...(.<(;..g..^-.I_*.6_..$.?.(.m.;]f#H.....h.....e..a.......y.:..n...P^.lrJ(......r.u........g.K....v......t..[.....\......-.i....;&@.%.`..J8dyi...0.c..b....-%...P}......H.{...xIJ2........$............."..#...c.y .......x..E4y.&.>.hi.."...).QR5\...o.<....4...s..&.0.Hk..t.....M.NL.......L.e....=^.{.G".p..,.h.$K..:.K........pt....Na.....8`.....Q..E.:i.L.. m.`y.?.H3.u..P.......\..8..iA..q[.s.uF...x..[...!......e.=......2i..?...,.I.)m.-eR.\3.r~?...g..).eu...'...$.shs....v0w.+.w..d{(M../.."7.=....,.Y\..t.``.'-_{.zV......-.%L.D.o....k.B.9h....m....a4.`..<..M.FGt.&..1.D..VEH.K.....X}....`P......B6.i...4oFkS...F..t...C.i.s<.E...x..D?......8<..\T.]f.y..-6...n>.\.t.^.....=.]I.E..$'...I.{..&36.9I.. ..U~pY......v...b(XG.O.c.~.f.5..<Y.......k..$....l.mY
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):60416
                                                                      Entropy (8bit):7.996726756421775
                                                                      Encrypted:true
                                                                      SSDEEP:1536:lvSjEjdlBN+/hK1QOYbeeatYAViiiPXMiwEVxXTIUHqe:lcEZ1GhzKeatYAViiww2xDWe
                                                                      MD5:DFF732C8188D88453492EA60753F1C6A
                                                                      SHA1:606941677DA5B05F7A7D05B8CF67B8D030EA1004
                                                                      SHA-256:84725AB57A34DFF97906EB1528F4BEB008A09C3B5FF280ACCE3F3BAED38C9B3C
                                                                      SHA-512:2329726CFD62C2EB55AA636A21E2932A896DF17AA0B76B6AE3A1EA58E9A2E8DCBBDD93222BB068E095A9E536630B23CB579406B90800F5AAE3AB3B8AA50FF42B
                                                                      Malicious:false
                                                                      Preview:.e..t...r.G.;L....x!'.f..o..]d0.j../.w......9..Y'J.H_......h[.=.\....a..X5L.6.t..g..tC..e:.A-.e.....O..IrA\(...O7{'.6...)..$...Mu1....H ..4Ml..n....$.Gl3.&.. ...&........r..Eo...-aE...!....#n..`D...D...t.r)....].B.dv..D....Y..}.....a./...E.u..L..l....G..2.;. C..F?.f.......w,Ic&....w....8...Fq=..X5ma..X...Jq,.#..W..".a(..w..s.Sd-..........!. ..o.....4_.F..e$.y....... .......t..&dl......Z .........xO.qHp.b..#.%w...v.. ..t.Cz.3....h..sFL.O.zn.!.p...b..-.;#.a.d....q5...+y.K...0.n>9(..Rm.`...2_.igf.....$wh...r..}p...E.U..N....k.G.f....aX.r.G.......,st%.....G.!....&......?7U....5.U#.B.e}./H.......}....s....J..x.<J.....#..Wsc.l.]3....|.>j-.....>..(.V.2...}.[&=qSoe.m$.i.:2...F..7kR>........l...N.y..@Z..*.}T^Tt[.....F..PqT..^...F....^,.l....N^.oECWV.P.....P.0......1.gl...'r....1....).....c.....ZpDZ...../i?......~.....hd.y.By]y5.a...=4(.,..5.x..<.._.o....(v..X.....9......w.MxfD.1......N....h....}7./..h...;z.g..M...A.2Q_..id....P............{.Z{..
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):73728
                                                                      Entropy (8bit):7.997657326549262
                                                                      Encrypted:true
                                                                      SSDEEP:1536:eg8UAomep7WrEIdT97P9LROpRfw9xc3r6SxgDnt:GUAfep7WrEIB97P9YLfwDc3rJx0t
                                                                      MD5:8A238B75196C747EC0DF18C80C159F5F
                                                                      SHA1:D22A286D0EE37507AF1CD8C9184BDAE37235836F
                                                                      SHA-256:DBED8DA0208234BB370DC2D0E28DFF1110AEB02EC7F1D18DF6511777E6565D9B
                                                                      SHA-512:5B6FCDA80821F61D46DCC5AE4618EB6278640F54A8573A097B0FBAFBE466C16F292A42613916D5F84E66043E2F21E939B7A8D457B08E13778E464AA4F45CBA96
                                                                      Malicious:false
                                                                      Preview:..O-.d.we..=...=.......U......&......D>S./c.6E2(O....efoq..[)......5..VC..&.=..S..p.c.SlKx.....9..a.a.]g#i@.3.@d...{..e.0..."..fCn.......+.D.?",Q._[.:..w..yFT....r-......9i..}.8f..3.....Qb..|w1m.....I......u.....|.....Nb.s.*.}.R./%.3...1Ae-....2g.....`....$.f...I.....1 ....[..UO..*..A..m.... $%..."C....[.hlh.z....vb5...KY..yB.S.,.a....D..}.xw.[Tr`o.(.}.....&..`M.Ph.\.....;u...\.A..........hT*......P....A>.8?#.7/...H..8.eO...)HGW...2.J..5..D5.pAn.....K..k~....r..R`.;mb.5 ..e~..z......-.9.f..y....*.~^UF.*s....1~..e.Zj2m.i..Y........W.x....3.R.\K...]..a|.Zi;...y8v.....`..yw.c.X.[..i.J.b\.^9......;(k...~...=((|....m*RRbt.....ss.......`... ..z..Q.....L:..i......e....(yZ.SAc..F.|.sQ....VO.Z..aV........T.s..,.cS_f.V..h[pM.1.....[..v........)...uaV.Q:.t._`.4.....s..p.....#....{....B..o9......X..*...E.^..<]....i#..1.(6.....I.+~.X...ras@d3....9i...P.....g.jq1.-.h.~T...C.Z.E....9U..I..%......`~"r..<70..V.`G..7...kX.Y..0.H3.z...O..._.}c..
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):24097
                                                                      Entropy (8bit):7.991655026434422
                                                                      Encrypted:true
                                                                      SSDEEP:384:Uj1Mu9se3TIyujVHOiVib92hMBJ46vjrRV1+iSLWNJ5wc91mOGt3u8poJtJstGHo:Ujse38y4Vuii92MJr8iSLWNJBkOGt3uc
                                                                      MD5:6D927FD0532E71575944F4B1DCBB1523
                                                                      SHA1:6AC1DC59FEA4DB99FBD653CABD548742536B1F52
                                                                      SHA-256:1430B10F35B6DC0CF7720C049644ED24F09A988E913BCF933F375E6747B68426
                                                                      SHA-512:70047A74EBAADD1FE0176ED7622831D95350B9836D50614C4F57BE2962677D6E2131385C920C24808E38B4332AACBE19D3D82FD7C4A85FBCAFE782D709545CE0
                                                                      Malicious:false
                                                                      Preview:..l .(.z............`....d2.K.`.\w...8.`..=.J..{........N.kJM.D....>$..'.@.|9)Y....M.e$R....M...Ml..D.?....&........n{7lQ.)......@}...]p.D..R....6a....%.../....|..+^.....M.1 ..`.+f..PP..G#{.....n.."sOzErB..?..C.....>....Qp...U..O}.x....L.%.nn....Ni.{.w..h....Ybr..1. 0`LN...P..Y".R.9{pW.?G....q.ut..>.{.DzV.(..\.......r..z..zd.N........&.._...0.S."..}.c..^.?|x.].MS./....t...T.Z.....$....+a.4....Q......U..o......z.. ......c..+.7............|.mM...;..H.[<..W...............=3.`4..*.:.>E...Q.^.m.F{T.a........=.....!.6F\5..a..Ut.B}..g.......B..uX*.f.So.P%[e............Q^........-p..b..........B.iX..d.<...*.w..B...w.+..n.%^Y...6n.nH.G,.....S@(}D..{.J{......$.F=.L.x.....9.+[KP]&..;mfi.;#...(..._[.n..g.....7.....g.].....F6]37..3w....................]C...r.....&.U.Q>.....p+..l..........VH....;.G......=.........]I^...&O|..n!.i..#...&..'..`.HE,.......\..~..0+...-..~..$.b.s...\..Ygu.s..F.."..J...I\.\....w..>8....;3.d..o.Sk..O...g.|..D:..#.,...B....z
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):880314
                                                                      Entropy (8bit):6.620579004243944
                                                                      Encrypted:false
                                                                      SSDEEP:12288:Y0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:Yxz1JMyyzlohMf1tN70aw8501
                                                                      MD5:A8901D6FC635950EDCC6B5929837AAB9
                                                                      SHA1:709D5B08B7851AFD26A58AC1E3D934E795BA4B92
                                                                      SHA-256:84717869488D3D39419E4F460B019B0996A0FF5ADE09267AE90E2238C3F29FF2
                                                                      SHA-512:AC61F8C611B38D455026872EB28BE2F993CF741E60538D1BBEB2BDDE08BE89AA08A3F11A6544D9A36C0CAD3A5F175F7AF0E0D5798371F8398481B4CED09EBE54
                                                                      Malicious:false
                                                                      Preview:....D{'3....7....v....-....O.j.V.........@.3.@.2..I..?@.X.C..?@..?@.!@@.!@@...C...C..?@...C...C.!@@...C...C.U..QQS..VW...C.....G....._J.Ht0H.....H............].........].....At 3._^[..]..w.......n...3.;......3.@..U..QSVW..h.....].......}...Y...R..V.3................~.j.Yj.[..B.....1..;.....|.]...3..............~.j......[..B.....1..;.....|.]...3.j.Z.x..3.F..........Q.w...Y..3..A...9p.~..<..t5j..[...Y..t%.4............@......F;p.|._^[..]...3.....@..$....V...F.....t%...y.............6.u...YV.n...Y..^.........U..E...u.........]...x...;........D....3............U..SV.u.W...................]..u.....F....;.}..W....._.........;.......M...3..~0..........$..............;......."...A...;.|.W.3..~H......d$..........E..8....uE....h............E....9........Nu.........G..<..tM.E....A...._^[].}....?.}.....].........n.......V....8.....................j............t_j..z........tMh..I........F..F......E._...I..4...^.A....[].=....t.H....S..............s...3..3...3..D....U..QSV
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:ASCII text, with very long lines (1468), with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):28321
                                                                      Entropy (8bit):5.095045521355867
                                                                      Encrypted:false
                                                                      SSDEEP:768:0bKzHDOSJi6vz24/HNGRdFDBDCoqJbv95o99NxdX:UKzHiOi+fNGRdFDBD1q7Pk
                                                                      MD5:26B1281E56DC4459D424A42114A81646
                                                                      SHA1:380A5FB5DEB1F47F893C4D1D66B32CD895F6F631
                                                                      SHA-256:45933188786C2486DD71305748224F8675C9141FDBD9ECACA4051563B94434F1
                                                                      SHA-512:FECD98E3B1E63C1852763DDAF10F13B5BF50D5019A4E9685448D4F8EEF08433D4221FDBC974683A28ACA5698DDFE3BEFB987654D1650F27042A5F5F0538FC7AD
                                                                      Malicious:false
                                                                      Preview:Set Fw=n..eENonprofit-Furnished-Prices-Waters-..qfGConsistent-Naval-Proportion-Title-Quantitative-Del-Component-Distributions-Indicate-..qcxSBorn-..xYHMarathon-..mlerSupervisors-Violence-Contest-Ends-Cloud-Titles-Optimal-..Set Field=x..MUGyMaintains-Oliver-Contains-Indexed-Upgrading-Simplified-Lucy-Counted-Muslim-..zfEmbassy-Lewis-Provided-..YyoNPainful-Wood-Reconstruction-..sCGif-..liyReserve-Privacy-Representation-Relying-..kAcStats-Impressive-Advanced-Standings-Harder-..MVUpgrading-Commands-Dolls-Wisdom-Court-..ImYiRover-Commission-..lXAdapter-Delegation-Declared-Kingdom-Upskirt-Describe-Struct-..ifJustin-Change-Supplied-..Set Casting=I..qFmMWang-Australia-Mistress-Competition-Positive-Workshops-..zErToshiba-Div-..vUqInvisible-Admitted-..OLMPerforming-..UpMarried-Adidas-Assists-Disaster-Dist-Thomas-Trinity-Xhtml-..PyOIFaqs-Telecharger-Theories-Delhi-Beats-..ZvwLConsiderable-Fifth-..twSmScreenshots-Lift-..Set Crossing=h..WOfVb-..gBDisclaimers-Advanced-Et-Actively-Screen-Photographers
                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                      File Type:ASCII text, with very long lines (1468), with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):28321
                                                                      Entropy (8bit):5.095045521355867
                                                                      Encrypted:false
                                                                      SSDEEP:768:0bKzHDOSJi6vz24/HNGRdFDBDCoqJbv95o99NxdX:UKzHiOi+fNGRdFDBD1q7Pk
                                                                      MD5:26B1281E56DC4459D424A42114A81646
                                                                      SHA1:380A5FB5DEB1F47F893C4D1D66B32CD895F6F631
                                                                      SHA-256:45933188786C2486DD71305748224F8675C9141FDBD9ECACA4051563B94434F1
                                                                      SHA-512:FECD98E3B1E63C1852763DDAF10F13B5BF50D5019A4E9685448D4F8EEF08433D4221FDBC974683A28ACA5698DDFE3BEFB987654D1650F27042A5F5F0538FC7AD
                                                                      Malicious:false
                                                                      Preview:Set Fw=n..eENonprofit-Furnished-Prices-Waters-..qfGConsistent-Naval-Proportion-Title-Quantitative-Del-Component-Distributions-Indicate-..qcxSBorn-..xYHMarathon-..mlerSupervisors-Violence-Contest-Ends-Cloud-Titles-Optimal-..Set Field=x..MUGyMaintains-Oliver-Contains-Indexed-Upgrading-Simplified-Lucy-Counted-Muslim-..zfEmbassy-Lewis-Provided-..YyoNPainful-Wood-Reconstruction-..sCGif-..liyReserve-Privacy-Representation-Relying-..kAcStats-Impressive-Advanced-Standings-Harder-..MVUpgrading-Commands-Dolls-Wisdom-Court-..ImYiRover-Commission-..lXAdapter-Delegation-Declared-Kingdom-Upskirt-Describe-Struct-..ifJustin-Change-Supplied-..Set Casting=I..qFmMWang-Australia-Mistress-Competition-Positive-Workshops-..zErToshiba-Div-..vUqInvisible-Admitted-..OLMPerforming-..UpMarried-Adidas-Assists-Disaster-Dist-Thomas-Trinity-Xhtml-..PyOIFaqs-Telecharger-Theories-Delhi-Beats-..ZvwLConsiderable-Fifth-..twSmScreenshots-Lift-..Set Crossing=h..WOfVb-..gBDisclaimers-Advanced-Et-Actively-Screen-Photographers
                                                                      Process:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):13332
                                                                      Entropy (8bit):6.4283318329956955
                                                                      Encrypted:false
                                                                      SSDEEP:384:lHAHhww+/2nlP3r1WAL3yQZRMdTQmYwim12sBS:lgH7ACViIeTxYEhs
                                                                      MD5:D028D659AA8F3A0CB70A5E1135C4864B
                                                                      SHA1:6B64391EECD363CFDF66016121C031B422DEDDE3
                                                                      SHA-256:49B41333EFDEA958C04B064C9306DFE491B0E40F258BCA87383380DB72590294
                                                                      SHA-512:9668B8E3027A11733173A284DDAAB25635E283343D364B28FA7B45957B918AAB1EC16C831E29F64BA4916CC6A605810D72CA93041754C36D0B909BC98D900269
                                                                      Malicious:false
                                                                      Preview:NuclearRemarksReliabilityComputation..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B..........................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\AppData\Local\Temp\436117\Mother.pif
                                                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1048575
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:RGRGe:aZ
                                                                      MD5:185DC69D7858F155118FE630672BD132
                                                                      SHA1:A794F3401B7CA0B9FD7EE27E16F0FAC718B95ADD
                                                                      SHA-256:A6B6EB2188F24481091C1C0BBB069EACBF917559CFB0BDB67AB4ECC783559CC8
                                                                      SHA-512:8C7C19FC58C88EF5A9916AF8194FCF5E397CC674560D5F776E892D33BBE3EF7248B58FF3BB8ACF607EC0D45114B3C4349C2B5549C78F0A200F806F496A60DAF5
                                                                      Malicious:false
                                                                      Preview:########################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.973067752286615
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:eddzD2MA12.exe
                                                                      File size:982'817 bytes
                                                                      MD5:1bc68d708e953bf10bbf6744a6b91b28
                                                                      SHA1:a6938a273e7a82cf4909ca40d224a6430f6a2860
                                                                      SHA256:9c46859695bed9bd827e2292e634c39e2982f40d9be6b170d185ae154a1a6a5f
                                                                      SHA512:d402f564fc707cdfd6b0853da5c70f0fe7b87e933ce4ff27b28325497dc70439db82bb02c12ed7f1ed804ee3730278117302489c645efbade654f7a9bbd48a06
                                                                      SSDEEP:24576:2aTm8nQDF5o5nsuru7m/vQ4MYTsPP+1b3PqfRQ2/9:7pQR2RszOQ4JgPYb3YR/9
                                                                      TLSH:762523B955D94829ECF603B27CF4E718DDF2FE561521C84F4280ECDDBBBA612840836A
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                                      Icon Hash:bebee8e8e4e6bee6
                                                                      Entrypoint:0x403883
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:true
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:0
                                                                      File Version Major:5
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                      Signature Valid:
                                                                      Signature Issuer:
                                                                      Signature Validation Error:
                                                                      Error Number:
                                                                      Not Before, Not After
                                                                        Subject Chain
                                                                          Version:
                                                                          Thumbprint MD5:
                                                                          Thumbprint SHA-1:
                                                                          Thumbprint SHA-256:
                                                                          Serial:
                                                                          Instruction
                                                                          sub esp, 000002D4h
                                                                          push ebx
                                                                          push ebp
                                                                          push esi
                                                                          push edi
                                                                          push 00000020h
                                                                          xor ebp, ebp
                                                                          pop esi
                                                                          mov dword ptr [esp+18h], ebp
                                                                          mov dword ptr [esp+10h], 00409268h
                                                                          mov dword ptr [esp+14h], ebp
                                                                          call dword ptr [00408030h]
                                                                          push 00008001h
                                                                          call dword ptr [004080B4h]
                                                                          push ebp
                                                                          call dword ptr [004082C0h]
                                                                          push 00000008h
                                                                          mov dword ptr [00472EB8h], eax
                                                                          call 00007FC534F52E2Bh
                                                                          push ebp
                                                                          push 000002B4h
                                                                          mov dword ptr [00472DD0h], eax
                                                                          lea eax, dword ptr [esp+38h]
                                                                          push eax
                                                                          push ebp
                                                                          push 00409264h
                                                                          call dword ptr [00408184h]
                                                                          push 0040924Ch
                                                                          push 0046ADC0h
                                                                          call 00007FC534F52B0Dh
                                                                          call dword ptr [004080B0h]
                                                                          push eax
                                                                          mov edi, 004C30A0h
                                                                          push edi
                                                                          call 00007FC534F52AFBh
                                                                          push ebp
                                                                          call dword ptr [00408134h]
                                                                          cmp word ptr [004C30A0h], 0022h
                                                                          mov dword ptr [00472DD8h], eax
                                                                          mov eax, edi
                                                                          jne 00007FC534F503FAh
                                                                          push 00000022h
                                                                          pop esi
                                                                          mov eax, 004C30A2h
                                                                          push esi
                                                                          push eax
                                                                          call 00007FC534F527D1h
                                                                          push eax
                                                                          call dword ptr [00408260h]
                                                                          mov esi, eax
                                                                          mov dword ptr [esp+1Ch], esi
                                                                          jmp 00007FC534F50483h
                                                                          push 00000020h
                                                                          pop ebx
                                                                          cmp ax, bx
                                                                          jne 00007FC534F503FAh
                                                                          add esi, 02h
                                                                          cmp word ptr [esi], bx
                                                                          Programming Language:
                                                                          • [ C ] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          • [ C ] VS2010 SP1 build 40219
                                                                          • [RES] VS2010 SP1 build 40219
                                                                          • [LNK] VS2010 SP1 build 40219
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x11f9a.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xdc2b90x2868.ndata
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0xf40000x11f9a0x120004789e46eb77fe7b118d830c3a7731a28False0.8902587890625data7.745743368597612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x1060000xf320x1000ae96beb401979f86e2224f2fb1bd6d8eFalse0.59033203125data5.423195658248352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xf42980x97c7PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.971972719083773
                                                                          RT_ICON0xfda600x3b0aPNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9915971946539632
                                                                          RT_ICON0x10156c0x1824PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.001779935275081
                                                                          RT_ICON0x102d900x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.43500813669650124
                                                                          RT_ICON0x1053f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8413120567375887
                                                                          RT_DIALOG0x1058600x100dataEnglishUnited States0.5234375
                                                                          RT_DIALOG0x1059600x11cdataEnglishUnited States0.6056338028169014
                                                                          RT_DIALOG0x105a7c0x60dataEnglishUnited States0.7291666666666666
                                                                          RT_GROUP_ICON0x105adc0x4cdataEnglishUnited States0.7894736842105263
                                                                          RT_VERSION0x105b280x19cdataEnglishUnited States0.5776699029126213
                                                                          RT_MANIFEST0x105cc40x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                          DLLImport
                                                                          KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                          USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                          GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                          SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                          ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                          ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                          VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 21, 2024 07:18:02.071057081 CET49883443192.168.2.4149.154.167.99
                                                                          Nov 21, 2024 07:18:02.071095943 CET44349883149.154.167.99192.168.2.4
                                                                          Nov 21, 2024 07:18:02.071228981 CET49883443192.168.2.4149.154.167.99
                                                                          Nov 21, 2024 07:18:02.084779978 CET49883443192.168.2.4149.154.167.99
                                                                          Nov 21, 2024 07:18:02.084794998 CET44349883149.154.167.99192.168.2.4
                                                                          Nov 21, 2024 07:18:03.506453991 CET44349883149.154.167.99192.168.2.4
                                                                          Nov 21, 2024 07:18:03.506644011 CET49883443192.168.2.4149.154.167.99
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 21, 2024 07:16:03.399926901 CET5058253192.168.2.41.1.1.1
                                                                          Nov 21, 2024 07:16:03.634114981 CET53505821.1.1.1192.168.2.4
                                                                          Nov 21, 2024 07:18:01.840046883 CET6123953192.168.2.41.1.1.1
                                                                          Nov 21, 2024 07:18:02.065943956 CET53612391.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Nov 21, 2024 07:16:03.399926901 CET192.168.2.41.1.1.10x7874Standard query (0)EMlHLrRfRkqrlGndWg.EMlHLrRfRkqrlGndWgA (IP address)IN (0x0001)false
                                                                          Nov 21, 2024 07:18:01.840046883 CET192.168.2.41.1.1.10x8918Standard query (0)t.meA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Nov 21, 2024 07:16:03.634114981 CET1.1.1.1192.168.2.40x7874Name error (3)EMlHLrRfRkqrlGndWg.EMlHLrRfRkqrlGndWgnonenoneA (IP address)IN (0x0001)false
                                                                          Nov 21, 2024 07:18:02.065943956 CET1.1.1.1192.168.2.40x8918No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:01:15:57
                                                                          Start date:21/11/2024
                                                                          Path:C:\Users\user\Desktop\eddzD2MA12.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\eddzD2MA12.exe"
                                                                          Imagebase:0x400000
                                                                          File size:982'817 bytes
                                                                          MD5 hash:1BC68D708E953BF10BBF6744A6B91B28
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:01:15:59
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\System32\cmd.exe" /c copy Ra Ra.bat & Ra.bat
                                                                          Imagebase:0x240000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:01:15:59
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:01:16:00
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\tasklist.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:tasklist
                                                                          Imagebase:0x840000
                                                                          File size:79'360 bytes
                                                                          MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:01:16:00
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\findstr.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:findstr /I "wrsa opssvc"
                                                                          Imagebase:0xb90000
                                                                          File size:29'696 bytes
                                                                          MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:01:16:01
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\tasklist.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:tasklist
                                                                          Imagebase:0x840000
                                                                          File size:79'360 bytes
                                                                          MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:6
                                                                          Start time:01:16:01
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\findstr.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                          Imagebase:0xb90000
                                                                          File size:29'696 bytes
                                                                          MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:01:16:02
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:cmd /c md 436117
                                                                          Imagebase:0x240000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:01:16:02
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\findstr.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:findstr /V "NuclearRemarksReliabilityComputation" Young
                                                                          Imagebase:0xb90000
                                                                          File size:29'696 bytes
                                                                          MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:9
                                                                          Start time:01:16:02
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:cmd /c copy /b ..\Ky + ..\Appears + ..\Educators + ..\Images + ..\Driver + ..\Generations + ..\Lol v
                                                                          Imagebase:0x240000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:10
                                                                          Start time:01:16:02
                                                                          Start date:21/11/2024
                                                                          Path:C:\Users\user\AppData\Local\Temp\436117\Mother.pif
                                                                          Wow64 process (32bit):true
                                                                          Commandline:Mother.pif v
                                                                          Imagebase:0x160000
                                                                          File size:893'608 bytes
                                                                          MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2692560750.0000000001330000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2928936722.00000000012A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2929432512.0000000004221000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2692607414.00000000013A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2693129099.0000000001329000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2928983225.00000000013A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2928795702.0000000001271000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000002.2928795702.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2693002614.0000000001210000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2693129099.00000000012E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2692802688.000000000132F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000000A.00000003.2692696464.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 5%, ReversingLabs
                                                                          • Detection: 11%, Virustotal, Browse
                                                                          Reputation:moderate
                                                                          Has exited:false

                                                                          Target ID:11
                                                                          Start time:01:16:02
                                                                          Start date:21/11/2024
                                                                          Path:C:\Windows\SysWOW64\choice.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:choice /d y /t 5
                                                                          Imagebase:0xe10000
                                                                          File size:28'160 bytes
                                                                          MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:17.8%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:20.7%
                                                                            Total number of Nodes:1526
                                                                            Total number of Limit Nodes:33
                                                                            execution_graph 4342 402fc0 4343 401446 18 API calls 4342->4343 4344 402fc7 4343->4344 4345 403017 4344->4345 4346 40300a 4344->4346 4349 401a13 4344->4349 4347 406805 18 API calls 4345->4347 4348 401446 18 API calls 4346->4348 4347->4349 4348->4349 4350 4023c1 4351 40145c 18 API calls 4350->4351 4352 4023c8 4351->4352 4355 40726a 4352->4355 4358 406ed2 CreateFileW 4355->4358 4359 406f04 4358->4359 4360 406f1e ReadFile 4358->4360 4361 4062a3 11 API calls 4359->4361 4362 4023d6 4360->4362 4365 406f84 4360->4365 4361->4362 4363 4071e3 CloseHandle 4363->4362 4364 406f9b ReadFile lstrcpynA lstrcmpA 4364->4365 4366 406fe2 SetFilePointer ReadFile 4364->4366 4365->4362 4365->4363 4365->4364 4369 406fdd 4365->4369 4366->4363 4367 4070a8 ReadFile 4366->4367 4368 407138 4367->4368 4368->4367 4368->4369 4370 40715f SetFilePointer GlobalAlloc ReadFile 4368->4370 4369->4363 4371 4071a3 4370->4371 4372 4071bf lstrcpynW GlobalFree 4370->4372 4371->4371 4371->4372 4372->4363 4373 401cc3 4374 40145c 18 API calls 4373->4374 4375 401cca lstrlenW 4374->4375 4376 4030dc 4375->4376 4377 4030e3 4376->4377 4379 405f51 wsprintfW 4376->4379 4379->4377 4394 401c46 4395 40145c 18 API calls 4394->4395 4396 401c4c 4395->4396 4397 4062a3 11 API calls 4396->4397 4398 401c59 4397->4398 4399 406c9b 81 API calls 4398->4399 4400 401c64 4399->4400 4401 403049 4402 401446 18 API calls 4401->4402 4405 403050 4402->4405 4403 406805 18 API calls 4404 401a13 4403->4404 4405->4403 4405->4404 4406 40204a 4407 401446 18 API calls 4406->4407 4408 402051 IsWindow 4407->4408 4409 4018d3 4408->4409 4410 40324c 4411 403277 4410->4411 4412 40325e SetTimer 4410->4412 4413 4032cc 4411->4413 4414 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4411->4414 4412->4411 4414->4413 4415 4048cc 4416 4048f1 4415->4416 4417 4048da 4415->4417 4419 4048ff IsWindowVisible 4416->4419 4423 404916 4416->4423 4418 4048e0 4417->4418 4433 40495a 4417->4433 4420 403daf SendMessageW 4418->4420 4422 40490c 4419->4422 4419->4433 4424 4048ea 4420->4424 4421 404960 CallWindowProcW 4421->4424 4434 40484e SendMessageW 4422->4434 4423->4421 4439 406009 lstrcpynW 4423->4439 4427 404945 4440 405f51 wsprintfW 4427->4440 4429 40494c 4430 40141d 80 API calls 4429->4430 4431 404953 4430->4431 4441 406009 lstrcpynW 4431->4441 4433->4421 4435 404871 GetMessagePos ScreenToClient SendMessageW 4434->4435 4436 4048ab SendMessageW 4434->4436 4437 4048a3 4435->4437 4438 4048a8 4435->4438 4436->4437 4437->4423 4438->4436 4439->4427 4440->4429 4441->4433 4442 4022cc 4443 40145c 18 API calls 4442->4443 4444 4022d3 4443->4444 4445 4062d5 2 API calls 4444->4445 4446 4022d9 4445->4446 4447 4022e8 4446->4447 4451 405f51 wsprintfW 4446->4451 4450 4030e3 4447->4450 4452 405f51 wsprintfW 4447->4452 4451->4447 4452->4450 4222 4050cd 4223 405295 4222->4223 4224 4050ee GetDlgItem GetDlgItem GetDlgItem 4222->4224 4225 4052c6 4223->4225 4226 40529e GetDlgItem CreateThread CloseHandle 4223->4226 4271 403d98 SendMessageW 4224->4271 4228 4052f4 4225->4228 4230 4052e0 ShowWindow ShowWindow 4225->4230 4231 405316 4225->4231 4226->4225 4274 405047 83 API calls 4226->4274 4232 405352 4228->4232 4234 405305 4228->4234 4235 40532b ShowWindow 4228->4235 4229 405162 4242 406805 18 API calls 4229->4242 4273 403d98 SendMessageW 4230->4273 4236 403dca 8 API calls 4231->4236 4232->4231 4237 40535d SendMessageW 4232->4237 4238 403d18 SendMessageW 4234->4238 4240 40534b 4235->4240 4241 40533d 4235->4241 4239 40528e 4236->4239 4237->4239 4244 405376 CreatePopupMenu 4237->4244 4238->4231 4243 403d18 SendMessageW 4240->4243 4245 404f72 25 API calls 4241->4245 4246 405181 4242->4246 4243->4232 4247 406805 18 API calls 4244->4247 4245->4240 4248 4062a3 11 API calls 4246->4248 4250 405386 AppendMenuW 4247->4250 4249 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4248->4249 4251 4051f3 4249->4251 4252 4051d7 SendMessageW SendMessageW 4249->4252 4253 405399 GetWindowRect 4250->4253 4254 4053ac 4250->4254 4255 405206 4251->4255 4256 4051f8 SendMessageW 4251->4256 4252->4251 4257 4053b3 TrackPopupMenu 4253->4257 4254->4257 4258 403d3f 19 API calls 4255->4258 4256->4255 4257->4239 4259 4053d1 4257->4259 4260 405216 4258->4260 4261 4053ed SendMessageW 4259->4261 4262 405253 GetDlgItem SendMessageW 4260->4262 4263 40521f ShowWindow 4260->4263 4261->4261 4264 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4261->4264 4262->4239 4267 405276 SendMessageW SendMessageW 4262->4267 4265 405242 4263->4265 4266 405235 ShowWindow 4263->4266 4268 40542f SendMessageW 4264->4268 4272 403d98 SendMessageW 4265->4272 4266->4265 4267->4239 4268->4268 4269 40545a GlobalUnlock SetClipboardData CloseClipboard 4268->4269 4269->4239 4271->4229 4272->4262 4273->4228 4453 4030cf 4454 40145c 18 API calls 4453->4454 4455 4030d6 4454->4455 4457 4030dc 4455->4457 4460 4063ac GlobalAlloc lstrlenW 4455->4460 4458 4030e3 4457->4458 4487 405f51 wsprintfW 4457->4487 4461 4063e2 4460->4461 4462 406434 4460->4462 4463 40640f GetVersionExW 4461->4463 4488 40602b CharUpperW 4461->4488 4462->4457 4463->4462 4464 40643e 4463->4464 4465 406464 LoadLibraryA 4464->4465 4466 40644d 4464->4466 4465->4462 4469 406482 GetProcAddress GetProcAddress GetProcAddress 4465->4469 4466->4462 4468 406585 GlobalFree 4466->4468 4470 40659b LoadLibraryA 4468->4470 4471 4066dd FreeLibrary 4468->4471 4474 4064aa 4469->4474 4477 4065f5 4469->4477 4470->4462 4473 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4470->4473 4471->4462 4472 406651 FreeLibrary 4481 40662a 4472->4481 4473->4477 4475 4064ce FreeLibrary GlobalFree 4474->4475 4474->4477 4483 4064ea 4474->4483 4475->4462 4476 4066ea 4479 4066ef CloseHandle FreeLibrary 4476->4479 4477->4472 4477->4481 4478 4064fc lstrcpyW OpenProcess 4480 40654f CloseHandle CharUpperW lstrcmpW 4478->4480 4478->4483 4482 406704 CloseHandle 4479->4482 4480->4477 4480->4483 4481->4476 4484 406685 lstrcmpW 4481->4484 4485 4066b6 CloseHandle 4481->4485 4486 4066d4 CloseHandle 4481->4486 4482->4479 4483->4468 4483->4478 4483->4480 4484->4481 4484->4482 4485->4481 4486->4471 4487->4458 4488->4461 4489 407752 4493 407344 4489->4493 4490 407c6d 4491 4073c2 GlobalFree 4492 4073cb GlobalAlloc 4491->4492 4492->4490 4492->4493 4493->4490 4493->4491 4493->4492 4493->4493 4494 407443 GlobalAlloc 4493->4494 4495 40743a GlobalFree 4493->4495 4494->4490 4494->4493 4495->4494 4496 401dd3 4497 401446 18 API calls 4496->4497 4498 401dda 4497->4498 4499 401446 18 API calls 4498->4499 4500 4018d3 4499->4500 4508 402e55 4509 40145c 18 API calls 4508->4509 4510 402e63 4509->4510 4511 402e79 4510->4511 4512 40145c 18 API calls 4510->4512 4513 405e30 2 API calls 4511->4513 4512->4511 4514 402e7f 4513->4514 4538 405e50 GetFileAttributesW CreateFileW 4514->4538 4516 402e8c 4517 402f35 4516->4517 4518 402e98 GlobalAlloc 4516->4518 4521 4062a3 11 API calls 4517->4521 4519 402eb1 4518->4519 4520 402f2c CloseHandle 4518->4520 4539 403368 SetFilePointer 4519->4539 4520->4517 4523 402f45 4521->4523 4525 402f50 DeleteFileW 4523->4525 4526 402f63 4523->4526 4524 402eb7 4528 403336 ReadFile 4524->4528 4525->4526 4540 401435 4526->4540 4529 402ec0 GlobalAlloc 4528->4529 4530 402ed0 4529->4530 4531 402f04 WriteFile GlobalFree 4529->4531 4532 40337f 37 API calls 4530->4532 4533 40337f 37 API calls 4531->4533 4537 402edd 4532->4537 4534 402f29 4533->4534 4534->4520 4536 402efb GlobalFree 4536->4531 4537->4536 4538->4516 4539->4524 4541 404f72 25 API calls 4540->4541 4542 401443 4541->4542 4543 401cd5 4544 401446 18 API calls 4543->4544 4545 401cdd 4544->4545 4546 401446 18 API calls 4545->4546 4547 401ce8 4546->4547 4548 40145c 18 API calls 4547->4548 4549 401cf1 4548->4549 4550 401d07 lstrlenW 4549->4550 4551 401d43 4549->4551 4552 401d11 4550->4552 4552->4551 4556 406009 lstrcpynW 4552->4556 4554 401d2c 4554->4551 4555 401d39 lstrlenW 4554->4555 4555->4551 4556->4554 4557 403cd6 4558 403ce1 4557->4558 4559 403ce5 4558->4559 4560 403ce8 GlobalAlloc 4558->4560 4560->4559 4561 402cd7 4562 401446 18 API calls 4561->4562 4565 402c64 4562->4565 4563 402d99 4564 402d17 ReadFile 4564->4565 4565->4561 4565->4563 4565->4564 4566 402dd8 4567 402ddf 4566->4567 4568 4030e3 4566->4568 4569 402de5 FindClose 4567->4569 4569->4568 4570 401d5c 4571 40145c 18 API calls 4570->4571 4572 401d63 4571->4572 4573 40145c 18 API calls 4572->4573 4574 401d6c 4573->4574 4575 401d73 lstrcmpiW 4574->4575 4576 401d86 lstrcmpW 4574->4576 4577 401d79 4575->4577 4576->4577 4578 401c99 4576->4578 4577->4576 4577->4578 4280 407c5f 4281 407344 4280->4281 4282 4073c2 GlobalFree 4281->4282 4283 4073cb GlobalAlloc 4281->4283 4284 407c6d 4281->4284 4285 407443 GlobalAlloc 4281->4285 4286 40743a GlobalFree 4281->4286 4282->4283 4283->4281 4283->4284 4285->4281 4285->4284 4286->4285 4579 404363 4580 404373 4579->4580 4581 40439c 4579->4581 4583 403d3f 19 API calls 4580->4583 4582 403dca 8 API calls 4581->4582 4584 4043a8 4582->4584 4585 404380 SetDlgItemTextW 4583->4585 4585->4581 4586 4027e3 4587 4027e9 4586->4587 4588 4027f2 4587->4588 4589 402836 4587->4589 4602 401553 4588->4602 4590 40145c 18 API calls 4589->4590 4592 40283d 4590->4592 4594 4062a3 11 API calls 4592->4594 4593 4027f9 4595 40145c 18 API calls 4593->4595 4600 401a13 4593->4600 4596 40284d 4594->4596 4597 40280a RegDeleteValueW 4595->4597 4606 40149d RegOpenKeyExW 4596->4606 4598 4062a3 11 API calls 4597->4598 4601 40282a RegCloseKey 4598->4601 4601->4600 4603 401563 4602->4603 4604 40145c 18 API calls 4603->4604 4605 401589 RegOpenKeyExW 4604->4605 4605->4593 4612 401515 4606->4612 4614 4014c9 4606->4614 4607 4014ef RegEnumKeyW 4608 401501 RegCloseKey 4607->4608 4607->4614 4609 4062fc 3 API calls 4608->4609 4611 401511 4609->4611 4610 401526 RegCloseKey 4610->4612 4611->4612 4615 401541 RegDeleteKeyW 4611->4615 4612->4600 4613 40149d 3 API calls 4613->4614 4614->4607 4614->4608 4614->4610 4614->4613 4615->4612 4616 403f64 4617 403f90 4616->4617 4618 403f74 4616->4618 4620 403fc3 4617->4620 4621 403f96 SHGetPathFromIDListW 4617->4621 4627 405c84 GetDlgItemTextW 4618->4627 4623 403fad SendMessageW 4621->4623 4624 403fa6 4621->4624 4622 403f81 SendMessageW 4622->4617 4623->4620 4625 40141d 80 API calls 4624->4625 4625->4623 4627->4622 4628 402ae4 4629 402aeb 4628->4629 4630 4030e3 4628->4630 4631 402af2 CloseHandle 4629->4631 4631->4630 4632 402065 4633 401446 18 API calls 4632->4633 4634 40206d 4633->4634 4635 401446 18 API calls 4634->4635 4636 402076 GetDlgItem 4635->4636 4637 4030dc 4636->4637 4638 4030e3 4637->4638 4640 405f51 wsprintfW 4637->4640 4640->4638 4641 402665 4642 40145c 18 API calls 4641->4642 4643 40266b 4642->4643 4644 40145c 18 API calls 4643->4644 4645 402674 4644->4645 4646 40145c 18 API calls 4645->4646 4647 40267d 4646->4647 4648 4062a3 11 API calls 4647->4648 4649 40268c 4648->4649 4650 4062d5 2 API calls 4649->4650 4651 402695 4650->4651 4652 4026a6 lstrlenW lstrlenW 4651->4652 4653 404f72 25 API calls 4651->4653 4656 4030e3 4651->4656 4654 404f72 25 API calls 4652->4654 4653->4651 4655 4026e8 SHFileOperationW 4654->4655 4655->4651 4655->4656 4664 401c69 4665 40145c 18 API calls 4664->4665 4666 401c70 4665->4666 4667 4062a3 11 API calls 4666->4667 4668 401c80 4667->4668 4669 405ca0 MessageBoxIndirectW 4668->4669 4670 401a13 4669->4670 4678 402f6e 4679 402f72 4678->4679 4680 402fae 4678->4680 4681 4062a3 11 API calls 4679->4681 4682 40145c 18 API calls 4680->4682 4683 402f7d 4681->4683 4688 402f9d 4682->4688 4684 4062a3 11 API calls 4683->4684 4685 402f90 4684->4685 4686 402fa2 4685->4686 4687 402f98 4685->4687 4690 4060e7 9 API calls 4686->4690 4689 403e74 5 API calls 4687->4689 4689->4688 4690->4688 4691 4023f0 4692 402403 4691->4692 4693 4024da 4691->4693 4694 40145c 18 API calls 4692->4694 4695 404f72 25 API calls 4693->4695 4696 40240a 4694->4696 4701 4024f1 4695->4701 4697 40145c 18 API calls 4696->4697 4698 402413 4697->4698 4699 402429 LoadLibraryExW 4698->4699 4700 40241b GetModuleHandleW 4698->4700 4702 40243e 4699->4702 4703 4024ce 4699->4703 4700->4699 4700->4702 4715 406365 GlobalAlloc WideCharToMultiByte 4702->4715 4704 404f72 25 API calls 4703->4704 4704->4693 4706 402449 4707 40248c 4706->4707 4708 40244f 4706->4708 4709 404f72 25 API calls 4707->4709 4711 401435 25 API calls 4708->4711 4713 40245f 4708->4713 4710 402496 4709->4710 4712 4062a3 11 API calls 4710->4712 4711->4713 4712->4713 4713->4701 4714 4024c0 FreeLibrary 4713->4714 4714->4701 4716 406390 GetProcAddress 4715->4716 4717 40639d GlobalFree 4715->4717 4716->4717 4717->4706 4718 402df3 4719 402dfa 4718->4719 4721 4019ec 4718->4721 4720 402e07 FindNextFileW 4719->4720 4720->4721 4722 402e16 4720->4722 4724 406009 lstrcpynW 4722->4724 4724->4721 4077 402175 4078 401446 18 API calls 4077->4078 4079 40217c 4078->4079 4080 401446 18 API calls 4079->4080 4081 402186 4080->4081 4082 4062a3 11 API calls 4081->4082 4086 402197 4081->4086 4082->4086 4083 4021aa EnableWindow 4085 4030e3 4083->4085 4084 40219f ShowWindow 4084->4085 4086->4083 4086->4084 4732 404077 4733 404081 4732->4733 4734 404084 lstrcpynW lstrlenW 4732->4734 4733->4734 4103 405479 4104 405491 4103->4104 4105 4055cd 4103->4105 4104->4105 4106 40549d 4104->4106 4107 40561e 4105->4107 4108 4055de GetDlgItem GetDlgItem 4105->4108 4109 4054a8 SetWindowPos 4106->4109 4110 4054bb 4106->4110 4112 405678 4107->4112 4120 40139d 80 API calls 4107->4120 4111 403d3f 19 API calls 4108->4111 4109->4110 4114 4054c0 ShowWindow 4110->4114 4115 4054d8 4110->4115 4116 405608 SetClassLongW 4111->4116 4113 403daf SendMessageW 4112->4113 4133 4055c8 4112->4133 4143 40568a 4113->4143 4114->4115 4117 4054e0 DestroyWindow 4115->4117 4118 4054fa 4115->4118 4119 40141d 80 API calls 4116->4119 4172 4058dc 4117->4172 4121 405510 4118->4121 4122 4054ff SetWindowLongW 4118->4122 4119->4107 4123 405650 4120->4123 4126 4055b9 4121->4126 4127 40551c GetDlgItem 4121->4127 4122->4133 4123->4112 4128 405654 SendMessageW 4123->4128 4124 40141d 80 API calls 4124->4143 4125 4058de DestroyWindow KiUserCallbackDispatcher 4125->4172 4182 403dca 4126->4182 4131 40554c 4127->4131 4132 40552f SendMessageW IsWindowEnabled 4127->4132 4128->4133 4130 40590d ShowWindow 4130->4133 4135 405559 4131->4135 4136 4055a0 SendMessageW 4131->4136 4137 40556c 4131->4137 4146 405551 4131->4146 4132->4131 4132->4133 4134 406805 18 API calls 4134->4143 4135->4136 4135->4146 4136->4126 4140 405574 4137->4140 4141 405589 4137->4141 4139 403d3f 19 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4142 405587 4142->4126 4143->4124 4143->4125 4143->4133 4143->4134 4143->4139 4163 40581e DestroyWindow 4143->4163 4173 403d3f 4143->4173 4144->4146 4147 405590 4145->4147 4179 403d18 4146->4179 4147->4126 4147->4146 4149 405705 GetDlgItem 4150 405723 ShowWindow KiUserCallbackDispatcher 4149->4150 4151 40571a 4149->4151 4176 403d85 KiUserCallbackDispatcher 4150->4176 4151->4150 4153 40574d EnableWindow 4156 405761 4153->4156 4154 405766 GetSystemMenu EnableMenuItem SendMessageW 4155 405796 SendMessageW 4154->4155 4154->4156 4155->4156 4156->4154 4177 403d98 SendMessageW 4156->4177 4178 406009 lstrcpynW 4156->4178 4159 4057c4 lstrlenW 4160 406805 18 API calls 4159->4160 4161 4057da SetWindowTextW 4160->4161 4162 40139d 80 API calls 4161->4162 4162->4143 4164 405838 CreateDialogParamW 4163->4164 4163->4172 4165 40586b 4164->4165 4164->4172 4166 403d3f 19 API calls 4165->4166 4167 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4166->4167 4168 40139d 80 API calls 4167->4168 4169 4058bc 4168->4169 4169->4133 4170 4058c4 ShowWindow 4169->4170 4171 403daf SendMessageW 4170->4171 4171->4172 4172->4130 4172->4133 4174 406805 18 API calls 4173->4174 4175 403d4a SetDlgItemTextW 4174->4175 4175->4149 4176->4153 4177->4156 4178->4159 4180 403d25 SendMessageW 4179->4180 4181 403d1f 4179->4181 4180->4142 4181->4180 4183 403ddf GetWindowLongW 4182->4183 4193 403e68 4182->4193 4184 403df0 4183->4184 4183->4193 4185 403e02 4184->4185 4186 403dff GetSysColor 4184->4186 4187 403e12 SetBkMode 4185->4187 4188 403e08 SetTextColor 4185->4188 4186->4185 4189 403e30 4187->4189 4190 403e2a GetSysColor 4187->4190 4188->4187 4191 403e41 4189->4191 4192 403e37 SetBkColor 4189->4192 4190->4189 4191->4193 4194 403e54 DeleteObject 4191->4194 4195 403e5b CreateBrushIndirect 4191->4195 4192->4191 4193->4133 4194->4195 4195->4193 4735 4020f9 GetDC GetDeviceCaps 4736 401446 18 API calls 4735->4736 4737 402116 MulDiv 4736->4737 4738 401446 18 API calls 4737->4738 4739 40212c 4738->4739 4740 406805 18 API calls 4739->4740 4741 402165 CreateFontIndirectW 4740->4741 4742 4030dc 4741->4742 4743 4030e3 4742->4743 4745 405f51 wsprintfW 4742->4745 4745->4743 4746 4024fb 4747 40145c 18 API calls 4746->4747 4748 402502 4747->4748 4749 40145c 18 API calls 4748->4749 4750 40250c 4749->4750 4751 40145c 18 API calls 4750->4751 4752 402515 4751->4752 4753 40145c 18 API calls 4752->4753 4754 40251f 4753->4754 4755 40145c 18 API calls 4754->4755 4756 402529 4755->4756 4757 40253d 4756->4757 4758 40145c 18 API calls 4756->4758 4759 4062a3 11 API calls 4757->4759 4758->4757 4760 40256a CoCreateInstance 4759->4760 4761 40258c 4760->4761 4762 40497c GetDlgItem GetDlgItem 4763 4049d2 7 API calls 4762->4763 4768 404bea 4762->4768 4764 404a76 DeleteObject 4763->4764 4765 404a6a SendMessageW 4763->4765 4766 404a81 4764->4766 4765->4764 4769 404ab8 4766->4769 4771 406805 18 API calls 4766->4771 4767 404ccf 4770 404d74 4767->4770 4775 404bdd 4767->4775 4780 404d1e SendMessageW 4767->4780 4768->4767 4778 40484e 5 API calls 4768->4778 4791 404c5a 4768->4791 4774 403d3f 19 API calls 4769->4774 4772 404d89 4770->4772 4773 404d7d SendMessageW 4770->4773 4777 404a9a SendMessageW SendMessageW 4771->4777 4782 404da2 4772->4782 4783 404d9b ImageList_Destroy 4772->4783 4793 404db2 4772->4793 4773->4772 4779 404acc 4774->4779 4781 403dca 8 API calls 4775->4781 4776 404cc1 SendMessageW 4776->4767 4777->4766 4778->4791 4784 403d3f 19 API calls 4779->4784 4780->4775 4786 404d33 SendMessageW 4780->4786 4787 404f6b 4781->4787 4788 404dab GlobalFree 4782->4788 4782->4793 4783->4782 4789 404add 4784->4789 4785 404f1c 4785->4775 4794 404f31 ShowWindow GetDlgItem ShowWindow 4785->4794 4790 404d46 4786->4790 4788->4793 4792 404baa GetWindowLongW SetWindowLongW 4789->4792 4801 404ba4 4789->4801 4804 404b39 SendMessageW 4789->4804 4805 404b67 SendMessageW 4789->4805 4806 404b7b SendMessageW 4789->4806 4800 404d57 SendMessageW 4790->4800 4791->4767 4791->4776 4795 404bc4 4792->4795 4793->4785 4796 404de4 4793->4796 4799 40141d 80 API calls 4793->4799 4794->4775 4797 404be2 4795->4797 4798 404bca ShowWindow 4795->4798 4809 404e12 SendMessageW 4796->4809 4812 404e28 4796->4812 4814 403d98 SendMessageW 4797->4814 4813 403d98 SendMessageW 4798->4813 4799->4796 4800->4770 4801->4792 4801->4795 4804->4789 4805->4789 4806->4789 4807 404ef3 InvalidateRect 4807->4785 4808 404f09 4807->4808 4815 4043ad 4808->4815 4809->4812 4811 404ea1 SendMessageW SendMessageW 4811->4812 4812->4807 4812->4811 4813->4775 4814->4768 4816 4043cd 4815->4816 4817 406805 18 API calls 4816->4817 4818 40440d 4817->4818 4819 406805 18 API calls 4818->4819 4820 404418 4819->4820 4821 406805 18 API calls 4820->4821 4822 404428 lstrlenW wsprintfW SetDlgItemTextW 4821->4822 4822->4785 4823 4026fc 4824 401ee4 4823->4824 4826 402708 4823->4826 4824->4823 4825 406805 18 API calls 4824->4825 4825->4824 4275 4019fd 4276 40145c 18 API calls 4275->4276 4277 401a04 4276->4277 4278 405e7f 2 API calls 4277->4278 4279 401a0b 4278->4279 4827 4022fd 4828 40145c 18 API calls 4827->4828 4829 402304 GetFileVersionInfoSizeW 4828->4829 4830 40232b GlobalAlloc 4829->4830 4834 4030e3 4829->4834 4831 40233f GetFileVersionInfoW 4830->4831 4830->4834 4832 402350 VerQueryValueW 4831->4832 4833 402381 GlobalFree 4831->4833 4832->4833 4836 402369 4832->4836 4833->4834 4840 405f51 wsprintfW 4836->4840 4838 402375 4841 405f51 wsprintfW 4838->4841 4840->4838 4841->4833 4842 402afd 4843 40145c 18 API calls 4842->4843 4844 402b04 4843->4844 4849 405e50 GetFileAttributesW CreateFileW 4844->4849 4846 402b10 4847 4030e3 4846->4847 4850 405f51 wsprintfW 4846->4850 4849->4846 4850->4847 4851 4029ff 4852 401553 19 API calls 4851->4852 4853 402a09 4852->4853 4854 40145c 18 API calls 4853->4854 4855 402a12 4854->4855 4856 402a1f RegQueryValueExW 4855->4856 4858 401a13 4855->4858 4857 402a3f 4856->4857 4861 402a45 4856->4861 4857->4861 4862 405f51 wsprintfW 4857->4862 4860 4029e4 RegCloseKey 4860->4858 4861->4858 4861->4860 4862->4861 4863 401000 4864 401037 BeginPaint GetClientRect 4863->4864 4865 40100c DefWindowProcW 4863->4865 4867 4010fc 4864->4867 4868 401182 4865->4868 4869 401073 CreateBrushIndirect FillRect DeleteObject 4867->4869 4870 401105 4867->4870 4869->4867 4871 401170 EndPaint 4870->4871 4872 40110b CreateFontIndirectW 4870->4872 4871->4868 4872->4871 4873 40111b 6 API calls 4872->4873 4873->4871 4874 401f80 4875 401446 18 API calls 4874->4875 4876 401f88 4875->4876 4877 401446 18 API calls 4876->4877 4878 401f93 4877->4878 4879 401fa3 4878->4879 4880 40145c 18 API calls 4878->4880 4881 401fb3 4879->4881 4882 40145c 18 API calls 4879->4882 4880->4879 4883 402006 4881->4883 4884 401fbc 4881->4884 4882->4881 4886 40145c 18 API calls 4883->4886 4885 401446 18 API calls 4884->4885 4888 401fc4 4885->4888 4887 40200d 4886->4887 4889 40145c 18 API calls 4887->4889 4890 401446 18 API calls 4888->4890 4891 402016 FindWindowExW 4889->4891 4892 401fce 4890->4892 4896 402036 4891->4896 4893 401ff6 SendMessageW 4892->4893 4894 401fd8 SendMessageTimeoutW 4892->4894 4893->4896 4894->4896 4895 4030e3 4896->4895 4898 405f51 wsprintfW 4896->4898 4898->4895 4899 402880 4900 402884 4899->4900 4901 40145c 18 API calls 4900->4901 4902 4028a7 4901->4902 4903 40145c 18 API calls 4902->4903 4904 4028b1 4903->4904 4905 4028ba RegCreateKeyExW 4904->4905 4906 4028e8 4905->4906 4913 4029ef 4905->4913 4907 402934 4906->4907 4908 40145c 18 API calls 4906->4908 4909 402963 4907->4909 4912 401446 18 API calls 4907->4912 4911 4028fc lstrlenW 4908->4911 4910 4029ae RegSetValueExW 4909->4910 4914 40337f 37 API calls 4909->4914 4917 4029c6 RegCloseKey 4910->4917 4918 4029cb 4910->4918 4915 402918 4911->4915 4916 40292a 4911->4916 4919 402947 4912->4919 4920 40297b 4914->4920 4921 4062a3 11 API calls 4915->4921 4922 4062a3 11 API calls 4916->4922 4917->4913 4923 4062a3 11 API calls 4918->4923 4924 4062a3 11 API calls 4919->4924 4930 406224 4920->4930 4926 402922 4921->4926 4922->4907 4923->4917 4924->4909 4926->4910 4929 4062a3 11 API calls 4929->4926 4931 406247 4930->4931 4932 40628a 4931->4932 4933 40625c wsprintfW 4931->4933 4934 402991 4932->4934 4935 406293 lstrcatW 4932->4935 4933->4932 4933->4933 4934->4929 4935->4934 4936 402082 4937 401446 18 API calls 4936->4937 4938 402093 SetWindowLongW 4937->4938 4939 4030e3 4938->4939 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3710 40141d 3520->3710 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3702 406c68 3529->3702 3707 405c3f CreateProcessW 3529->3707 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3713 406038 3546->3713 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3722 406722 lstrlenW CharPrevW 3549->3722 3729 405e50 GetFileAttributesW CreateFileW 3554->3729 3556 4035c7 3577 4035d7 3556->3577 3730 406009 lstrcpynW 3556->3730 3558 4035ed 3731 406751 lstrlenW 3558->3731 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3738 4032d2 3563->3738 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3772 403368 SetFilePointer 3565->3772 3749 403368 SetFilePointer 3567->3749 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3750 40337f 3571->3750 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3736 403336 ReadFile 3576->3736 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3813 405f51 wsprintfW 3585->3813 3814 405ed3 RegOpenKeyExW 3586->3814 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3796 403e95 3592->3796 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3820 403e74 3602->3820 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3819 406009 lstrcpynW 3620->3819 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3805 405047 OleInitialize 3626->3805 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3965 403c83 3640->3965 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4022 406009 lstrcpynW 3651->4022 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4023 405e50 GetFileAttributesW CreateFileW 3674->4023 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3696 406812 3683->3696 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4026 406009 lstrcpynW 3684->4026 3685->3527 3685->3529 3687 4068d3 GetVersion 3699 4068e0 3687->3699 3688 406a46 lstrlenW 3688->3696 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3699 3693 406952 GetSystemDirectoryW 3693->3699 3694 406965 GetWindowsDirectoryW 3694->3699 3695 406038 5 API calls 3695->3696 3696->3684 3696->3687 3696->3688 3696->3689 3696->3695 4024 405f51 wsprintfW 3696->4024 4025 406009 lstrcpynW 3696->4025 3697 406805 10 API calls 3697->3699 3698 4069df lstrcatW 3698->3696 3699->3692 3699->3693 3699->3694 3699->3696 3699->3697 3699->3698 3700 406999 SHGetSpecialFolderLocation 3699->3700 3700->3699 3701 4069b1 SHGetPathFromIDListW CoTaskMemFree 3700->3701 3701->3699 3703 4062fc 3 API calls 3702->3703 3704 406c6f 3703->3704 3706 406c90 3704->3706 4027 406a99 lstrcpyW 3704->4027 3706->3529 3708 405c7a 3707->3708 3709 405c6e CloseHandle 3707->3709 3708->3529 3709->3708 3711 40139d 80 API calls 3710->3711 3712 401432 3711->3712 3712->3495 3719 406045 3713->3719 3714 4060bb 3715 4060c1 CharPrevW 3714->3715 3717 4060e1 3714->3717 3715->3714 3716 4060ae CharNextW 3716->3714 3716->3719 3717->3549 3718 405d06 CharNextW 3718->3719 3719->3714 3719->3716 3719->3718 3720 40609a CharNextW 3719->3720 3721 4060a9 CharNextW 3719->3721 3720->3719 3721->3716 3723 4037ea CreateDirectoryW 3722->3723 3724 40673f lstrcatW 3722->3724 3725 405e7f 3723->3725 3724->3723 3726 405e8c GetTickCount GetTempFileNameW 3725->3726 3727 405ec2 3726->3727 3728 4037fe 3726->3728 3727->3726 3727->3728 3728->3475 3729->3556 3730->3558 3732 406760 3731->3732 3733 4035f3 3732->3733 3734 406766 CharPrevW 3732->3734 3735 406009 lstrcpynW 3733->3735 3734->3732 3734->3733 3735->3562 3737 403357 3736->3737 3737->3576 3739 4032f3 3738->3739 3740 4032db 3738->3740 3743 403303 GetTickCount 3739->3743 3744 4032fb 3739->3744 3741 4032e4 DestroyWindow 3740->3741 3742 4032eb 3740->3742 3741->3742 3742->3565 3746 403311 CreateDialogParamW ShowWindow 3743->3746 3747 403334 3743->3747 3773 406332 3744->3773 3746->3747 3747->3565 3749->3571 3752 403398 3750->3752 3751 4033c3 3754 403336 ReadFile 3751->3754 3752->3751 3795 403368 SetFilePointer 3752->3795 3755 4033ce 3754->3755 3756 4033e7 GetTickCount 3755->3756 3757 403518 3755->3757 3759 4033d2 3755->3759 3769 4033fa 3756->3769 3758 40351c 3757->3758 3763 403540 3757->3763 3760 403336 ReadFile 3758->3760 3759->3580 3760->3759 3761 403336 ReadFile 3761->3763 3762 403336 ReadFile 3762->3769 3763->3759 3763->3761 3764 40355f WriteFile 3763->3764 3764->3759 3765 403574 3764->3765 3765->3759 3765->3763 3767 40345c GetTickCount 3767->3769 3768 403485 MulDiv wsprintfW 3784 404f72 3768->3784 3769->3759 3769->3762 3769->3767 3769->3768 3771 4034c9 WriteFile 3769->3771 3777 407312 3769->3777 3771->3759 3771->3769 3772->3572 3774 40634f PeekMessageW 3773->3774 3775 406345 DispatchMessageW 3774->3775 3776 403301 3774->3776 3775->3774 3776->3565 3778 407332 3777->3778 3779 40733a 3777->3779 3778->3769 3779->3778 3780 4073c2 GlobalFree 3779->3780 3781 4073cb GlobalAlloc 3779->3781 3782 407443 GlobalAlloc 3779->3782 3783 40743a GlobalFree 3779->3783 3780->3781 3781->3778 3781->3779 3782->3778 3782->3779 3783->3782 3785 404f8b 3784->3785 3794 40502f 3784->3794 3786 404fa9 lstrlenW 3785->3786 3787 406805 18 API calls 3785->3787 3788 404fd2 3786->3788 3789 404fb7 lstrlenW 3786->3789 3787->3786 3791 404fe5 3788->3791 3792 404fd8 SetWindowTextW 3788->3792 3790 404fc9 lstrcatW 3789->3790 3789->3794 3790->3788 3793 404feb SendMessageW SendMessageW SendMessageW 3791->3793 3791->3794 3792->3791 3793->3794 3794->3769 3795->3751 3797 403ea9 3796->3797 3825 405f51 wsprintfW 3797->3825 3799 403f1d 3800 406805 18 API calls 3799->3800 3801 403f29 SetWindowTextW 3800->3801 3803 403f44 3801->3803 3802 403f5f 3802->3595 3803->3802 3804 406805 18 API calls 3803->3804 3804->3803 3826 403daf 3805->3826 3807 40506a 3810 4062a3 11 API calls 3807->3810 3812 405095 3807->3812 3829 40139d 3807->3829 3808 403daf SendMessageW 3809 4050a5 OleUninitialize 3808->3809 3809->3632 3810->3807 3812->3808 3813->3592 3815 405f07 RegQueryValueExW 3814->3815 3816 405989 3814->3816 3817 405f29 RegCloseKey 3815->3817 3816->3590 3816->3591 3817->3816 3819->3597 3964 406009 lstrcpynW 3820->3964 3822 403e88 3823 406722 3 API calls 3822->3823 3824 403e8e lstrcatW 3823->3824 3824->3615 3825->3799 3827 403dc7 3826->3827 3828 403db8 SendMessageW 3826->3828 3827->3807 3828->3827 3832 4013a4 3829->3832 3830 401410 3830->3807 3832->3830 3833 4013dd MulDiv SendMessageW 3832->3833 3834 4015a0 3832->3834 3833->3832 3835 4015fa 3834->3835 3914 40160c 3834->3914 3836 401601 3835->3836 3837 401742 3835->3837 3838 401962 3835->3838 3839 4019ca 3835->3839 3840 40176e 3835->3840 3841 401650 3835->3841 3842 4017b1 3835->3842 3843 401672 3835->3843 3844 401693 3835->3844 3845 401616 3835->3845 3846 4016d6 3835->3846 3847 401736 3835->3847 3848 401897 3835->3848 3849 4018db 3835->3849 3850 40163c 3835->3850 3851 4016bd 3835->3851 3835->3914 3864 4062a3 11 API calls 3836->3864 3856 401751 ShowWindow 3837->3856 3857 401758 3837->3857 3861 40145c 18 API calls 3838->3861 3854 40145c 18 API calls 3839->3854 3858 40145c 18 API calls 3840->3858 3881 4062a3 11 API calls 3841->3881 3947 40145c 3842->3947 3859 40145c 18 API calls 3843->3859 3941 401446 3844->3941 3853 40145c 18 API calls 3845->3853 3870 401446 18 API calls 3846->3870 3846->3914 3847->3914 3963 405f51 wsprintfW 3847->3963 3860 40145c 18 API calls 3848->3860 3865 40145c 18 API calls 3849->3865 3855 401647 PostQuitMessage 3850->3855 3850->3914 3852 4062a3 11 API calls 3851->3852 3867 4016c7 SetForegroundWindow 3852->3867 3868 40161c 3853->3868 3869 4019d1 SearchPathW 3854->3869 3855->3914 3856->3857 3871 401765 ShowWindow 3857->3871 3857->3914 3872 401775 3858->3872 3873 401678 3859->3873 3874 40189d 3860->3874 3875 401968 GetFullPathNameW 3861->3875 3864->3914 3866 4018e2 3865->3866 3878 40145c 18 API calls 3866->3878 3867->3914 3879 4062a3 11 API calls 3868->3879 3869->3914 3870->3914 3871->3914 3882 4062a3 11 API calls 3872->3882 3883 4062a3 11 API calls 3873->3883 3959 4062d5 FindFirstFileW 3874->3959 3885 40197f 3875->3885 3927 4019a1 3875->3927 3877 40169a 3944 4062a3 lstrlenW wvsprintfW 3877->3944 3888 4018eb 3878->3888 3889 401627 3879->3889 3890 401664 3881->3890 3891 401785 SetFileAttributesW 3882->3891 3892 401683 3883->3892 3909 4062d5 2 API calls 3885->3909 3885->3927 3886 4062a3 11 API calls 3894 4017c9 3886->3894 3897 40145c 18 API calls 3888->3897 3898 404f72 25 API calls 3889->3898 3899 40139d 65 API calls 3890->3899 3900 40179a 3891->3900 3891->3914 3907 404f72 25 API calls 3892->3907 3952 405d59 CharNextW CharNextW 3894->3952 3896 4019b8 GetShortPathNameW 3896->3914 3905 4018f5 3897->3905 3898->3914 3899->3914 3906 4062a3 11 API calls 3900->3906 3901 4018c2 3910 4062a3 11 API calls 3901->3910 3902 4018a9 3908 4062a3 11 API calls 3902->3908 3912 4062a3 11 API calls 3905->3912 3906->3914 3907->3914 3908->3914 3913 401991 3909->3913 3910->3914 3911 4017d4 3915 401864 3911->3915 3918 405d06 CharNextW 3911->3918 3936 4062a3 11 API calls 3911->3936 3916 401902 MoveFileW 3912->3916 3913->3927 3962 406009 lstrcpynW 3913->3962 3914->3832 3915->3892 3917 40186e 3915->3917 3919 401912 3916->3919 3920 40191e 3916->3920 3921 404f72 25 API calls 3917->3921 3923 4017e6 CreateDirectoryW 3918->3923 3919->3892 3925 401942 3920->3925 3930 4062d5 2 API calls 3920->3930 3926 401875 3921->3926 3923->3911 3924 4017fe GetLastError 3923->3924 3928 401827 GetFileAttributesW 3924->3928 3929 40180b GetLastError 3924->3929 3935 4062a3 11 API calls 3925->3935 3958 406009 lstrcpynW 3926->3958 3927->3896 3927->3914 3928->3911 3932 4062a3 11 API calls 3929->3932 3933 401929 3930->3933 3932->3911 3933->3925 3938 406c68 42 API calls 3933->3938 3934 401882 SetCurrentDirectoryW 3934->3914 3937 40195c 3935->3937 3936->3911 3937->3914 3939 401936 3938->3939 3940 404f72 25 API calls 3939->3940 3940->3925 3942 406805 18 API calls 3941->3942 3943 401455 3942->3943 3943->3877 3945 4060e7 9 API calls 3944->3945 3946 4016a7 Sleep 3945->3946 3946->3914 3948 406805 18 API calls 3947->3948 3949 401488 3948->3949 3950 401497 3949->3950 3951 406038 5 API calls 3949->3951 3950->3886 3951->3950 3953 405d76 3952->3953 3954 405d88 3952->3954 3953->3954 3955 405d83 CharNextW 3953->3955 3956 405dac 3954->3956 3957 405d06 CharNextW 3954->3957 3955->3956 3956->3911 3957->3954 3958->3934 3960 4018a5 3959->3960 3961 4062eb FindClose 3959->3961 3960->3901 3960->3902 3961->3960 3962->3927 3963->3914 3964->3822 3966 403c91 3965->3966 3967 403876 3966->3967 3968 403c96 FreeLibrary GlobalFree 3966->3968 3969 406c9b 3967->3969 3968->3967 3968->3968 3970 40677e 18 API calls 3969->3970 3971 406cae 3970->3971 3972 406cb7 DeleteFileW 3971->3972 3973 406cce 3971->3973 4013 403882 CoUninitialize 3972->4013 3974 406e4b 3973->3974 4017 406009 lstrcpynW 3973->4017 3980 4062d5 2 API calls 3974->3980 4002 406e58 3974->4002 3974->4013 3976 406cf9 3977 406d03 lstrcatW 3976->3977 3978 406d0d 3976->3978 3979 406d13 3977->3979 3981 406751 2 API calls 3978->3981 3983 406d23 lstrcatW 3979->3983 3984 406d19 3979->3984 3982 406e64 3980->3982 3981->3979 3987 406722 3 API calls 3982->3987 3982->4013 3986 406d2b lstrlenW FindFirstFileW 3983->3986 3984->3983 3984->3986 3985 4062a3 11 API calls 3985->4013 3988 406e3b 3986->3988 3992 406d52 3986->3992 3989 406e6e 3987->3989 3988->3974 3991 4062a3 11 API calls 3989->3991 3990 405d06 CharNextW 3990->3992 3993 406e79 3991->3993 3992->3990 3996 406e18 FindNextFileW 3992->3996 4005 406c9b 72 API calls 3992->4005 4012 404f72 25 API calls 3992->4012 4014 4062a3 11 API calls 3992->4014 4015 404f72 25 API calls 3992->4015 4016 406c68 42 API calls 3992->4016 4018 406009 lstrcpynW 3992->4018 4019 405e30 GetFileAttributesW 3992->4019 3994 405e30 2 API calls 3993->3994 3995 406e81 RemoveDirectoryW 3994->3995 3999 406ec4 3995->3999 4000 406e8d 3995->4000 3996->3992 3998 406e30 FindClose 3996->3998 3998->3988 4001 404f72 25 API calls 3999->4001 4000->4002 4003 406e93 4000->4003 4001->4013 4002->3985 4004 4062a3 11 API calls 4003->4004 4006 406e9d 4004->4006 4005->3992 4008 404f72 25 API calls 4006->4008 4010 406ea7 4008->4010 4011 406c68 42 API calls 4010->4011 4011->4013 4012->3996 4013->3491 4013->3492 4014->3992 4015->3992 4016->3992 4017->3976 4018->3992 4020 405e4d DeleteFileW 4019->4020 4021 405e3f SetFileAttributesW 4019->4021 4020->3992 4021->4020 4022->3653 4023->3677 4024->3696 4025->3696 4026->3685 4028 406ae7 GetShortPathNameW 4027->4028 4029 406abe 4027->4029 4030 406b00 4028->4030 4031 406c62 4028->4031 4053 405e50 GetFileAttributesW CreateFileW 4029->4053 4030->4031 4033 406b08 WideCharToMultiByte 4030->4033 4031->3706 4033->4031 4035 406b25 WideCharToMultiByte 4033->4035 4034 406ac7 CloseHandle GetShortPathNameW 4034->4031 4036 406adf 4034->4036 4035->4031 4037 406b3d wsprintfA 4035->4037 4036->4028 4036->4031 4038 406805 18 API calls 4037->4038 4039 406b69 4038->4039 4054 405e50 GetFileAttributesW CreateFileW 4039->4054 4041 406b76 4041->4031 4042 406b83 GetFileSize GlobalAlloc 4041->4042 4043 406ba4 ReadFile 4042->4043 4044 406c58 CloseHandle 4042->4044 4043->4044 4045 406bbe 4043->4045 4044->4031 4045->4044 4055 405db6 lstrlenA 4045->4055 4048 406bd7 lstrcpyA 4051 406bf9 4048->4051 4049 406beb 4050 405db6 4 API calls 4049->4050 4050->4051 4052 406c30 SetFilePointer WriteFile GlobalFree 4051->4052 4052->4044 4053->4034 4054->4041 4056 405df7 lstrlenA 4055->4056 4057 405dd0 lstrcmpiA 4056->4057 4058 405dff 4056->4058 4057->4058 4059 405dee CharNextA 4057->4059 4058->4048 4058->4049 4059->4056 4940 402a84 4941 401553 19 API calls 4940->4941 4942 402a8e 4941->4942 4943 401446 18 API calls 4942->4943 4944 402a98 4943->4944 4945 401a13 4944->4945 4946 402ab2 RegEnumKeyW 4944->4946 4947 402abe RegEnumValueW 4944->4947 4948 402a7e 4946->4948 4947->4945 4947->4948 4948->4945 4949 4029e4 RegCloseKey 4948->4949 4949->4945 4950 402c8a 4951 402ca2 4950->4951 4952 402c8f 4950->4952 4954 40145c 18 API calls 4951->4954 4953 401446 18 API calls 4952->4953 4956 402c97 4953->4956 4955 402ca9 lstrlenW 4954->4955 4955->4956 4957 402ccb WriteFile 4956->4957 4958 401a13 4956->4958 4957->4958 4959 40400d 4960 40406a 4959->4960 4961 40401a lstrcpynA lstrlenA 4959->4961 4961->4960 4962 40404b 4961->4962 4962->4960 4963 404057 GlobalFree 4962->4963 4963->4960 4964 401d8e 4965 40145c 18 API calls 4964->4965 4966 401d95 ExpandEnvironmentStringsW 4965->4966 4967 401da8 4966->4967 4969 401db9 4966->4969 4968 401dad lstrcmpW 4967->4968 4967->4969 4968->4969 4970 401e0f 4971 401446 18 API calls 4970->4971 4972 401e17 4971->4972 4973 401446 18 API calls 4972->4973 4974 401e21 4973->4974 4975 4030e3 4974->4975 4977 405f51 wsprintfW 4974->4977 4977->4975 4978 402392 4979 40145c 18 API calls 4978->4979 4980 402399 4979->4980 4983 4071f8 4980->4983 4984 406ed2 25 API calls 4983->4984 4985 407218 4984->4985 4986 407222 lstrcpynW lstrcmpW 4985->4986 4987 4023a7 4985->4987 4988 407254 4986->4988 4989 40725a lstrcpynW 4986->4989 4988->4989 4989->4987 4060 402713 4075 406009 lstrcpynW 4060->4075 4062 40272c 4076 406009 lstrcpynW 4062->4076 4064 402738 4065 40145c 18 API calls 4064->4065 4067 402743 4064->4067 4065->4067 4066 402752 4069 40145c 18 API calls 4066->4069 4071 402761 4066->4071 4067->4066 4068 40145c 18 API calls 4067->4068 4068->4066 4069->4071 4070 40145c 18 API calls 4072 40276b 4070->4072 4071->4070 4073 4062a3 11 API calls 4072->4073 4074 40277f WritePrivateProfileStringW 4073->4074 4075->4062 4076->4064 4990 402797 4991 40145c 18 API calls 4990->4991 4992 4027ae 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027b7 4993->4994 4995 40145c 18 API calls 4994->4995 4996 4027c0 GetPrivateProfileStringW lstrcmpW 4995->4996 4997 402e18 4998 40145c 18 API calls 4997->4998 4999 402e1f FindFirstFileW 4998->4999 5000 402e32 4999->5000 5005 405f51 wsprintfW 5000->5005 5002 402e43 5006 406009 lstrcpynW 5002->5006 5004 402e50 5005->5002 5006->5004 5007 401e9a 5008 40145c 18 API calls 5007->5008 5009 401ea1 5008->5009 5010 401446 18 API calls 5009->5010 5011 401eab wsprintfW 5010->5011 4287 401a1f 4288 40145c 18 API calls 4287->4288 4289 401a26 4288->4289 4290 4062a3 11 API calls 4289->4290 4291 401a49 4290->4291 4292 401a64 4291->4292 4293 401a5c 4291->4293 4341 406009 lstrcpynW 4292->4341 4340 406009 lstrcpynW 4293->4340 4296 401a62 4300 406038 5 API calls 4296->4300 4297 401a6f 4298 406722 3 API calls 4297->4298 4299 401a75 lstrcatW 4298->4299 4299->4296 4302 401a81 4300->4302 4301 4062d5 2 API calls 4301->4302 4302->4301 4303 405e30 2 API calls 4302->4303 4305 401a98 CompareFileTime 4302->4305 4306 401ba9 4302->4306 4310 4062a3 11 API calls 4302->4310 4314 406009 lstrcpynW 4302->4314 4320 406805 18 API calls 4302->4320 4327 405ca0 MessageBoxIndirectW 4302->4327 4331 401b50 4302->4331 4338 401b5d 4302->4338 4339 405e50 GetFileAttributesW CreateFileW 4302->4339 4303->4302 4305->4302 4307 404f72 25 API calls 4306->4307 4309 401bb3 4307->4309 4308 404f72 25 API calls 4311 401b70 4308->4311 4312 40337f 37 API calls 4309->4312 4310->4302 4315 4062a3 11 API calls 4311->4315 4313 401bc6 4312->4313 4316 4062a3 11 API calls 4313->4316 4314->4302 4322 401b8b 4315->4322 4317 401bda 4316->4317 4318 401be9 SetFileTime 4317->4318 4319 401bf8 CloseHandle 4317->4319 4318->4319 4321 401c09 4319->4321 4319->4322 4320->4302 4323 401c21 4321->4323 4324 401c0e 4321->4324 4326 406805 18 API calls 4323->4326 4325 406805 18 API calls 4324->4325 4328 401c16 lstrcatW 4325->4328 4329 401c29 4326->4329 4327->4302 4328->4329 4330 4062a3 11 API calls 4329->4330 4332 401c34 4330->4332 4333 401b93 4331->4333 4334 401b53 4331->4334 4335 405ca0 MessageBoxIndirectW 4332->4335 4336 4062a3 11 API calls 4333->4336 4337 4062a3 11 API calls 4334->4337 4335->4322 4336->4322 4337->4338 4338->4308 4339->4302 4340->4296 4341->4297 5012 40209f GetDlgItem GetClientRect 5013 40145c 18 API calls 5012->5013 5014 4020cf LoadImageW SendMessageW 5013->5014 5015 4030e3 5014->5015 5016 4020ed DeleteObject 5014->5016 5016->5015 5017 402b9f 5018 401446 18 API calls 5017->5018 5023 402ba7 5018->5023 5019 402c4a 5020 402bdf ReadFile 5022 402c3d 5020->5022 5020->5023 5021 401446 18 API calls 5021->5022 5022->5019 5022->5021 5029 402d17 ReadFile 5022->5029 5023->5019 5023->5020 5023->5022 5024 402c06 MultiByteToWideChar 5023->5024 5025 402c3f 5023->5025 5027 402c4f 5023->5027 5024->5023 5024->5027 5030 405f51 wsprintfW 5025->5030 5027->5022 5028 402c6b SetFilePointer 5027->5028 5028->5022 5029->5022 5030->5019 5031 402b23 GlobalAlloc 5032 402b39 5031->5032 5033 402b4b 5031->5033 5034 401446 18 API calls 5032->5034 5035 40145c 18 API calls 5033->5035 5036 402b41 5034->5036 5037 402b52 WideCharToMultiByte lstrlenA 5035->5037 5038 402b93 5036->5038 5039 402b84 WriteFile 5036->5039 5037->5036 5039->5038 5040 402384 GlobalFree 5039->5040 5040->5038 5042 4044a5 5043 404512 5042->5043 5044 4044df 5042->5044 5046 40451f GetDlgItem GetAsyncKeyState 5043->5046 5053 4045b1 5043->5053 5110 405c84 GetDlgItemTextW 5044->5110 5049 40453e GetDlgItem 5046->5049 5056 40455c 5046->5056 5047 4044ea 5050 406038 5 API calls 5047->5050 5048 40469d 5108 404833 5048->5108 5112 405c84 GetDlgItemTextW 5048->5112 5051 403d3f 19 API calls 5049->5051 5052 4044f0 5050->5052 5055 404551 ShowWindow 5051->5055 5058 403e74 5 API calls 5052->5058 5053->5048 5059 406805 18 API calls 5053->5059 5053->5108 5055->5056 5061 404579 SetWindowTextW 5056->5061 5066 405d59 4 API calls 5056->5066 5057 403dca 8 API calls 5062 404847 5057->5062 5063 4044f5 GetDlgItem 5058->5063 5064 40462f SHBrowseForFolderW 5059->5064 5060 4046c9 5065 40677e 18 API calls 5060->5065 5067 403d3f 19 API calls 5061->5067 5068 404503 IsDlgButtonChecked 5063->5068 5063->5108 5064->5048 5069 404647 CoTaskMemFree 5064->5069 5070 4046cf 5065->5070 5071 40456f 5066->5071 5072 404597 5067->5072 5068->5043 5073 406722 3 API calls 5069->5073 5113 406009 lstrcpynW 5070->5113 5071->5061 5077 406722 3 API calls 5071->5077 5074 403d3f 19 API calls 5072->5074 5075 404654 5073->5075 5078 4045a2 5074->5078 5079 40468b SetDlgItemTextW 5075->5079 5084 406805 18 API calls 5075->5084 5077->5061 5111 403d98 SendMessageW 5078->5111 5079->5048 5080 4046e6 5082 4062fc 3 API calls 5080->5082 5091 4046ee 5082->5091 5083 4045aa 5087 4062fc 3 API calls 5083->5087 5085 404673 lstrcmpiW 5084->5085 5085->5079 5088 404684 lstrcatW 5085->5088 5086 404730 5114 406009 lstrcpynW 5086->5114 5087->5053 5088->5079 5090 404739 5092 405d59 4 API calls 5090->5092 5091->5086 5096 406751 2 API calls 5091->5096 5097 404785 5091->5097 5093 40473f GetDiskFreeSpaceW 5092->5093 5095 404763 MulDiv 5093->5095 5093->5097 5095->5097 5096->5091 5099 4047e2 5097->5099 5100 4043ad 21 API calls 5097->5100 5098 404805 5115 403d85 KiUserCallbackDispatcher 5098->5115 5099->5098 5101 40141d 80 API calls 5099->5101 5102 4047d3 5100->5102 5101->5098 5104 4047e4 SetDlgItemTextW 5102->5104 5105 4047d8 5102->5105 5104->5099 5106 4043ad 21 API calls 5105->5106 5106->5099 5107 404821 5107->5108 5116 403d61 5107->5116 5108->5057 5110->5047 5111->5083 5112->5060 5113->5080 5114->5090 5115->5107 5117 403d74 SendMessageW 5116->5117 5118 403d6f 5116->5118 5117->5108 5118->5117 5119 402da5 5120 4030e3 5119->5120 5121 402dac 5119->5121 5122 401446 18 API calls 5121->5122 5123 402db8 5122->5123 5124 402dbf SetFilePointer 5123->5124 5124->5120 5125 402dcf 5124->5125 5125->5120 5127 405f51 wsprintfW 5125->5127 5127->5120 5128 4030a9 SendMessageW 5129 4030c2 InvalidateRect 5128->5129 5130 4030e3 5128->5130 5129->5130 5131 401cb2 5132 40145c 18 API calls 5131->5132 5133 401c54 5132->5133 5134 4062a3 11 API calls 5133->5134 5137 401c64 5133->5137 5135 401c59 5134->5135 5136 406c9b 81 API calls 5135->5136 5136->5137 4087 4021b5 4088 40145c 18 API calls 4087->4088 4089 4021bb 4088->4089 4090 40145c 18 API calls 4089->4090 4091 4021c4 4090->4091 4092 40145c 18 API calls 4091->4092 4093 4021cd 4092->4093 4094 40145c 18 API calls 4093->4094 4095 4021d6 4094->4095 4096 404f72 25 API calls 4095->4096 4097 4021e2 ShellExecuteW 4096->4097 4098 40221b 4097->4098 4099 40220d 4097->4099 4101 4062a3 11 API calls 4098->4101 4100 4062a3 11 API calls 4099->4100 4100->4098 4102 402230 4101->4102 5145 402238 5146 40145c 18 API calls 5145->5146 5147 40223e 5146->5147 5148 4062a3 11 API calls 5147->5148 5149 40224b 5148->5149 5150 404f72 25 API calls 5149->5150 5151 402255 5150->5151 5152 405c3f 2 API calls 5151->5152 5153 40225b 5152->5153 5154 4062a3 11 API calls 5153->5154 5157 4022ac CloseHandle 5153->5157 5160 40226d 5154->5160 5156 4030e3 5157->5156 5158 402283 WaitForSingleObject 5159 402291 GetExitCodeProcess 5158->5159 5158->5160 5159->5157 5162 4022a3 5159->5162 5160->5157 5160->5158 5161 406332 2 API calls 5160->5161 5161->5158 5164 405f51 wsprintfW 5162->5164 5164->5157 5165 4040b8 5166 4040d3 5165->5166 5174 404201 5165->5174 5170 40410e 5166->5170 5196 403fca WideCharToMultiByte 5166->5196 5167 40426c 5168 404276 GetDlgItem 5167->5168 5169 40433e 5167->5169 5171 404290 5168->5171 5172 4042ff 5168->5172 5175 403dca 8 API calls 5169->5175 5177 403d3f 19 API calls 5170->5177 5171->5172 5180 4042b6 6 API calls 5171->5180 5172->5169 5181 404311 5172->5181 5174->5167 5174->5169 5176 40423b GetDlgItem SendMessageW 5174->5176 5179 404339 5175->5179 5201 403d85 KiUserCallbackDispatcher 5176->5201 5178 40414e 5177->5178 5183 403d3f 19 API calls 5178->5183 5180->5172 5184 404327 5181->5184 5185 404317 SendMessageW 5181->5185 5188 40415b CheckDlgButton 5183->5188 5184->5179 5189 40432d SendMessageW 5184->5189 5185->5184 5186 404267 5187 403d61 SendMessageW 5186->5187 5187->5167 5199 403d85 KiUserCallbackDispatcher 5188->5199 5189->5179 5191 404179 GetDlgItem 5200 403d98 SendMessageW 5191->5200 5193 40418f SendMessageW 5194 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5193->5194 5195 4041ac GetSysColor 5193->5195 5194->5179 5195->5194 5197 404007 5196->5197 5198 403fe9 GlobalAlloc WideCharToMultiByte 5196->5198 5197->5170 5198->5197 5199->5191 5200->5193 5201->5186 4196 401eb9 4197 401f24 4196->4197 4198 401ec6 4196->4198 4199 401f53 GlobalAlloc 4197->4199 4200 401f28 4197->4200 4201 401ed5 4198->4201 4208 401ef7 4198->4208 4202 406805 18 API calls 4199->4202 4207 4062a3 11 API calls 4200->4207 4212 401f36 4200->4212 4203 4062a3 11 API calls 4201->4203 4206 401f46 4202->4206 4204 401ee2 4203->4204 4209 402708 4204->4209 4214 406805 18 API calls 4204->4214 4206->4209 4210 402387 GlobalFree 4206->4210 4207->4212 4218 406009 lstrcpynW 4208->4218 4210->4209 4220 406009 lstrcpynW 4212->4220 4213 401f06 4219 406009 lstrcpynW 4213->4219 4214->4204 4216 401f15 4221 406009 lstrcpynW 4216->4221 4218->4213 4219->4216 4220->4206 4221->4209 5202 4074bb 5204 407344 5202->5204 5203 407c6d 5204->5203 5205 4073c2 GlobalFree 5204->5205 5206 4073cb GlobalAlloc 5204->5206 5207 407443 GlobalAlloc 5204->5207 5208 40743a GlobalFree 5204->5208 5205->5206 5206->5203 5206->5204 5207->5203 5207->5204 5208->5207

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                                            • GetClientRect.USER32(?,?), ref: 00405196
                                                                            • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                                            • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                                            • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                                              • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                              • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                                            • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                                            • ShowWindow.USER32(00000000), ref: 004052E7
                                                                            • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                                            • ShowWindow.USER32(00000008), ref: 00405333
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                                            • CreatePopupMenu.USER32 ref: 00405376
                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                                            • GetWindowRect.USER32(?,?), ref: 0040539E
                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                                            • OpenClipboard.USER32(00000000), ref: 0040540B
                                                                            • EmptyClipboard.USER32 ref: 00405411
                                                                            • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                                            • CloseClipboard.USER32 ref: 0040546E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                            • String ID: @rD$New install of "%s" to "%s"${
                                                                            • API String ID: 2110491804-2409696222
                                                                            • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                            • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                                            • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                            • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                                            APIs
                                                                            • #17.COMCTL32 ref: 004038A2
                                                                            • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                                            • OleInitialize.OLE32(00000000), ref: 004038B4
                                                                              • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                              • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                              • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                            • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                                              • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                            • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                                            • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                                            • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                                            • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                                            • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                                            • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                                            • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                                            • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                                            • ExitProcess.KERNEL32 ref: 00403AF1
                                                                            • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                                            • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                                            • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                                            • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                                            • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                                            • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                                            • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                                            • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                            • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                                            • API String ID: 2435955865-239407132
                                                                            • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                            • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                                            • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                            • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 820 4074bb-4074c0 821 4074c2-4074ef 820->821 822 40752f-407547 820->822 824 4074f1-4074f4 821->824 825 4074f6-4074fa 821->825 823 407aeb-407aff 822->823 829 407b01-407b17 823->829 830 407b19-407b2c 823->830 826 407506-407509 824->826 827 407502 825->827 828 4074fc-407500 825->828 831 407527-40752a 826->831 832 40750b-407514 826->832 827->826 828->826 833 407b33-407b3a 829->833 830->833 836 4076f6-407713 831->836 837 407516 832->837 838 407519-407525 832->838 834 407b61-407c68 833->834 835 407b3c-407b40 833->835 851 407350 834->851 852 407cec 834->852 840 407b46-407b5e 835->840 841 407ccd-407cd4 835->841 843 407715-407729 836->843 844 40772b-40773e 836->844 837->838 839 407589-4075b6 838->839 847 4075d2-4075ec 839->847 848 4075b8-4075d0 839->848 840->834 845 407cdd-407cea 841->845 849 407741-40774b 843->849 844->849 850 407cef-407cf6 845->850 853 4075f0-4075fa 847->853 848->853 854 40774d 849->854 855 4076ee-4076f4 849->855 856 407357-40735b 851->856 857 40749b-4074b6 851->857 858 40746d-407471 851->858 859 4073ff-407403 851->859 852->850 862 407600 853->862 863 407571-407577 853->863 864 407845-4078a1 854->864 865 4076c9-4076cd 854->865 855->836 861 407692-40769c 855->861 856->845 866 407361-40736e 856->866 857->823 871 407c76-407c7d 858->871 872 407477-40748b 858->872 877 407409-407420 859->877 878 407c6d-407c74 859->878 867 4076a2-4076c4 861->867 868 407c9a-407ca1 861->868 880 407556-40756e 862->880 881 407c7f-407c86 862->881 869 40762a-407630 863->869 870 40757d-407583 863->870 864->823 873 407c91-407c98 865->873 874 4076d3-4076eb 865->874 866->852 882 407374-4073ba 866->882 867->864 868->845 883 40768e 869->883 884 407632-40764f 869->884 870->839 870->883 871->845 879 40748e-407496 872->879 873->845 874->855 885 407423-407427 877->885 878->845 879->858 889 407498 879->889 880->863 881->845 887 4073e2-4073e4 882->887 888 4073bc-4073c0 882->888 883->861 890 407651-407665 884->890 891 407667-40767a 884->891 885->859 886 407429-40742f 885->886 893 407431-407438 886->893 894 407459-40746b 886->894 897 4073f5-4073fd 887->897 898 4073e6-4073f3 887->898 895 4073c2-4073c5 GlobalFree 888->895 896 4073cb-4073d9 GlobalAlloc 888->896 889->857 892 40767d-407687 890->892 891->892 892->869 899 407689 892->899 900 407443-407453 GlobalAlloc 893->900 901 40743a-40743d GlobalFree 893->901 894->879 895->896 896->852 902 4073df 896->902 897->885 898->897 898->898 904 407c88-407c8f 899->904 905 40760f-407627 899->905 900->852 900->894 901->900 902->887 904->845 905->869
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                            • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                                            • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                            • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                            • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleLibraryLoadModuleProc
                                                                            • String ID:
                                                                            • API String ID: 310444273-0
                                                                            • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                            • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                                            • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                            • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                            • FindClose.KERNEL32(00000000), ref: 004062EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                            • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                                            • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                            • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                                            • ShowWindow.USER32(?), ref: 004054D2
                                                                            • DestroyWindow.USER32 ref: 004054E6
                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                                            • GetDlgItem.USER32(?,?), ref: 00405523
                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                                            • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                                            • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                                            • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                                            • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                                            • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                                            • EnableWindow.USER32(?,?), ref: 00405757
                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                                            • EnableMenuItem.USER32(00000000), ref: 00405774
                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                                            • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                                            • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                                            • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                            • String ID: @rD
                                                                            • API String ID: 3282139019-3814967855
                                                                            • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                            • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                                            • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                            • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                                            APIs
                                                                            • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                            • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                            • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                            • ShowWindow.USER32(?), ref: 00401753
                                                                            • ShowWindow.USER32(?), ref: 00401767
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                            • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                            • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                            • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                            • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                            • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                            • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                            • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                            • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                            Strings
                                                                            • Jump: %d, xrefs: 00401602
                                                                            • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                            • CreateDirectory: "%s" created, xrefs: 00401849
                                                                            • SetFileAttributes failed., xrefs: 004017A1
                                                                            • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                            • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                            • Sleep(%d), xrefs: 0040169D
                                                                            • detailprint: %s, xrefs: 00401679
                                                                            • Aborting: "%s", xrefs: 0040161D
                                                                            • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                            • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                            • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                            • Rename: %s, xrefs: 004018F8
                                                                            • Rename failed: %s, xrefs: 0040194B
                                                                            • Rename on reboot: %s, xrefs: 00401943
                                                                            • Call: %d, xrefs: 0040165A
                                                                            • BringToFront, xrefs: 004016BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                            • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                            • API String ID: 2872004960-3619442763
                                                                            • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                            • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                                            • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                            • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                                            APIs
                                                                              • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                              • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                              • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                            • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                                            • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                                            • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                                            • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                                              • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                                            • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                                            • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                                              • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                                            • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                                            • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                                            • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                                            • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                                            • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                                            • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                            • API String ID: 608394941-1650083594
                                                                            • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                            • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                                            • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                            • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            • lstrcatW.KERNEL32(00000000,00000000,AimsBroadcast,004CB0B0,00000000,00000000), ref: 00401A76
                                                                            • CompareFileTime.KERNEL32(-00000014,?,AimsBroadcast,AimsBroadcast,00000000,00000000,AimsBroadcast,004CB0B0,00000000,00000000), ref: 00401AA0
                                                                              • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                              • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                              • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                            • String ID: AimsBroadcast$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                            • API String ID: 4286501637-1059133850
                                                                            • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                            • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                                            • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                            • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00403598
                                                                            • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                                              • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                              • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                            • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                                            Strings
                                                                            • soft, xrefs: 00403675
                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                                            • Null, xrefs: 0040367E
                                                                            • Error launching installer, xrefs: 004035D7
                                                                            • Inst, xrefs: 0040366C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                            • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                            • API String ID: 4283519449-527102705
                                                                            • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                            • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                                            • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                            • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 004033E7
                                                                            • GetTickCount.KERNEL32 ref: 00403464
                                                                            • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                                            • wsprintfW.USER32 ref: 004034A4
                                                                            • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                                            • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileTickWrite$wsprintf
                                                                            • String ID: ... %d%%$P1B$X1C$X1C
                                                                            • API String ID: 651206458-1535804072
                                                                            • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                            • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                                            • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                            • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                            • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                            • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                            • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                              • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                            • String ID:
                                                                            • API String ID: 2740478559-0
                                                                            • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                            • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                                            • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                            • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f7b GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 750 4030e3-4030f2 734->750 751 402387-40238d GlobalFree 734->751 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 747->750 763 402708-40270e 748->763 751->750 763->750
                                                                            APIs
                                                                              • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                            • GlobalFree.KERNELBASE(007BBE10), ref: 00402387
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FreeGloballstrcpyn
                                                                            • String ID: AimsBroadcast$Exch: stack < %d elements$Pop: stack empty
                                                                            • API String ID: 1459762280-3787231576
                                                                            • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                            • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                                            • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                            • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 766 4022fd-402325 call 40145c GetFileVersionInfoSizeW 769 4030e3-4030f2 766->769 770 40232b-402339 GlobalAlloc 766->770 770->769 771 40233f-40234e GetFileVersionInfoW 770->771 773 402350-402367 VerQueryValueW 771->773 774 402384-40238d GlobalFree 771->774 773->774 777 402369-402381 call 405f51 * 2 773->777 774->769 777->774
                                                                            APIs
                                                                            • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                            • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                            • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                                              • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                            • GlobalFree.KERNELBASE(007BBE10), ref: 00402387
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                            • String ID:
                                                                            • API String ID: 3376005127-0
                                                                            • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                            • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                                            • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                            • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 782 402b23-402b37 GlobalAlloc 783 402b39-402b49 call 401446 782->783 784 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 782->784 789 402b70-402b73 783->789 784->789 790 402b93 789->790 791 402b75-402b8d call 405f6a WriteFile 789->791 792 4030e3-4030f2 790->792 791->790 796 402384-40238d GlobalFree 791->796 796->792
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                            • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                            • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                            • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                            • String ID:
                                                                            • API String ID: 2568930968-0
                                                                            • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                            • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                                            • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                            • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 799 402713-40273b call 406009 * 2 804 402746-402749 799->804 805 40273d-402743 call 40145c 799->805 807 402755-402758 804->807 808 40274b-402752 call 40145c 804->808 805->804 809 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 807->809 810 40275a-402761 call 40145c 807->810 808->807 810->809
                                                                            APIs
                                                                              • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringWritelstrcpyn
                                                                            • String ID: <RM>$AimsBroadcast$WriteINIStr: wrote [%s] %s=%s in %s
                                                                            • API String ID: 247603264-3666939760
                                                                            • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                            • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                                            • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                            • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 906 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 917 402223-4030f2 call 4062a3 906->917 918 40220d-40221b call 4062a3 906->918 918->917
                                                                            APIs
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                              • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                              • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                            • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            Strings
                                                                            • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                            • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                            • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                            • API String ID: 3156913733-2180253247
                                                                            • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                            • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                                            • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                            • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00405E9D
                                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileNameTempTick
                                                                            • String ID: nsa
                                                                            • API String ID: 1716503409-2209301699
                                                                            • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                            • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                                            • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                            • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798
                                                                            APIs
                                                                            • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnableShowlstrlenwvsprintf
                                                                            • String ID: HideWindow
                                                                            • API String ID: 1249568736-780306582
                                                                            • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                            • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                                            • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                            • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                            • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                                            • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                            • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                            • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                                            • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                            • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                            • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                                            • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                            • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                            • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                                            • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                            • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                            • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                                            • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                            • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                            • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                                            • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                            • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                                            APIs
                                                                            • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                                            • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                                            • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                                            • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocFree
                                                                            • String ID:
                                                                            • API String ID: 3394109436-0
                                                                            • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                            • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                                            • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                            • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                                            APIs
                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                            • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                                            • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                            • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCreate
                                                                            • String ID:
                                                                            • API String ID: 415043291-0
                                                                            • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                            • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                                            • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                            • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                            • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                                            • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                            • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                            • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                                            • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                            • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                                            APIs
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                              • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                            • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$CreateDirectoryPrev
                                                                            • String ID:
                                                                            • API String ID: 4115351271-0
                                                                            • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                            • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                                            • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                            • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                                            APIs
                                                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                            • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                                            • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                            • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID:
                                                                            • API String ID: 973152223-0
                                                                            • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                            • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                                            • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                            • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                                            APIs
                                                                            • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                            • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                                            • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                            • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                            • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                                            • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                            • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                                            • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                                            • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                                            • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                                            • DeleteObject.GDI32(?), ref: 00404A79
                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                                            • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                                            • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                                            • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                                            • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                                            • ShowWindow.USER32(00000000), ref: 00404F5B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                            • String ID: $ @$M$N
                                                                            • API String ID: 1638840714-3479655940
                                                                            • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                            • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                                            • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                            • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                                            • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                                            • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                                            • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                                            • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                                            • SetWindowTextW.USER32(?,?), ref: 00404583
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                                            • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                                            • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                                              • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                              • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                              • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                              • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                                            • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                                              • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                            • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                            • String ID: 82D$@%F$@rD$A
                                                                            • API String ID: 3347642858-1086125096
                                                                            • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                            • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                                            • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                            • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                            • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                                            • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                                            • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                                            • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                                            • CloseHandle.KERNEL32(?), ref: 004071E6
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                            • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                            • API String ID: 1916479912-1189179171
                                                                            • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                            • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                                            • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                            • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                                            • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                                            • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                                            • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                                            • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                                            • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                                            • FindClose.KERNEL32(?), ref: 00406E33
                                                                            Strings
                                                                            • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                                            • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                                            • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                                            • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                                            • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                                            • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                                            • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                                            • \*.*, xrefs: 00406D03
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                            • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                                            • API String ID: 2035342205-3294556389
                                                                            • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                            • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                                            • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                            • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                                            APIs
                                                                            • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                            • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                                              • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                            • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                                            • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                                            • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                            • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                            • API String ID: 3581403547-784952888
                                                                            • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                            • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                                            • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                            • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                                            Strings
                                                                            • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInstance
                                                                            • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                            • API String ID: 542301482-1377821865
                                                                            • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                            • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                                            • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                            • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: FileFindFirst
                                                                            • String ID:
                                                                            • API String ID: 1974802433-0
                                                                            • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                            • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                                            • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                            • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                                            • lstrlenW.KERNEL32(?), ref: 004063CC
                                                                            • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                                              • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                                            • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                                            • GlobalFree.KERNEL32(?), ref: 004064DD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                            • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                            • API String ID: 20674999-2124804629
                                                                            • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                            • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                                            • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                            • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                                            APIs
                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                                            • GetSysColor.USER32(?), ref: 004041AF
                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                                            • lstrlenW.KERNEL32(?), ref: 004041D6
                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                                              • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                                              • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                                              • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                                            • SendMessageW.USER32(00000000), ref: 00404251
                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                                            • SetCursor.USER32(00000000), ref: 004042D2
                                                                            • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                                            • SetCursor.USER32(00000000), ref: 004042F6
                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                            • String ID: @%F$N$open
                                                                            • API String ID: 3928313111-3849437375
                                                                            • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                            • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                                            • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                            • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                                            APIs
                                                                            • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                                            • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                                            • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                                              • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                              • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                            • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                                            • wsprintfA.USER32 ref: 00406B4D
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                                            • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                                              • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                              • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                            • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                                            • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                            • String ID: F$%s=%s$NUL$[Rename]
                                                                            • API String ID: 565278875-1653569448
                                                                            • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                            • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                                            • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                            • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                            • DeleteObject.GDI32(?), ref: 004010F6
                                                                            • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                            • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                            • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                            • DeleteObject.GDI32(?), ref: 0040116E
                                                                            • EndPaint.USER32(?,?), ref: 00401177
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                            • String ID: F
                                                                            • API String ID: 941294808-1304234792
                                                                            • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                            • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                                            • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                            • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                                            APIs
                                                                            • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                            • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            Strings
                                                                            • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                            • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                            • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                            • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                            • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                            • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                            • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                            • API String ID: 1641139501-220328614
                                                                            • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                            • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                                            • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                            • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                            • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                            • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                            • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                            Strings
                                                                            • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                            • String ID: created uninstaller: %d, "%s"
                                                                            • API String ID: 3294113728-3145124454
                                                                            • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                            • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                                            • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                            • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                            • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                                            • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                                            • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                                            • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                                            • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                            • String ID: RMDir: RemoveDirectory invalid input("")
                                                                            • API String ID: 3734993849-2769509956
                                                                            • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                            • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                                            • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                            • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                                            • GetSysColor.USER32(00000000), ref: 00403E00
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                                            • SetBkMode.GDI32(?,?), ref: 00403E18
                                                                            • GetSysColor.USER32(?), ref: 00403E2B
                                                                            • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                                            • DeleteObject.GDI32(?), ref: 00403E55
                                                                            • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2320649405-0
                                                                            • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                            • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                                            • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                            • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                              • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                              • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                            • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                            Strings
                                                                            • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                            • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                            • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                            • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                                            • API String ID: 1033533793-945480824
                                                                            • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                            • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                                            • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                            • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                                            APIs
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                              • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                              • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                              • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                              • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                              • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                              • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                                            • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                            Strings
                                                                            • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                            • Exec: command="%s", xrefs: 00402241
                                                                            • Exec: success ("%s"), xrefs: 00402263
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                            • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                            • API String ID: 2014279497-3433828417
                                                                            • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                            • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                                            • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                            • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                                            • GetMessagePos.USER32 ref: 00404871
                                                                            • ScreenToClient.USER32(?,?), ref: 00404889
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Send$ClientScreen
                                                                            • String ID: f
                                                                            • API String ID: 41195575-1993550816
                                                                            • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                            • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                                            • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                            • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                                            APIs
                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                            • MulDiv.KERNEL32(0001D000,00000064,?), ref: 00403295
                                                                            • wsprintfW.USER32 ref: 004032A5
                                                                            • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                            Strings
                                                                            • verifying installer: %d%%, xrefs: 0040329F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                            • String ID: verifying installer: %d%%
                                                                            • API String ID: 1451636040-82062127
                                                                            • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                            • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                                            • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                            • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                                            • wsprintfW.USER32 ref: 00404457
                                                                            • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                            • String ID: %u.%u%s%s$@rD
                                                                            • API String ID: 3540041739-1813061909
                                                                            • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                            • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                                            • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                            • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                                            APIs
                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                            • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                            • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                            • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$Prev
                                                                            • String ID: *?|<>/":
                                                                            • API String ID: 589700163-165019052
                                                                            • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                            • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                                            • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                            • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                                            APIs
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Close$DeleteEnumOpen
                                                                            • String ID:
                                                                            • API String ID: 1912718029-0
                                                                            • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                            • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                                            • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                            • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                                            APIs
                                                                            • GetDlgItem.USER32(?), ref: 004020A3
                                                                            • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                            • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                            • String ID:
                                                                            • API String ID: 1849352358-0
                                                                            • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                            • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                                            • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                            • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Timeout
                                                                            • String ID: !
                                                                            • API String ID: 1777923405-2657877971
                                                                            • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                            • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                                            • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                            • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                                            APIs
                                                                              • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            Strings
                                                                            • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                            • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                            • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                            • API String ID: 1697273262-1764544995
                                                                            • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                            • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                                            • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                            • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00404902
                                                                            • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                                              • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                            • String ID: $@rD
                                                                            • API String ID: 3748168415-881980237
                                                                            • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                            • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                                            • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                            • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                                            APIs
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                              • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                              • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                                            • lstrlenW.KERNEL32 ref: 004026B4
                                                                            • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                            • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                            • String ID: CopyFiles "%s"->"%s"
                                                                            • API String ID: 2577523808-3778932970
                                                                            • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                            • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                                            • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                            • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcatwsprintf
                                                                            • String ID: %02x%c$...
                                                                            • API String ID: 3065427908-1057055748
                                                                            • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                            • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                                            • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                            • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                                            APIs
                                                                            • OleInitialize.OLE32(00000000), ref: 00405057
                                                                              • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                            • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                                              • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                              • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                            • String ID: Section: "%s"$Skipping section: "%s"
                                                                            • API String ID: 2266616436-4211696005
                                                                            • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                            • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                                            • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                            • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                                            APIs
                                                                            • GetDC.USER32(?), ref: 00402100
                                                                            • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                              • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                            • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                                              • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                            • String ID:
                                                                            • API String ID: 1599320355-0
                                                                            • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                            • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                                            • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                            • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                                            APIs
                                                                              • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                            • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                                            • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                                            • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcpyn$CreateFilelstrcmp
                                                                            • String ID: Version
                                                                            • API String ID: 512980652-315105994
                                                                            • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                            • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                                            • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                            • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                                            • GetTickCount.KERNEL32 ref: 00403303
                                                                            • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                            • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                            • String ID:
                                                                            • API String ID: 2102729457-0
                                                                            • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                            • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                                            • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                            • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                                            • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                            • String ID:
                                                                            • API String ID: 2883127279-0
                                                                            • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                            • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                                            • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                            • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                                            APIs
                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                            • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringlstrcmp
                                                                            • String ID: !N~
                                                                            • API String ID: 623250636-529124213
                                                                            • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                            • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                                            • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                            • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                                            APIs
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                            • CloseHandle.KERNEL32(?), ref: 00405C71
                                                                            Strings
                                                                            • Error launching installer, xrefs: 00405C48
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID: Error launching installer
                                                                            • API String ID: 3712363035-66219284
                                                                            • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                            • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                                            • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                            • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                            • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                              • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandlelstrlenwvsprintf
                                                                            • String ID: RMDir: RemoveDirectory invalid input("")
                                                                            • API String ID: 3509786178-2769509956
                                                                            • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                            • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                                            • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                            • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                                            APIs
                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                            • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                                            • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                                            • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1744674248.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.1744646941.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744697681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744747415.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1744846841.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_eddzD2MA12.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 190613189-0
                                                                            • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                            • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                                            • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                            • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                                            Execution Graph

                                                                            Execution Coverage:4.1%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:2.2%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:102
                                                                            execution_graph 98022 161016 98027 175ce7 98022->98027 98037 180fe6 98027->98037 98029 175cef 98030 16101b 98029->98030 98047 175f39 98029->98047 98034 182f70 98030->98034 98137 182e74 98034->98137 98036 161025 98040 180fee 98037->98040 98039 181008 98039->98029 98040->98039 98042 18100c std::exception::exception 98040->98042 98075 18593c 98040->98075 98092 1835d1 DecodePointer 98040->98092 98093 1887cb RaiseException 98042->98093 98044 181036 98094 188701 58 API calls _free 98044->98094 98046 181048 98046->98029 98048 175cfb 98047->98048 98049 175f42 98047->98049 98051 175d13 98048->98051 98050 182f70 __cinit 67 API calls 98049->98050 98050->98048 98103 171207 98051->98103 98055 175d6e 98064 175d9b 98055->98064 98121 171981 98055->98121 98057 175d8f 98125 17133d 98057->98125 98059 175e00 GetCurrentProcess IsWow64Process 98060 175e19 98059->98060 98062 175e2f 98060->98062 98063 175e98 GetSystemInfo 98060->98063 98061 1b1098 98117 1755f0 98062->98117 98065 175e65 98063->98065 98064->98059 98064->98061 98065->98030 98068 175e41 98071 1755f0 2 API calls 98068->98071 98069 175e8c GetSystemInfo 98070 175e56 98069->98070 98070->98065 98073 175e5c FreeLibrary 98070->98073 98072 175e49 GetNativeSystemInfo 98071->98072 98072->98070 98073->98065 98076 1859b7 98075->98076 98082 185948 98075->98082 98101 1835d1 DecodePointer 98076->98101 98078 1859bd 98102 188d58 58 API calls __getptd_noexit 98078->98102 98079 185953 98079->98082 98095 18a39b 58 API calls 2 library calls 98079->98095 98096 18a3f8 58 API calls 8 library calls 98079->98096 98097 1832cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98079->98097 98082->98079 98083 18597b RtlAllocateHeap 98082->98083 98086 1859a3 98082->98086 98090 1859a1 98082->98090 98098 1835d1 DecodePointer 98082->98098 98083->98082 98084 1859af 98083->98084 98084->98040 98099 188d58 58 API calls __getptd_noexit 98086->98099 98100 188d58 58 API calls __getptd_noexit 98090->98100 98092->98040 98093->98044 98094->98046 98095->98079 98096->98079 98098->98082 98099->98090 98100->98084 98101->98078 98102->98084 98104 180fe6 Mailbox 59 API calls 98103->98104 98105 171228 98104->98105 98106 180fe6 Mailbox 59 API calls 98105->98106 98107 171236 GetVersionExW 98106->98107 98108 171821 98107->98108 98109 17182d __wsetenvp 98108->98109 98110 17189a 98108->98110 98112 171843 98109->98112 98113 171868 98109->98113 98111 171981 59 API calls 98110->98111 98116 17184b _memmove 98111->98116 98129 171b7c 59 API calls Mailbox 98112->98129 98130 171c7e 98113->98130 98116->98055 98118 175619 98117->98118 98119 1755f9 LoadLibraryA 98117->98119 98118->98068 98118->98069 98119->98118 98120 17560a GetProcAddress 98119->98120 98120->98118 98122 17198f 98121->98122 98123 171998 _memmove 98121->98123 98122->98123 98133 171aa4 98122->98133 98123->98057 98126 17134b 98125->98126 98127 171981 59 API calls 98126->98127 98128 17135b 98127->98128 98128->98064 98129->98116 98131 180fe6 Mailbox 59 API calls 98130->98131 98132 171c88 98131->98132 98132->98116 98134 171ab7 98133->98134 98136 171ab4 _memmove 98133->98136 98135 180fe6 Mailbox 59 API calls 98134->98135 98135->98136 98136->98123 98138 182e80 _doexit 98137->98138 98145 183447 98138->98145 98144 182ea7 _doexit 98144->98036 98162 189e3b 98145->98162 98147 182e89 98148 182eb8 DecodePointer DecodePointer 98147->98148 98149 182ee5 98148->98149 98150 182e95 98148->98150 98149->98150 98208 1889d4 59 API calls __ftell_nolock 98149->98208 98159 182eb2 98150->98159 98152 182f48 EncodePointer EncodePointer 98152->98150 98153 182ef7 98153->98152 98154 182f1c 98153->98154 98209 188a94 61 API calls 2 library calls 98153->98209 98154->98150 98157 182f36 EncodePointer 98154->98157 98210 188a94 61 API calls 2 library calls 98154->98210 98157->98152 98158 182f30 98158->98150 98158->98157 98211 183450 98159->98211 98163 189e4c 98162->98163 98164 189e5f EnterCriticalSection 98162->98164 98169 189ec3 98163->98169 98164->98147 98166 189e52 98166->98164 98193 1832e5 58 API calls 3 library calls 98166->98193 98170 189ecf _doexit 98169->98170 98171 189ed8 98170->98171 98172 189ef0 98170->98172 98194 18a39b 58 API calls 2 library calls 98171->98194 98180 189f11 _doexit 98172->98180 98197 188a4d 58 API calls 2 library calls 98172->98197 98174 189edd 98195 18a3f8 58 API calls 8 library calls 98174->98195 98177 189f05 98178 189f1b 98177->98178 98179 189f0c 98177->98179 98183 189e3b __lock 58 API calls 98178->98183 98198 188d58 58 API calls __getptd_noexit 98179->98198 98180->98166 98181 189ee4 98196 1832cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98181->98196 98185 189f22 98183->98185 98187 189f2f 98185->98187 98188 189f47 98185->98188 98199 18a05b InitializeCriticalSectionAndSpinCount 98187->98199 98200 182f85 98188->98200 98191 189f3b 98206 189f63 LeaveCriticalSection _doexit 98191->98206 98194->98174 98195->98181 98197->98177 98198->98180 98199->98191 98201 182fb7 _free 98200->98201 98202 182f8e RtlFreeHeap 98200->98202 98201->98191 98202->98201 98203 182fa3 98202->98203 98207 188d58 58 API calls __getptd_noexit 98203->98207 98205 182fa9 GetLastError 98205->98201 98206->98180 98207->98205 98208->98153 98209->98154 98210->98158 98214 189fa5 LeaveCriticalSection 98211->98214 98213 182eb7 98213->98144 98214->98213 98215 19e438 98221 166152 Mailbox 98215->98221 98217 19efeb 98294 1b6cf1 59 API calls Mailbox 98217->98294 98219 19eff4 98221->98217 98221->98219 98222 19e2e9 VariantClear 98221->98222 98223 166af8 98221->98223 98230 1d5e1d 98221->98230 98255 1de60c 98221->98255 98258 1debba 98221->98258 98264 16cfd7 98221->98264 98283 1dec68 98221->98283 98291 165190 59 API calls Mailbox 98221->98291 98292 1b7aad 59 API calls 98221->98292 98222->98221 98293 1ca48d 89 API calls 4 library calls 98223->98293 98231 1d5e46 98230->98231 98232 1d5e74 WSAStartup 98231->98232 98326 16502b 59 API calls 98231->98326 98234 1d5e9d 98232->98234 98245 1d5e88 Mailbox 98232->98245 98295 1740cd 98234->98295 98235 1d5e61 98235->98232 98327 16502b 59 API calls 98235->98327 98240 1d5e70 98240->98232 98243 1d5ebf inet_addr gethostbyname 98244 1d5edd IcmpCreateFile 98243->98244 98243->98245 98244->98245 98246 1d5f01 98244->98246 98245->98221 98247 180fe6 Mailbox 59 API calls 98246->98247 98248 1d5f1a 98247->98248 98328 17433f 98248->98328 98251 1d5f55 IcmpSendEcho 98253 1d5f6d 98251->98253 98252 1d5f34 IcmpSendEcho 98252->98253 98254 1d5fd4 IcmpCloseHandle WSACleanup 98253->98254 98254->98245 98339 1dd1c6 98255->98339 98257 1de61c 98257->98221 98262 1debcd 98258->98262 98259 164d37 84 API calls 98260 1dec0a 98259->98260 98476 1c7ce4 98260->98476 98262->98259 98263 1debdc 98262->98263 98263->98221 98265 164d37 84 API calls 98264->98265 98266 16d001 98265->98266 98520 165278 98266->98520 98268 16d018 98269 16d57b 98268->98269 98272 16d439 Mailbox __wsetenvp 98268->98272 98550 16502b 59 API calls 98268->98550 98269->98221 98272->98269 98274 180c65 62 API calls 98272->98274 98276 164f98 59 API calls 98272->98276 98278 164d37 84 API calls 98272->98278 98279 16502b 59 API calls 98272->98279 98280 171821 59 API calls 98272->98280 98525 18312d 98272->98525 98535 1759d3 98272->98535 98546 175ac3 98272->98546 98551 17162d 98272->98551 98556 17153b 59 API calls 2 library calls 98272->98556 98557 164f3c 59 API calls Mailbox 98272->98557 98274->98272 98276->98272 98278->98272 98279->98272 98280->98272 98285 1dec84 98283->98285 98286 1decab 98283->98286 98284 1deccd 98284->98285 98287 1ded11 98284->98287 98630 16502b 59 API calls 98284->98630 98285->98221 98286->98284 98629 16502b 59 API calls 98286->98629 98626 1c67fc 98287->98626 98291->98221 98292->98221 98293->98217 98294->98219 98296 180fe6 Mailbox 59 API calls 98295->98296 98297 1740e0 98296->98297 98298 171c7e 59 API calls 98297->98298 98299 1740ed 98298->98299 98300 164d37 98299->98300 98301 164d51 98300->98301 98302 164d4b 98300->98302 98303 19db28 __i64tow 98301->98303 98304 164d99 98301->98304 98306 164d57 __itow 98301->98306 98310 19da2f 98301->98310 98318 17402a WideCharToMultiByte 98302->98318 98335 1838c8 83 API calls 3 library calls 98304->98335 98308 180fe6 Mailbox 59 API calls 98306->98308 98309 164d71 98308->98309 98309->98302 98331 171a36 98309->98331 98311 180fe6 Mailbox 59 API calls 98310->98311 98313 19daa7 Mailbox _wcscpy 98310->98313 98314 19da74 98311->98314 98336 1838c8 83 API calls 3 library calls 98313->98336 98315 180fe6 Mailbox 59 API calls 98314->98315 98316 19da9a 98315->98316 98316->98313 98317 171a36 59 API calls 98316->98317 98317->98313 98319 174085 98318->98319 98320 17404e 98318->98320 98338 173f20 59 API calls Mailbox 98319->98338 98321 180fe6 Mailbox 59 API calls 98320->98321 98323 174055 WideCharToMultiByte 98321->98323 98337 173f79 59 API calls 2 library calls 98323->98337 98325 174077 98325->98243 98326->98235 98327->98240 98329 180fe6 Mailbox 59 API calls 98328->98329 98330 174351 98329->98330 98330->98251 98330->98252 98332 171a45 __wsetenvp _memmove 98331->98332 98333 180fe6 Mailbox 59 API calls 98332->98333 98334 171a83 98333->98334 98334->98302 98335->98306 98336->98303 98337->98325 98338->98325 98340 164d37 84 API calls 98339->98340 98341 1dd203 98340->98341 98365 1dd24a Mailbox 98341->98365 98377 1dde8e 98341->98377 98343 1dd4a2 98344 1dd617 98343->98344 98348 1dd4b0 98343->98348 98431 1ddfb1 92 API calls Mailbox 98344->98431 98347 1dd626 98347->98348 98350 1dd632 98347->98350 98390 1dd057 98348->98390 98349 164d37 84 API calls 98367 1dd29b Mailbox 98349->98367 98350->98365 98355 1dd4e9 98405 180e38 98355->98405 98358 1dd51c 98413 1647be 98358->98413 98359 1dd503 98412 1ca48d 89 API calls 4 library calls 98359->98412 98362 1dd50e GetCurrentProcess TerminateProcess 98362->98358 98365->98257 98367->98343 98367->98349 98367->98365 98410 1cfc0d 59 API calls 2 library calls 98367->98410 98411 1dd6c8 61 API calls 2 library calls 98367->98411 98369 1dd68d 98369->98365 98373 1dd6a1 FreeLibrary 98369->98373 98370 1dd554 98425 1ddd32 107 API calls _free 98370->98425 98373->98365 98375 1dd565 98375->98369 98426 164230 59 API calls Mailbox 98375->98426 98427 16523c 98375->98427 98432 1ddd32 107 API calls _free 98375->98432 98378 171aa4 59 API calls 98377->98378 98379 1ddea9 CharLowerBuffW 98378->98379 98433 1bf903 98379->98433 98383 171207 59 API calls 98384 1ddee2 98383->98384 98440 171462 98384->98440 98386 1ddef9 98387 171981 59 API calls 98386->98387 98388 1ddf05 Mailbox 98387->98388 98389 1ddf41 Mailbox 98388->98389 98453 1dd6c8 61 API calls 2 library calls 98388->98453 98389->98367 98391 1dd0c7 98390->98391 98392 1dd072 98390->98392 98396 1de139 98391->98396 98393 180fe6 Mailbox 59 API calls 98392->98393 98395 1dd094 98393->98395 98394 180fe6 Mailbox 59 API calls 98394->98395 98395->98391 98395->98394 98397 1de362 Mailbox 98396->98397 98401 1de15c _strcat _wcscpy __wsetenvp 98396->98401 98397->98355 98398 16502b 59 API calls 98398->98401 98399 1650d5 59 API calls 98399->98401 98400 165087 59 API calls 98400->98401 98401->98397 98401->98398 98401->98399 98401->98400 98402 18593c 58 API calls __crtLCMapStringA_stat 98401->98402 98403 164d37 84 API calls 98401->98403 98457 1c5e42 61 API calls 2 library calls 98401->98457 98402->98401 98403->98401 98406 180e4d 98405->98406 98407 180ee5 NtProtectVirtualMemory 98406->98407 98408 180eb3 98406->98408 98409 180ed3 CloseHandle 98406->98409 98407->98408 98408->98358 98408->98359 98409->98408 98410->98367 98411->98367 98412->98362 98414 1647c6 98413->98414 98415 180fe6 Mailbox 59 API calls 98414->98415 98416 1647d4 98415->98416 98417 1647e0 98416->98417 98458 1646ec 59 API calls Mailbox 98416->98458 98419 164540 98417->98419 98459 164650 98419->98459 98421 16454f 98422 180fe6 Mailbox 59 API calls 98421->98422 98423 1645eb 98421->98423 98422->98423 98423->98375 98424 164230 59 API calls Mailbox 98423->98424 98424->98370 98425->98375 98426->98375 98428 16524a 98427->98428 98429 165250 98427->98429 98428->98429 98468 171c9c 98428->98468 98429->98375 98431->98347 98432->98375 98435 1bf92e __wsetenvp 98433->98435 98434 1bf96d 98434->98383 98434->98388 98435->98434 98436 1bfa14 98435->98436 98437 1bf963 98435->98437 98436->98434 98455 1714db 61 API calls 98436->98455 98437->98434 98454 1714db 61 API calls 98437->98454 98441 171471 98440->98441 98442 1714ce 98440->98442 98441->98442 98444 17147c 98441->98444 98443 171981 59 API calls 98442->98443 98449 17149f _memmove 98443->98449 98445 171497 98444->98445 98446 1af1de 98444->98446 98456 171b7c 59 API calls Mailbox 98445->98456 98448 171c7e 59 API calls 98446->98448 98450 1af1e8 98448->98450 98449->98386 98451 180fe6 Mailbox 59 API calls 98450->98451 98452 1af208 98451->98452 98453->98389 98454->98437 98455->98436 98456->98449 98457->98401 98458->98417 98460 164659 Mailbox 98459->98460 98461 19d6ec 98460->98461 98466 164663 98460->98466 98462 180fe6 Mailbox 59 API calls 98461->98462 98464 19d6f8 98462->98464 98463 16466a 98463->98421 98466->98463 98467 165190 59 API calls Mailbox 98466->98467 98467->98466 98469 171ca7 98468->98469 98470 171caf 98468->98470 98472 171bcc 98469->98472 98470->98429 98474 171bdc 98472->98474 98475 171bef _memmove 98472->98475 98473 180fe6 Mailbox 59 API calls 98473->98475 98474->98473 98474->98475 98475->98470 98477 1c7cf1 98476->98477 98478 180fe6 Mailbox 59 API calls 98477->98478 98479 1c7cf8 98478->98479 98482 1c6135 98479->98482 98481 1c7d3b Mailbox 98481->98263 98483 171aa4 59 API calls 98482->98483 98484 1c6148 CharLowerBuffW 98483->98484 98486 1c615b 98484->98486 98485 171609 59 API calls 98485->98486 98486->98485 98487 1c6195 98486->98487 98499 1c6165 _memset Mailbox 98486->98499 98488 1c61a7 98487->98488 98515 171609 98487->98515 98490 180fe6 Mailbox 59 API calls 98488->98490 98493 1c61d5 98490->98493 98495 1c61f4 98493->98495 98518 1c6071 59 API calls 98493->98518 98494 1c6233 98496 180fe6 Mailbox 59 API calls 98494->98496 98494->98499 98500 1c6292 98495->98500 98497 1c624d 98496->98497 98498 180fe6 Mailbox 59 API calls 98497->98498 98498->98499 98499->98481 98501 171207 59 API calls 98500->98501 98502 1c62c4 98501->98502 98503 171207 59 API calls 98502->98503 98504 1c62cd 98503->98504 98505 171207 59 API calls 98504->98505 98506 1c62d6 _wcscmp 98505->98506 98507 171821 59 API calls 98506->98507 98508 1c65ab Mailbox 98506->98508 98509 183836 GetStringTypeW 98506->98509 98511 1837ba 59 API calls 98506->98511 98512 1c6292 60 API calls 98506->98512 98513 17153b 59 API calls 98506->98513 98514 171c9c 59 API calls 98506->98514 98519 18385c GetStringTypeW _iswctype 98506->98519 98507->98506 98508->98494 98509->98506 98511->98506 98512->98506 98513->98506 98514->98506 98516 171aa4 59 API calls 98515->98516 98517 171614 98516->98517 98517->98488 98518->98493 98519->98506 98521 180fe6 Mailbox 59 API calls 98520->98521 98523 165285 98521->98523 98522 165294 98522->98268 98523->98522 98524 171a36 59 API calls 98523->98524 98524->98522 98526 183139 98525->98526 98527 1831ae 98525->98527 98534 18315e 98526->98534 98558 188d58 58 API calls __getptd_noexit 98526->98558 98560 1831c0 60 API calls 3 library calls 98527->98560 98530 1831bb 98530->98272 98531 183145 98559 188fe6 9 API calls __ftell_nolock 98531->98559 98533 183150 98533->98272 98534->98272 98536 1759fe _memset 98535->98536 98561 175800 98536->98561 98539 175a83 98541 175a9d Shell_NotifyIconW 98539->98541 98542 175ab9 Shell_NotifyIconW 98539->98542 98543 175aab 98541->98543 98542->98543 98565 1756f8 98543->98565 98545 175ab2 98545->98272 98547 175b25 98546->98547 98548 175ad5 _memset 98546->98548 98547->98272 98549 175af4 Shell_NotifyIconW 98548->98549 98549->98547 98550->98272 98552 180fe6 Mailbox 59 API calls 98551->98552 98553 171652 98552->98553 98554 180fe6 Mailbox 59 API calls 98553->98554 98555 171660 98554->98555 98555->98272 98556->98272 98557->98272 98558->98531 98559->98533 98560->98530 98562 175810 98561->98562 98563 17581c 98561->98563 98562->98539 98595 1c34dd 62 API calls _W_store_winword 98562->98595 98563->98562 98564 175821 DestroyIcon 98563->98564 98564->98562 98566 175715 98565->98566 98585 1757fa Mailbox 98565->98585 98567 17162d 59 API calls 98566->98567 98568 175723 98567->98568 98569 1b0c4c LoadStringW 98568->98569 98570 175730 98568->98570 98573 1b0c66 98569->98573 98571 171821 59 API calls 98570->98571 98572 175745 98571->98572 98574 175752 98572->98574 98580 1b0c74 98572->98580 98575 171c9c 59 API calls 98573->98575 98574->98573 98576 175760 98574->98576 98581 175778 _memset _wcscpy 98575->98581 98596 171900 98576->98596 98580->98581 98582 171207 59 API calls 98580->98582 98592 1b0cb7 Mailbox 98580->98592 98583 1757e0 Shell_NotifyIconW 98581->98583 98584 1b0c9e 98582->98584 98583->98585 98612 1c0252 60 API calls Mailbox 98584->98612 98585->98545 98588 1b0ca9 98590 1717e0 59 API calls 98588->98590 98589 1b0cd6 98591 171900 59 API calls 98589->98591 98590->98592 98593 1b0ce7 98591->98593 98613 1838c8 83 API calls 3 library calls 98592->98613 98594 171900 59 API calls 98593->98594 98594->98581 98595->98539 98597 171914 98596->98597 98598 1af534 98596->98598 98614 1718a5 98597->98614 98600 171c7e 59 API calls 98598->98600 98602 1af53f __wsetenvp _memmove 98600->98602 98601 17191f 98603 1717e0 98601->98603 98604 1717f2 98603->98604 98605 1af401 98603->98605 98619 171680 98604->98619 98625 1b87f9 59 API calls _memmove 98605->98625 98608 1717fe 98608->98581 98609 1af40b 98610 171c9c 59 API calls 98609->98610 98611 1af413 Mailbox 98610->98611 98612->98588 98613->98589 98615 1718b4 __wsetenvp 98614->98615 98616 1718c5 _memmove 98615->98616 98617 171c7e 59 API calls 98615->98617 98616->98601 98618 1af4f1 _memmove 98617->98618 98620 171692 98619->98620 98622 1716ba _memmove 98619->98622 98621 180fe6 Mailbox 59 API calls 98620->98621 98620->98622 98623 17176f _memmove 98621->98623 98622->98608 98624 180fe6 Mailbox 59 API calls 98623->98624 98624->98623 98625->98609 98631 1c6818 98626->98631 98628 1c6813 98628->98285 98629->98284 98630->98287 98664 1c6735 98631->98664 98634 1c6899 98680 1c6a73 89 API calls 2 library calls 98634->98680 98635 1c68b1 98637 1c6921 98635->98637 98638 1c6917 98635->98638 98641 1c68ca 98635->98641 98639 1c699f 98637->98639 98640 1c6951 98637->98640 98661 1c683d _memmove 98637->98661 98638->98637 98646 1c68fe 98638->98646 98642 1c69a6 98639->98642 98648 1c6a3a 98639->98648 98644 1c6956 98640->98644 98647 1c6971 98640->98647 98681 1c8cd0 61 API calls 98641->98681 98643 1c69a9 98642->98643 98652 1c6a1c 98642->98652 98650 1c69ad 98643->98650 98651 1c69e5 98643->98651 98644->98661 98684 165087 59 API calls 98644->98684 98671 1c7c7f 98646->98671 98647->98661 98685 165087 59 API calls 98647->98685 98648->98661 98689 1650d5 59 API calls 98648->98689 98650->98661 98686 1650d5 59 API calls 98650->98686 98651->98661 98687 1650d5 59 API calls 98651->98687 98652->98661 98688 1650d5 59 API calls 98652->98688 98658 1c68d2 98682 1c8cd0 61 API calls 98658->98682 98661->98628 98662 1c68e9 _memmove 98683 1c8cd0 61 API calls 98662->98683 98665 1c6785 98664->98665 98669 1c6746 98664->98669 98690 16502b 59 API calls 98665->98690 98666 1c6783 98666->98634 98666->98635 98666->98661 98668 164d37 84 API calls 98668->98669 98669->98666 98669->98668 98670 18312d _W_store_winword 60 API calls 98669->98670 98670->98669 98672 1c7c8a 98671->98672 98673 180fe6 Mailbox 59 API calls 98672->98673 98674 1c7c91 98673->98674 98675 1c7c9d 98674->98675 98676 1c7cbe 98674->98676 98677 180fe6 Mailbox 59 API calls 98675->98677 98678 180fe6 Mailbox 59 API calls 98676->98678 98679 1c7ca6 _memset 98677->98679 98678->98679 98679->98661 98680->98661 98681->98658 98682->98662 98683->98646 98684->98661 98685->98661 98686->98661 98687->98661 98688->98661 98689->98661 98690->98666 98691 1a48fb 98696 16b020 98691->98696 98693 1a4912 98695 16cce0 98693->98695 98738 1ca48d 89 API calls 4 library calls 98693->98738 98695->98695 98739 173740 98696->98739 98699 1a30b6 98843 1ca48d 89 API calls 4 library calls 98699->98843 98701 16b07f 98701->98699 98702 1a30d4 98701->98702 98734 16bb86 98701->98734 98735 16b132 Mailbox _memmove 98701->98735 98844 1ca48d 89 API calls 4 library calls 98702->98844 98704 1a355e 98737 16b4dd 98704->98737 98902 1ca48d 89 API calls 4 library calls 98704->98902 98705 1a318a 98705->98737 98846 1ca48d 89 API calls 4 library calls 98705->98846 98710 1a3106 98710->98705 98845 16a9de 273 API calls 98710->98845 98713 180fe6 59 API calls Mailbox 98713->98735 98714 163b31 59 API calls 98714->98735 98715 1b730a 59 API calls 98715->98735 98718 1653b0 273 API calls 98718->98735 98719 1a3418 98868 1653b0 98719->98868 98722 1a3448 98722->98737 98896 1639be 98722->98896 98725 1a31c3 98847 1ca48d 89 API calls 4 library calls 98725->98847 98726 163c30 68 API calls 98726->98735 98728 1a346f 98900 1ca48d 89 API calls 4 library calls 98728->98900 98731 16523c 59 API calls 98731->98735 98733 171c9c 59 API calls 98733->98735 98842 1ca48d 89 API calls 4 library calls 98734->98842 98735->98704 98735->98710 98735->98713 98735->98714 98735->98715 98735->98718 98735->98719 98735->98725 98735->98726 98735->98728 98735->98731 98735->98733 98735->98734 98735->98737 98744 163add 98735->98744 98751 16bc70 98735->98751 98830 163a40 98735->98830 98841 165190 59 API calls Mailbox 98735->98841 98848 1b6c62 59 API calls 2 library calls 98735->98848 98849 1da9c3 85 API calls Mailbox 98735->98849 98850 1b6c1e 59 API calls Mailbox 98735->98850 98851 1c5ef2 68 API calls 98735->98851 98852 163ea3 98735->98852 98901 1ca12a 59 API calls 98735->98901 98737->98693 98738->98695 98740 17374f 98739->98740 98743 17376a 98739->98743 98741 171aa4 59 API calls 98740->98741 98742 173757 CharUpperBuffW 98741->98742 98742->98743 98743->98701 98745 19d3cd 98744->98745 98746 163aee 98744->98746 98747 180fe6 Mailbox 59 API calls 98746->98747 98748 163af5 98747->98748 98749 163b16 98748->98749 98903 163ba5 59 API calls Mailbox 98748->98903 98749->98735 98752 1a359f 98751->98752 98763 16bc95 98751->98763 98989 1ca48d 89 API calls 4 library calls 98752->98989 98754 16bf3b 98754->98735 98758 16c2b6 98758->98754 98759 16c2c3 98758->98759 98987 16c483 273 API calls Mailbox 98759->98987 98762 16c2ca LockWindowUpdate DestroyWindow GetMessageW 98762->98754 98764 16c2fc 98762->98764 98825 16bca5 Mailbox 98763->98825 98990 165376 60 API calls 98763->98990 98991 1b700c 273 API calls 98763->98991 98765 1a4509 TranslateMessage DispatchMessageW GetMessageW 98764->98765 98765->98765 98767 1a4539 98765->98767 98766 1a36b3 Sleep 98766->98825 98767->98754 98768 165376 60 API calls 98768->98825 98769 180fe6 59 API calls Mailbox 98769->98825 98770 16bf54 timeGetTime 98770->98825 98772 1a405d WaitForSingleObject 98773 1a407d GetExitCodeProcess CloseHandle 98772->98773 98772->98825 98781 16c36b 98773->98781 98774 171c9c 59 API calls 98774->98825 98775 171207 59 API calls 98805 16c1fa Mailbox 98775->98805 98776 16c210 Sleep 98776->98805 98777 1a43a9 Sleep 98777->98805 98779 18083e timeGetTime 98779->98805 98781->98735 98782 16c324 timeGetTime 98988 165376 60 API calls 98782->98988 98785 164d37 84 API calls 98785->98825 98786 1a4440 GetExitCodeProcess 98791 1a446c CloseHandle 98786->98791 98792 1a4456 WaitForSingleObject 98786->98792 98787 1e6562 110 API calls 98787->98805 98789 166d79 109 API calls 98789->98825 98791->98805 98792->98791 98792->98825 98793 166cd8 251 API calls 98793->98825 98794 1a38aa Sleep 98794->98825 98795 1a44c8 Sleep 98795->98825 98797 171a36 59 API calls 98797->98805 98801 163ea3 68 API calls 98801->98805 98802 1653b0 251 API calls 98802->98825 98804 16c26d 98808 171a36 59 API calls 98804->98808 98805->98775 98805->98776 98805->98779 98805->98781 98805->98786 98805->98787 98805->98794 98805->98795 98805->98797 98805->98801 98805->98825 98997 1c2baf 60 API calls 98805->98997 98998 165376 60 API calls 98805->98998 98999 166cd8 273 API calls 98805->98999 99040 1b70e2 59 API calls 98805->99040 99041 1c57ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98805->99041 99042 1c4148 CreateToolhelp32Snapshot Process32FirstW 98805->99042 98806 16b020 251 API calls 98806->98825 98810 16bf25 Mailbox 98808->98810 98810->98754 98986 16c460 10 API calls Mailbox 98810->98986 98812 1639be 68 API calls 98812->98825 98814 165190 59 API calls Mailbox 98814->98825 98815 163a40 59 API calls 98815->98825 98816 1b6cf1 59 API calls Mailbox 98816->98825 98817 1ca48d 89 API calls 98817->98825 98818 1a3e13 VariantClear 98818->98825 98819 1b7aad 59 API calls 98819->98825 98820 1a3ea9 VariantClear 98820->98825 98821 1641c4 59 API calls Mailbox 98821->98825 98822 1a3c57 VariantClear 98822->98825 98823 171a36 59 API calls 98823->98825 98824 163ea3 68 API calls 98824->98825 98825->98766 98825->98768 98825->98769 98825->98770 98825->98772 98825->98774 98825->98776 98825->98777 98825->98781 98825->98782 98825->98785 98825->98789 98825->98793 98825->98802 98825->98804 98825->98805 98825->98806 98825->98810 98825->98812 98825->98814 98825->98815 98825->98816 98825->98817 98825->98818 98825->98819 98825->98820 98825->98821 98825->98822 98825->98823 98825->98824 98826 1de60c 130 API calls 98825->98826 98904 1652b0 98825->98904 98913 169a00 98825->98913 98920 169c80 98825->98920 98951 16a820 98825->98951 98968 1de620 98825->98968 98971 1cc270 98825->98971 98978 1deedb 98825->98978 98992 1e6655 59 API calls 98825->98992 98993 1ca058 59 API calls Mailbox 98825->98993 98994 1be0aa 59 API calls 98825->98994 98995 1b6c62 59 API calls 2 library calls 98825->98995 98996 1638ff 59 API calls 98825->98996 99000 1dc355 98825->99000 98826->98825 98831 19d3b1 98830->98831 98834 163a53 98830->98834 98832 19d3c1 98831->98832 99279 1b6d17 59 API calls 98831->99279 98835 163a9a Mailbox 98834->98835 98836 163a7d 98834->98836 99270 163b31 98834->99270 98835->98735 98838 163a83 98836->98838 98839 163b31 59 API calls 98836->98839 98838->98835 99278 165190 59 API calls Mailbox 98838->99278 98839->98838 98841->98735 98842->98699 98843->98737 98844->98737 98845->98705 98846->98737 98847->98737 98848->98735 98849->98735 98850->98735 98851->98735 99281 163c30 98852->99281 98854 163eb3 98855 163f2d 98854->98855 98856 163ebd 98854->98856 98858 16523c 59 API calls 98855->98858 98857 180fe6 Mailbox 59 API calls 98856->98857 98859 163ece 98857->98859 98860 163f1d 98858->98860 98861 163edc 98859->98861 98862 171207 59 API calls 98859->98862 98860->98735 98863 163eeb 98861->98863 98864 171bcc 59 API calls 98861->98864 98862->98861 98865 180fe6 Mailbox 59 API calls 98863->98865 98864->98863 98866 163ef5 98865->98866 99288 163bc8 68 API calls 98866->99288 98869 1653cf 98868->98869 98891 1653fd Mailbox 98868->98891 98870 180fe6 Mailbox 59 API calls 98869->98870 98870->98891 98871 1669fa 98872 171c9c 59 API calls 98871->98872 98892 165569 Mailbox 98872->98892 98873 1669ff 98875 19e691 98873->98875 98876 19f165 98873->98876 98874 180fe6 59 API calls Mailbox 98874->98891 99365 1ca48d 89 API calls 4 library calls 98875->99365 99369 1ca48d 89 API calls 4 library calls 98876->99369 98877 171207 59 API calls 98877->98891 98881 19e6a0 98881->98722 98882 182f70 67 API calls __cinit 98882->98891 98883 19ea9a 98885 171c9c 59 API calls 98883->98885 98885->98892 98886 171c9c 59 API calls 98886->98891 98888 1b7aad 59 API calls 98888->98891 98889 19eb67 98889->98892 99366 1b7aad 59 API calls 98889->99366 98891->98871 98891->98873 98891->98874 98891->98875 98891->98877 98891->98882 98891->98883 98891->98886 98891->98888 98891->98889 98891->98892 98893 19ef28 98891->98893 98895 165a1a 98891->98895 99289 167e50 98891->99289 99348 166e30 98891->99348 98892->98722 99367 1ca48d 89 API calls 4 library calls 98893->99367 99368 1ca48d 89 API calls 4 library calls 98895->99368 98897 1639c9 98896->98897 98898 163ea3 68 API calls 98897->98898 98899 1639f0 98897->98899 98898->98899 98899->98728 98900->98737 98901->98735 98902->98737 98903->98749 98905 1652c6 98904->98905 98907 165313 98904->98907 98906 1652d3 PeekMessageW 98905->98906 98905->98907 98906->98907 98908 1652ec 98906->98908 98907->98908 98910 19df68 TranslateAcceleratorW 98907->98910 98911 165352 TranslateMessage DispatchMessageW 98907->98911 98912 16533e PeekMessageW 98907->98912 99052 16359e 98907->99052 98908->98825 98910->98907 98910->98912 98911->98912 98912->98907 98912->98908 98914 169a1d 98913->98914 98916 169a31 98913->98916 99057 1694e0 98914->99057 99091 1ca48d 89 API calls 4 library calls 98916->99091 98918 169a28 98918->98825 98919 1a2478 98919->98919 98921 169cb5 98920->98921 98922 1a247d 98921->98922 98924 169d1f 98921->98924 98931 169d79 98921->98931 98923 1653b0 273 API calls 98922->98923 98925 1a2492 98923->98925 98927 171207 59 API calls 98924->98927 98924->98931 98948 169f50 Mailbox 98925->98948 99108 1ca48d 89 API calls 4 library calls 98925->99108 98926 171207 59 API calls 98926->98931 98929 1a24d8 98927->98929 98932 182f70 __cinit 67 API calls 98929->98932 98930 182f70 __cinit 67 API calls 98930->98931 98931->98926 98931->98930 98933 1a24fa 98931->98933 98937 169f3a 98931->98937 98931->98948 98932->98931 98933->98825 98934 1639be 68 API calls 98934->98948 98935 1653b0 273 API calls 98935->98948 98937->98948 99109 1ca48d 89 API calls 4 library calls 98937->99109 98938 164230 59 API calls 98938->98948 98941 16a775 99113 1ca48d 89 API calls 4 library calls 98941->99113 98943 1a27f9 98943->98825 98946 171bcc 59 API calls 98946->98948 98947 1ca48d 89 API calls 98947->98948 98948->98934 98948->98935 98948->98938 98948->98941 98948->98946 98948->98947 98950 16a058 98948->98950 99110 1b7aad 59 API calls 98948->99110 99111 1dccac 273 API calls 98948->99111 99112 1dbc26 273 API calls Mailbox 98948->99112 99114 165190 59 API calls Mailbox 98948->99114 99115 1d9ab0 273 API calls Mailbox 98948->99115 98950->98825 98952 1a2d51 98951->98952 98955 16a84c 98951->98955 99117 1ca48d 89 API calls 4 library calls 98952->99117 98954 1a2d62 98954->98825 98956 1a2d6a 98955->98956 98964 16a888 _memmove 98955->98964 99118 1ca48d 89 API calls 4 library calls 98956->99118 98959 180fe6 59 API calls Mailbox 98959->98964 98960 1a2dae 99119 16a9de 273 API calls 98960->99119 98962 1653b0 273 API calls 98962->98964 98963 1a2dc8 98965 16a975 98963->98965 99120 1ca48d 89 API calls 4 library calls 98963->99120 98964->98959 98964->98960 98964->98962 98964->98963 98964->98965 98966 16a962 98964->98966 98965->98825 98966->98965 99116 1da9c3 85 API calls Mailbox 98966->99116 98969 1dd1c6 130 API calls 98968->98969 98970 1de630 98969->98970 98970->98825 98972 164d37 84 API calls 98971->98972 98973 1cc286 98972->98973 99121 1c4005 98973->99121 98975 1cc28e 98976 1cc292 GetLastError 98975->98976 98977 1cc2a7 98975->98977 98976->98977 98977->98825 98980 1def1e 98978->98980 98985 1deef7 98978->98985 98979 1def40 98983 1def84 98979->98983 98979->98985 99216 16502b 59 API calls 98979->99216 98980->98979 99215 16502b 59 API calls 98980->99215 98984 1c6818 92 API calls 98983->98984 98984->98985 98985->98825 98986->98758 98987->98762 98988->98825 98989->98763 98990->98763 98991->98763 98992->98825 98993->98825 98994->98825 98995->98825 98996->98825 98997->98805 98998->98805 98999->98805 99001 1dc39a 99000->99001 99002 1dc380 99000->99002 99217 1da8fd 99001->99217 99244 1ca48d 89 API calls 4 library calls 99002->99244 99006 1653b0 272 API calls 99007 1dc406 99006->99007 99008 1dc392 Mailbox 99007->99008 99009 1dc498 99007->99009 99012 1dc447 99007->99012 99008->98825 99010 1dc4ee 99009->99010 99011 1dc49e 99009->99011 99010->99008 99013 164d37 84 API calls 99010->99013 99245 1c7ed5 59 API calls 99011->99245 99017 1c789a 59 API calls 99012->99017 99014 1dc500 99013->99014 99018 171aa4 59 API calls 99014->99018 99016 1dc4c1 99246 1735b9 59 API calls Mailbox 99016->99246 99020 1dc477 99017->99020 99021 1dc524 CharUpperBuffW 99018->99021 99023 1b6ebc 272 API calls 99020->99023 99024 1dc53e 99021->99024 99022 1dc4c9 Mailbox 99027 16b020 272 API calls 99022->99027 99023->99008 99025 1dc545 99024->99025 99026 1dc591 99024->99026 99224 1c789a 99025->99224 99028 164d37 84 API calls 99026->99028 99027->99008 99029 1dc599 99028->99029 99247 165376 60 API calls 99029->99247 99034 1dc5a3 99034->99008 99035 164d37 84 API calls 99034->99035 99036 1dc5be 99035->99036 99248 1735b9 59 API calls Mailbox 99036->99248 99038 1dc5ce 99039 16b020 272 API calls 99038->99039 99039->99008 99040->98805 99041->98805 99261 1c4ce2 99042->99261 99044 1c4244 CloseHandle 99044->98805 99045 1c4195 Process32NextW 99045->99044 99049 1c418e Mailbox 99045->99049 99046 171207 59 API calls 99046->99049 99047 171a36 59 API calls 99047->99049 99048 180119 59 API calls 99048->99049 99049->99044 99049->99045 99049->99046 99049->99047 99049->99048 99050 1717e0 59 API calls 99049->99050 99267 17151f 61 API calls 99049->99267 99050->99049 99053 1635b0 99052->99053 99054 1635e2 99052->99054 99053->99054 99055 1635d5 IsDialogMessageW 99053->99055 99056 19d273 GetClassLongW 99053->99056 99054->98907 99055->99053 99055->99054 99056->99053 99056->99055 99058 1653b0 273 API calls 99057->99058 99059 16951f 99058->99059 99060 1a2001 99059->99060 99074 169527 _memmove 99059->99074 99100 165190 59 API calls Mailbox 99060->99100 99062 1a22c0 99106 1ca48d 89 API calls 4 library calls 99062->99106 99064 1a22de 99064->99064 99065 169583 99065->98918 99066 169944 99069 180fe6 Mailbox 59 API calls 99066->99069 99067 16986a 99070 16987f 99067->99070 99071 1a22b1 99067->99071 99068 180fe6 59 API calls Mailbox 99068->99074 99081 1696e3 _memmove 99069->99081 99072 180fe6 Mailbox 59 API calls 99070->99072 99105 1da983 59 API calls 99071->99105 99084 16977d 99072->99084 99074->99062 99074->99065 99074->99066 99074->99068 99075 1696cf 99074->99075 99090 169741 99074->99090 99075->99066 99077 1696dc 99075->99077 99076 180fe6 Mailbox 59 API calls 99080 16970e 99076->99080 99079 180fe6 Mailbox 59 API calls 99077->99079 99078 1a22a0 99104 1ca48d 89 API calls 4 library calls 99078->99104 99079->99081 99080->99090 99092 16cca0 99080->99092 99081->99076 99081->99080 99081->99090 99084->98918 99086 1a2278 99103 1ca48d 89 API calls 4 library calls 99086->99103 99088 1a2253 99102 1ca48d 89 API calls 4 library calls 99088->99102 99090->99067 99090->99078 99090->99084 99090->99086 99090->99088 99101 168180 273 API calls 99090->99101 99091->98919 99093 16cd02 99092->99093 99094 16ccda 99092->99094 99096 1a4971 99093->99096 99097 1653b0 273 API calls 99093->99097 99099 16cce0 99093->99099 99095 169c80 273 API calls 99094->99095 99094->99099 99095->99099 99096->99099 99107 1ca48d 89 API calls 4 library calls 99096->99107 99097->99096 99099->99090 99100->99066 99101->99090 99102->99084 99103->99084 99104->99084 99105->99062 99106->99064 99107->99099 99108->98948 99109->98948 99110->98948 99111->98948 99112->98948 99113->98943 99114->98948 99115->98948 99116->98965 99117->98954 99118->98965 99119->98963 99120->98965 99122 171207 59 API calls 99121->99122 99123 1c4024 99122->99123 99124 171207 59 API calls 99123->99124 99125 1c402d 99124->99125 99126 171207 59 API calls 99125->99126 99127 1c4036 99126->99127 99145 180284 99127->99145 99132 1c405c 99157 180119 99132->99157 99133 171900 59 API calls 99133->99132 99135 1c4070 FindFirstFileW 99136 1c40fc FindClose 99135->99136 99140 1c408f 99135->99140 99139 1c4107 Mailbox 99136->99139 99137 1c40d7 FindNextFileW 99137->99140 99138 171c9c 59 API calls 99138->99140 99139->98975 99140->99136 99140->99137 99140->99138 99141 1717e0 59 API calls 99140->99141 99142 171900 59 API calls 99140->99142 99141->99140 99143 1c40c8 DeleteFileW 99142->99143 99143->99137 99144 1c40f3 FindClose 99143->99144 99144->99139 99208 191b70 99145->99208 99148 1802cd 99210 1719e1 99148->99210 99149 1802b0 99150 171821 59 API calls 99149->99150 99152 1802bc 99150->99152 99153 17133d 59 API calls 99152->99153 99154 1802c8 99153->99154 99155 1c4fec GetFileAttributesW 99154->99155 99156 1c404a 99155->99156 99156->99132 99156->99133 99158 171207 59 API calls 99157->99158 99159 18012f 99158->99159 99160 171207 59 API calls 99159->99160 99161 180137 99160->99161 99162 171207 59 API calls 99161->99162 99163 18013f 99162->99163 99164 171207 59 API calls 99163->99164 99165 180147 99164->99165 99166 18017b 99165->99166 99167 1b627d 99165->99167 99168 171462 59 API calls 99166->99168 99169 171c9c 59 API calls 99167->99169 99170 180189 99168->99170 99171 1b6286 99169->99171 99172 171981 59 API calls 99170->99172 99173 1719e1 59 API calls 99171->99173 99174 180193 99172->99174 99176 1801be 99173->99176 99175 171462 59 API calls 99174->99175 99174->99176 99179 1801b4 99175->99179 99177 1801fe 99176->99177 99180 1801dd 99176->99180 99190 1b62a6 99176->99190 99178 171462 59 API calls 99177->99178 99182 18020f 99178->99182 99183 171981 59 API calls 99179->99183 99181 171609 59 API calls 99180->99181 99185 1801e7 99181->99185 99186 180221 99182->99186 99188 171c9c 59 API calls 99182->99188 99183->99176 99184 1b6376 99187 171821 59 API calls 99184->99187 99185->99177 99192 171462 59 API calls 99185->99192 99189 180231 99186->99189 99193 171c9c 59 API calls 99186->99193 99203 1b6333 99187->99203 99188->99186 99191 180238 99189->99191 99195 171c9c 59 API calls 99189->99195 99190->99184 99194 1b635f 99190->99194 99201 1b62dd 99190->99201 99196 171c9c 59 API calls 99191->99196 99205 18023f Mailbox 99191->99205 99192->99177 99193->99189 99194->99184 99198 1b634a 99194->99198 99195->99191 99196->99205 99197 1b633b 99199 171821 59 API calls 99197->99199 99200 171821 59 API calls 99198->99200 99199->99203 99200->99203 99201->99197 99206 1b6326 99201->99206 99202 171609 59 API calls 99202->99203 99203->99177 99203->99202 99214 17153b 59 API calls 2 library calls 99203->99214 99205->99135 99207 171821 59 API calls 99206->99207 99207->99203 99209 180291 GetFullPathNameW 99208->99209 99209->99148 99209->99149 99211 1719fb 99210->99211 99213 1719ee 99210->99213 99212 180fe6 Mailbox 59 API calls 99211->99212 99212->99213 99213->99152 99214->99203 99215->98979 99216->98983 99218 1da918 99217->99218 99219 1da970 99217->99219 99220 180fe6 Mailbox 59 API calls 99218->99220 99219->99006 99223 1da93a 99220->99223 99221 180fe6 Mailbox 59 API calls 99221->99223 99223->99219 99223->99221 99249 1b715b 59 API calls Mailbox 99223->99249 99225 1c78ac 99224->99225 99227 1c78e3 99224->99227 99226 180fe6 Mailbox 59 API calls 99225->99226 99225->99227 99226->99227 99228 1b6ebc 99227->99228 99229 1b6f06 99228->99229 99233 1b6f1c Mailbox 99228->99233 99232 171a36 59 API calls 99229->99232 99230 1b6f5a 99235 16a820 273 API calls 99230->99235 99231 1b6f47 99234 1dc355 273 API calls 99231->99234 99232->99233 99233->99230 99233->99231 99240 1b6f53 99234->99240 99238 1b6f91 99235->99238 99237 1b7002 99237->99008 99239 1b6fdc 99238->99239 99238->99240 99242 1b6fc1 99238->99242 99239->99240 99254 1ca48d 89 API calls 4 library calls 99239->99254 99255 1b6cf1 59 API calls Mailbox 99240->99255 99250 1b706d 99242->99250 99244->99008 99245->99016 99246->99022 99247->99034 99248->99038 99249->99223 99251 1b7085 99250->99251 99256 1df1b2 99251->99256 99252 1b70d9 99252->99240 99254->99240 99255->99237 99257 164d37 84 API calls 99256->99257 99258 1df1cf 99257->99258 99259 1c4148 66 API calls 99258->99259 99260 1df1de 99259->99260 99260->99252 99262 1c4d09 99261->99262 99263 1c4cf0 99261->99263 99269 1837c3 59 API calls __wcstoi64 99262->99269 99263->99262 99266 1c4d0f 99263->99266 99268 18385c GetStringTypeW _iswctype 99263->99268 99266->99049 99267->99049 99268->99263 99269->99266 99271 163b3f 99270->99271 99277 163b67 99270->99277 99272 163b4d 99271->99272 99273 163b31 59 API calls 99271->99273 99274 163b31 59 API calls 99272->99274 99275 163b53 99272->99275 99273->99272 99274->99275 99275->99277 99280 165190 59 API calls Mailbox 99275->99280 99277->98836 99278->98835 99279->98832 99280->99277 99282 163c43 99281->99282 99283 163e11 99281->99283 99284 171207 59 API calls 99282->99284 99287 163c54 99282->99287 99283->98854 99285 163e73 99284->99285 99286 182f70 __cinit 67 API calls 99285->99286 99286->99287 99287->98854 99288->98860 99290 167e79 99289->99290 99306 167ef2 99289->99306 99291 1a0adf 99290->99291 99292 167e90 99290->99292 99300 1a0b09 99290->99300 99376 1dcdc8 273 API calls 2 library calls 99291->99376 99298 1a0c37 99292->99298 99307 167ea1 99292->99307 99329 167eb8 Mailbox 99292->99329 99294 1a0ad3 99375 1ca48d 89 API calls 4 library calls 99294->99375 99296 1653b0 273 API calls 99296->99306 99303 171c9c 59 API calls 99298->99303 99299 1a09e1 99373 165190 59 API calls Mailbox 99299->99373 99302 1a0b3d 99300->99302 99308 1a0b21 99300->99308 99302->99291 99305 1da8fd 59 API calls 99302->99305 99303->99329 99304 16806a 99304->98891 99312 1a0b53 99305->99312 99306->99296 99306->99299 99306->99304 99322 168015 99306->99322 99331 167fb2 99306->99331 99346 1a09e9 99306->99346 99307->99329 99380 1b7aad 59 API calls 99307->99380 99377 1ca48d 89 API calls 4 library calls 99308->99377 99309 1a0d0b 99315 1a0d41 99309->99315 99382 1dc9c9 95 API calls Mailbox 99309->99382 99311 1a0a33 99314 171c9c 59 API calls 99311->99314 99316 1a0bb7 99312->99316 99328 1a0b6b 99312->99328 99314->99329 99320 16523c 59 API calls 99315->99320 99378 1c7ed5 59 API calls 99316->99378 99318 1a0ce9 99323 164d37 84 API calls 99318->99323 99325 167ee7 99320->99325 99337 168022 Mailbox 99322->99337 99372 1ca48d 89 API calls 4 library calls 99322->99372 99338 1a0cf1 __wsetenvp 99323->99338 99324 1a0d1f 99327 164d37 84 API calls 99324->99327 99325->98891 99341 1a0d27 __wsetenvp 99327->99341 99334 1c789a 59 API calls 99328->99334 99329->99309 99329->99325 99381 1dc87c 85 API calls 2 library calls 99329->99381 99330 1a0bc9 99379 1735b9 59 API calls Mailbox 99330->99379 99331->99322 99370 164230 59 API calls Mailbox 99331->99370 99339 1a0b8d 99334->99339 99335 1a0bd2 Mailbox 99344 1c789a 59 API calls 99335->99344 99337->99311 99337->99329 99371 1b7aad 59 API calls 99337->99371 99338->99309 99340 16523c 59 API calls 99338->99340 99342 1b6ebc 273 API calls 99339->99342 99340->99309 99341->99315 99343 16523c 59 API calls 99341->99343 99342->99346 99343->99315 99345 1a0beb 99344->99345 99347 16b020 273 API calls 99345->99347 99346->99294 99346->99329 99346->99337 99374 1dccac 273 API calls 99346->99374 99347->99346 99349 166e4a 99348->99349 99353 166ff7 99348->99353 99350 166f2c 99349->99350 99351 1674d0 99349->99351 99352 166fdb 99349->99352 99349->99353 99350->99352 99357 166f68 99350->99357 99360 167076 99350->99360 99351->99352 99387 1649e0 59 API calls wcstoxq 99351->99387 99352->98891 99353->99351 99353->99352 99353->99360 99363 166fbb Mailbox 99353->99363 99355 19fc1e 99359 19fc30 99355->99359 99385 183f69 59 API calls __wtof_l 99355->99385 99357->99352 99361 19fa71 99357->99361 99357->99363 99359->98891 99360->99352 99360->99355 99360->99363 99384 1b7aad 59 API calls 99360->99384 99361->99352 99383 183f69 59 API calls __wtof_l 99361->99383 99363->99352 99363->99355 99386 1641c4 59 API calls Mailbox 99363->99386 99365->98881 99366->98892 99367->98895 99368->98892 99369->98892 99370->99322 99371->99337 99372->99299 99373->99346 99374->99346 99375->99291 99376->99329 99377->99325 99378->99330 99379->99335 99380->99329 99381->99318 99382->99324 99383->99361 99384->99363 99385->99359 99386->99363 99387->99352 99388 167357 99389 1678f5 99388->99389 99390 167360 99388->99390 99398 166fdb Mailbox 99389->99398 99399 1b87f9 59 API calls _memmove 99389->99399 99390->99389 99391 164d37 84 API calls 99390->99391 99392 16738b 99391->99392 99392->99389 99393 16739b 99392->99393 99395 171680 59 API calls 99393->99395 99395->99398 99396 19f91b 99397 171c9c 59 API calls 99396->99397 99397->99398 99399->99396 99400 161055 99405 162a19 99400->99405 99403 182f70 __cinit 67 API calls 99404 161064 99403->99404 99406 171207 59 API calls 99405->99406 99407 162a87 99406->99407 99412 161256 99407->99412 99410 162b24 99411 16105a 99410->99411 99415 1613f8 59 API calls 2 library calls 99410->99415 99411->99403 99416 161284 99412->99416 99415->99410 99417 161291 99416->99417 99419 161275 99416->99419 99418 161298 RegOpenKeyExW 99417->99418 99417->99419 99418->99419 99420 1612b2 RegQueryValueExW 99418->99420 99419->99410 99421 1612d3 99420->99421 99422 1612e8 RegCloseKey 99420->99422 99421->99422 99422->99419 99423 19dc5a 99424 180fe6 Mailbox 59 API calls 99423->99424 99425 19dc61 99424->99425 99427 180fe6 Mailbox 59 API calls 99425->99427 99429 19dc7a _memmove 99425->99429 99426 180fe6 Mailbox 59 API calls 99428 19dc9f 99426->99428 99427->99429 99429->99426 99430 165ff5 99454 165ede Mailbox _memmove 99430->99454 99431 180fe6 59 API calls Mailbox 99431->99454 99432 166a9b 99498 16a9de 273 API calls 99432->99498 99433 1653b0 273 API calls 99433->99454 99435 19eff9 99510 165190 59 API calls Mailbox 99435->99510 99437 19f007 99511 1ca48d 89 API calls 4 library calls 99437->99511 99440 19efeb 99470 165569 Mailbox 99440->99470 99509 1b6cf1 59 API calls Mailbox 99440->99509 99442 1660e5 99443 19e137 99442->99443 99448 1663bd Mailbox 99442->99448 99458 166abc 99442->99458 99473 166152 Mailbox 99442->99473 99443->99448 99499 1b7aad 59 API calls 99443->99499 99444 171c9c 59 API calls 99444->99454 99446 180fe6 Mailbox 59 API calls 99451 1663d1 99446->99451 99447 171a36 59 API calls 99447->99454 99448->99446 99460 166426 99448->99460 99449 16523c 59 API calls 99449->99454 99453 1663de 99451->99453 99451->99458 99452 1dc355 273 API calls 99452->99454 99455 166413 99453->99455 99456 19e172 99453->99456 99454->99431 99454->99432 99454->99433 99454->99435 99454->99437 99454->99442 99454->99444 99454->99447 99454->99449 99454->99452 99454->99458 99454->99470 99502 1c7f11 59 API calls Mailbox 99454->99502 99503 1b6cf1 59 API calls Mailbox 99454->99503 99455->99460 99486 165447 Mailbox 99455->99486 99500 1dc87c 85 API calls 2 library calls 99456->99500 99508 1ca48d 89 API calls 4 library calls 99458->99508 99501 1dc9c9 95 API calls Mailbox 99460->99501 99463 19e19d 99463->99463 99464 19e691 99505 1ca48d 89 API calls 4 library calls 99464->99505 99465 19f165 99513 1ca48d 89 API calls 4 library calls 99465->99513 99467 166e30 60 API calls 99467->99486 99468 1669fa 99480 171c9c 59 API calls 99468->99480 99472 171c9c 59 API calls 99472->99486 99473->99440 99473->99458 99473->99470 99479 19e2e9 VariantClear 99473->99479 99492 1d5e1d 95 API calls 99473->99492 99493 1de60c 130 API calls 99473->99493 99494 16cfd7 98 API calls 99473->99494 99495 1dec68 92 API calls 99473->99495 99496 1debba 86 API calls 99473->99496 99497 165190 59 API calls Mailbox 99473->99497 99504 1b7aad 59 API calls 99473->99504 99474 1669ff 99474->99464 99474->99465 99475 180fe6 59 API calls Mailbox 99475->99486 99476 19e6a0 99477 19ea9a 99481 171c9c 59 API calls 99477->99481 99479->99473 99480->99470 99481->99470 99482 167e50 273 API calls 99482->99486 99483 1b7aad 59 API calls 99483->99486 99484 171207 59 API calls 99484->99486 99485 19eb67 99485->99470 99506 1b7aad 59 API calls 99485->99506 99486->99464 99486->99467 99486->99468 99486->99470 99486->99472 99486->99474 99486->99475 99486->99477 99486->99482 99486->99483 99486->99484 99486->99485 99487 182f70 67 API calls __cinit 99486->99487 99489 19ef28 99486->99489 99491 165a1a 99486->99491 99487->99486 99507 1ca48d 89 API calls 4 library calls 99489->99507 99512 1ca48d 89 API calls 4 library calls 99491->99512 99492->99473 99493->99473 99494->99473 99495->99473 99496->99473 99497->99473 99498->99458 99499->99448 99500->99460 99501->99463 99502->99454 99503->99454 99504->99473 99505->99476 99506->99470 99507->99491 99508->99440 99509->99470 99510->99440 99511->99440 99512->99470 99513->99470 99514 16107d 99519 172fc5 99514->99519 99516 16108c 99517 182f70 __cinit 67 API calls 99516->99517 99518 161096 99517->99518 99520 172fd5 __ftell_nolock 99519->99520 99521 171207 59 API calls 99520->99521 99522 17308b 99521->99522 99550 1800cf 99522->99550 99524 173094 99557 1808c1 99524->99557 99527 171900 59 API calls 99528 1730ad 99527->99528 99563 174c94 99528->99563 99531 171207 59 API calls 99532 1730c5 99531->99532 99533 1719e1 59 API calls 99532->99533 99534 1730ce RegOpenKeyExW 99533->99534 99535 1b01a3 RegQueryValueExW 99534->99535 99540 1730f0 Mailbox 99534->99540 99536 1b01c0 99535->99536 99537 1b0235 RegCloseKey 99535->99537 99538 180fe6 Mailbox 59 API calls 99536->99538 99537->99540 99549 1b0247 _wcscat Mailbox __wsetenvp 99537->99549 99539 1b01d9 99538->99539 99541 17433f 59 API calls 99539->99541 99540->99516 99542 1b01e4 RegQueryValueExW 99541->99542 99543 1b0201 99542->99543 99546 1b021b 99542->99546 99544 171821 59 API calls 99543->99544 99544->99546 99545 171609 59 API calls 99545->99549 99546->99537 99547 171a36 59 API calls 99547->99549 99548 174c94 59 API calls 99548->99549 99549->99540 99549->99545 99549->99547 99549->99548 99551 191b70 __ftell_nolock 99550->99551 99552 1800dc GetModuleFileNameW 99551->99552 99553 171a36 59 API calls 99552->99553 99554 180102 99553->99554 99555 180284 60 API calls 99554->99555 99556 18010c Mailbox 99555->99556 99556->99524 99558 191b70 __ftell_nolock 99557->99558 99559 1808ce GetFullPathNameW 99558->99559 99560 1808f0 99559->99560 99561 171821 59 API calls 99560->99561 99562 17309f 99561->99562 99562->99527 99564 174ca2 99563->99564 99568 174cc4 _memmove 99563->99568 99566 180fe6 Mailbox 59 API calls 99564->99566 99565 180fe6 Mailbox 59 API calls 99567 1730bc 99565->99567 99566->99568 99567->99531 99568->99565 99569 161066 99570 16106c 99569->99570 99571 182f70 __cinit 67 API calls 99570->99571 99572 161076 99571->99572 99573 16ac27 99574 171207 59 API calls 99573->99574 99575 16ac39 99574->99575 99593 180588 99575->99593 99579 16ac6b 99580 171207 59 API calls 99579->99580 99581 16ac75 99580->99581 99621 17fe2b 99581->99621 99583 16acbc 99584 16accc GetStdHandle 99583->99584 99585 1a2f39 99584->99585 99586 16ad18 99584->99586 99585->99586 99588 1a2f42 99585->99588 99587 16ad20 OleInitialize 99586->99587 99628 1c70f3 64 API calls Mailbox 99588->99628 99590 1a2f49 99629 1c77c2 CreateThread 99590->99629 99592 1a2f55 CloseHandle 99592->99587 99594 171207 59 API calls 99593->99594 99595 180598 99594->99595 99596 171207 59 API calls 99595->99596 99597 1805a0 99596->99597 99630 1710c3 99597->99630 99600 1710c3 59 API calls 99601 1805b0 99600->99601 99602 171207 59 API calls 99601->99602 99603 1805bb 99602->99603 99604 180fe6 Mailbox 59 API calls 99603->99604 99605 16ac43 99604->99605 99606 17ff4c 99605->99606 99607 17ff5a 99606->99607 99608 171207 59 API calls 99607->99608 99609 17ff65 99608->99609 99610 171207 59 API calls 99609->99610 99611 17ff70 99610->99611 99612 171207 59 API calls 99611->99612 99613 17ff7b 99612->99613 99614 171207 59 API calls 99613->99614 99615 17ff86 99614->99615 99616 1710c3 59 API calls 99615->99616 99617 17ff91 99616->99617 99618 180fe6 Mailbox 59 API calls 99617->99618 99619 17ff98 RegisterWindowMessageW 99618->99619 99619->99579 99622 1b620c 99621->99622 99623 17fe3b 99621->99623 99633 1ca12a 59 API calls 99622->99633 99625 180fe6 Mailbox 59 API calls 99623->99625 99627 17fe43 99625->99627 99626 1b6217 99627->99583 99628->99590 99629->99592 99631 171207 59 API calls 99630->99631 99632 1710cb 99631->99632 99632->99600 99633->99626 99634 1c92c8 99635 1c92d5 99634->99635 99637 1c92db 99634->99637 99638 182f85 _free 58 API calls 99635->99638 99636 1c92ec 99640 1c92fe 99636->99640 99641 182f85 _free 58 API calls 99636->99641 99637->99636 99639 182f85 _free 58 API calls 99637->99639 99638->99637 99639->99636 99641->99640 99642 174d83 99643 174dba 99642->99643 99644 174e35 99643->99644 99645 174e37 99643->99645 99646 174dd8 99643->99646 99647 174e1a DefWindowProcW 99644->99647 99648 1b09c2 99645->99648 99649 174e3d 99645->99649 99650 174de5 99646->99650 99651 174ead PostQuitMessage 99646->99651 99652 174e28 99647->99652 99697 16c460 10 API calls Mailbox 99648->99697 99653 174e65 SetTimer RegisterWindowMessageW 99649->99653 99654 174e42 99649->99654 99655 174df0 99650->99655 99656 1b0a35 99650->99656 99651->99652 99653->99652 99660 174e8e CreatePopupMenu 99653->99660 99658 1b0965 99654->99658 99659 174e49 KillTimer 99654->99659 99661 174eb7 99655->99661 99662 174df8 99655->99662 99700 1c2cce 97 API calls _memset 99656->99700 99667 1b096a 99658->99667 99668 1b099e MoveWindow 99658->99668 99669 175ac3 Shell_NotifyIconW 99659->99669 99660->99652 99687 175b29 99661->99687 99670 1b0a1a 99662->99670 99671 174e03 99662->99671 99664 1b09e9 99698 16c483 273 API calls Mailbox 99664->99698 99674 1b096e 99667->99674 99675 1b098d SetFocus 99667->99675 99668->99652 99676 174e5c 99669->99676 99670->99647 99699 1b8854 59 API calls Mailbox 99670->99699 99673 174e0e 99671->99673 99677 174e9b 99671->99677 99672 1b0a47 99672->99647 99672->99652 99673->99647 99684 175ac3 Shell_NotifyIconW 99673->99684 99674->99673 99678 1b0977 99674->99678 99675->99652 99694 1634e4 DeleteObject DestroyWindow Mailbox 99676->99694 99695 175bd7 107 API calls _memset 99677->99695 99696 16c460 10 API calls Mailbox 99678->99696 99682 174eab 99682->99652 99685 1b0a0e 99684->99685 99686 1759d3 94 API calls 99685->99686 99686->99644 99688 175bc2 99687->99688 99689 175b40 _memset 99687->99689 99688->99652 99690 1756f8 87 API calls 99689->99690 99691 175b67 99690->99691 99692 175bab KillTimer SetTimer 99691->99692 99693 1b0d6e Shell_NotifyIconW 99691->99693 99692->99688 99693->99692 99694->99652 99695->99682 99696->99652 99697->99664 99698->99673 99699->99644 99700->99672 99701 169a6c 99704 16829c 99701->99704 99703 169a78 99705 168308 99704->99705 99706 1682b4 99704->99706 99711 168331 99705->99711 99713 1ca48d 89 API calls 4 library calls 99705->99713 99706->99705 99707 1653b0 273 API calls 99706->99707 99710 1682eb 99707->99710 99709 1a0ed8 99709->99709 99710->99711 99712 16523c 59 API calls 99710->99712 99711->99703 99712->99705 99713->99709 99714 19e463 99726 16373a 99714->99726 99716 19e479 99717 19e4fa 99716->99717 99718 19e48f 99716->99718 99720 16b020 273 API calls 99717->99720 99735 165376 60 API calls 99718->99735 99725 19e4ee Mailbox 99720->99725 99722 19e4ce 99722->99725 99736 1c890a 59 API calls Mailbox 99722->99736 99723 19f046 Mailbox 99725->99723 99737 1ca48d 89 API calls 4 library calls 99725->99737 99727 163746 99726->99727 99728 163758 99726->99728 99729 16523c 59 API calls 99727->99729 99730 163787 99728->99730 99731 16375e 99728->99731 99734 163750 99729->99734 99732 16523c 59 API calls 99730->99732 99733 180fe6 Mailbox 59 API calls 99731->99733 99732->99734 99733->99734 99734->99716 99735->99722 99736->99725 99737->99723 99738 187e83 99739 187e8f _doexit 99738->99739 99775 18a038 GetStartupInfoW 99739->99775 99741 187e94 99777 188dac GetProcessHeap 99741->99777 99743 187eec 99744 187ef7 99743->99744 99860 187fd3 58 API calls 3 library calls 99743->99860 99778 189d16 99744->99778 99747 187efd 99748 187f08 __RTC_Initialize 99747->99748 99861 187fd3 58 API calls 3 library calls 99747->99861 99799 18d802 99748->99799 99751 187f17 99752 187f23 GetCommandLineW 99751->99752 99862 187fd3 58 API calls 3 library calls 99751->99862 99818 195153 GetEnvironmentStringsW 99752->99818 99755 187f22 99755->99752 99758 187f3d 99759 187f48 99758->99759 99863 1832e5 58 API calls 3 library calls 99758->99863 99828 194f88 99759->99828 99762 187f4e 99763 187f59 99762->99763 99864 1832e5 58 API calls 3 library calls 99762->99864 99842 18331f 99763->99842 99766 187f61 99767 187f6c __wwincmdln 99766->99767 99865 1832e5 58 API calls 3 library calls 99766->99865 99848 175f8b 99767->99848 99770 187f80 99771 187f8f 99770->99771 99866 183588 58 API calls _doexit 99770->99866 99867 183310 58 API calls _doexit 99771->99867 99774 187f94 _doexit 99776 18a04e 99775->99776 99776->99741 99777->99743 99868 1833b7 36 API calls 2 library calls 99778->99868 99780 189d1b 99869 189f6c InitializeCriticalSectionAndSpinCount __mtinitlocknum 99780->99869 99782 189d20 99783 189d24 99782->99783 99871 189fba TlsAlloc 99782->99871 99870 189d8c 61 API calls 2 library calls 99783->99870 99786 189d29 99786->99747 99787 189d36 99787->99783 99788 189d41 99787->99788 99872 188a05 99788->99872 99791 189d83 99880 189d8c 61 API calls 2 library calls 99791->99880 99794 189d62 99794->99791 99796 189d68 99794->99796 99795 189d88 99795->99747 99879 189c63 58 API calls 4 library calls 99796->99879 99798 189d70 GetCurrentThreadId 99798->99747 99800 18d80e _doexit 99799->99800 99801 189e3b __lock 58 API calls 99800->99801 99802 18d815 99801->99802 99803 188a05 __calloc_crt 58 API calls 99802->99803 99804 18d826 99803->99804 99805 18d891 GetStartupInfoW 99804->99805 99806 18d831 _doexit @_EH4_CallFilterFunc@8 99804->99806 99812 18d8a6 99805->99812 99815 18d9d5 99805->99815 99806->99751 99807 18da9d 99894 18daad LeaveCriticalSection _doexit 99807->99894 99809 188a05 __calloc_crt 58 API calls 99809->99812 99810 18da22 GetStdHandle 99810->99815 99811 18da35 GetFileType 99811->99815 99812->99809 99814 18d8f4 99812->99814 99812->99815 99813 18d928 GetFileType 99813->99814 99814->99813 99814->99815 99892 18a05b InitializeCriticalSectionAndSpinCount 99814->99892 99815->99807 99815->99810 99815->99811 99893 18a05b InitializeCriticalSectionAndSpinCount 99815->99893 99819 187f33 99818->99819 99820 195164 99818->99820 99824 194d4b GetModuleFileNameW 99819->99824 99895 188a4d 58 API calls 2 library calls 99820->99895 99822 19518a _memmove 99823 1951a0 FreeEnvironmentStringsW 99822->99823 99823->99819 99825 194d7f _wparse_cmdline 99824->99825 99827 194dbf _wparse_cmdline 99825->99827 99896 188a4d 58 API calls 2 library calls 99825->99896 99827->99758 99829 194fa1 __wsetenvp 99828->99829 99833 194f99 99828->99833 99830 188a05 __calloc_crt 58 API calls 99829->99830 99838 194fca __wsetenvp 99830->99838 99831 195021 99832 182f85 _free 58 API calls 99831->99832 99832->99833 99833->99762 99834 188a05 __calloc_crt 58 API calls 99834->99838 99835 195046 99836 182f85 _free 58 API calls 99835->99836 99836->99833 99838->99831 99838->99833 99838->99834 99838->99835 99839 19505d 99838->99839 99897 194837 58 API calls __ftell_nolock 99838->99897 99898 188ff6 IsProcessorFeaturePresent 99839->99898 99841 195069 99841->99762 99844 18332b __IsNonwritableInCurrentImage 99842->99844 99921 18a701 99844->99921 99845 183349 __initterm_e 99846 182f70 __cinit 67 API calls 99845->99846 99847 183368 _doexit __IsNonwritableInCurrentImage 99845->99847 99846->99847 99847->99766 99849 176044 99848->99849 99850 175fa5 99848->99850 99849->99770 99851 175fdf IsThemeActive 99850->99851 99924 18359c 99851->99924 99855 17600b 99936 175f00 SystemParametersInfoW SystemParametersInfoW 99855->99936 99857 176017 99937 175240 99857->99937 99859 17601f SystemParametersInfoW 99859->99849 99860->99744 99861->99748 99862->99755 99866->99771 99867->99774 99868->99780 99869->99782 99870->99786 99871->99787 99874 188a0c 99872->99874 99875 188a47 99874->99875 99877 188a2a 99874->99877 99881 195426 99874->99881 99875->99791 99878 18a016 TlsSetValue 99875->99878 99877->99874 99877->99875 99889 18a362 Sleep 99877->99889 99878->99794 99879->99798 99880->99795 99882 195431 99881->99882 99887 19544c 99881->99887 99883 19543d 99882->99883 99882->99887 99890 188d58 58 API calls __getptd_noexit 99883->99890 99884 19545c HeapAlloc 99884->99887 99888 195442 99884->99888 99887->99884 99887->99888 99891 1835d1 DecodePointer 99887->99891 99888->99874 99889->99877 99890->99888 99891->99887 99892->99814 99893->99815 99894->99806 99895->99822 99896->99827 99897->99838 99899 189001 99898->99899 99904 188e89 99899->99904 99903 18901c 99903->99841 99905 188ea3 _memset ___raise_securityfailure 99904->99905 99906 188ec3 IsDebuggerPresent 99905->99906 99912 18a385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99906->99912 99908 188f87 ___raise_securityfailure 99913 18c826 99908->99913 99910 188faa 99911 18a370 GetCurrentProcess TerminateProcess 99910->99911 99911->99903 99912->99908 99914 18c82e 99913->99914 99915 18c830 IsProcessorFeaturePresent 99913->99915 99914->99910 99917 195b3a 99915->99917 99920 195ae9 5 API calls 2 library calls 99917->99920 99919 195c1d 99919->99910 99920->99919 99922 18a704 EncodePointer 99921->99922 99922->99922 99923 18a71e 99922->99923 99923->99845 99925 189e3b __lock 58 API calls 99924->99925 99926 1835a7 DecodePointer EncodePointer 99925->99926 99989 189fa5 LeaveCriticalSection 99926->99989 99928 176004 99929 183604 99928->99929 99930 183628 99929->99930 99931 18360e 99929->99931 99930->99855 99931->99930 99990 188d58 58 API calls __getptd_noexit 99931->99990 99933 183618 99991 188fe6 9 API calls __ftell_nolock 99933->99991 99935 183623 99935->99855 99936->99857 99938 17524d __ftell_nolock 99937->99938 99939 171207 59 API calls 99938->99939 99940 175258 GetCurrentDirectoryW 99939->99940 99992 174ec8 99940->99992 99942 17527e IsDebuggerPresent 99943 1b0b21 MessageBoxA 99942->99943 99944 17528c 99942->99944 99945 1b0b39 99943->99945 99944->99945 99946 1752a0 99944->99946 100100 17314d 59 API calls Mailbox 99945->100100 100060 1731bf 99946->100060 99950 1b0b49 99957 1b0b5f SetCurrentDirectoryW 99950->99957 99956 17536c Mailbox 99956->99859 99957->99956 99989->99928 99990->99933 99991->99935 99993 171207 59 API calls 99992->99993 99994 174ede 99993->99994 100102 175420 99994->100102 99996 174efc 99997 1719e1 59 API calls 99996->99997 99998 174f10 99997->99998 99999 171c9c 59 API calls 99998->99999 100000 174f1b 99999->100000 100116 16477a 100000->100116 100003 171a36 59 API calls 100004 174f34 100003->100004 100005 1639be 68 API calls 100004->100005 100006 174f44 Mailbox 100005->100006 100007 171a36 59 API calls 100006->100007 100008 174f68 100007->100008 100009 1639be 68 API calls 100008->100009 100010 174f77 Mailbox 100009->100010 100011 171207 59 API calls 100010->100011 100012 174f94 100011->100012 100119 1755bc 100012->100119 100015 18312d _W_store_winword 60 API calls 100016 174fae 100015->100016 100017 1b0a54 100016->100017 100018 174fb8 100016->100018 100019 1755bc 59 API calls 100017->100019 100020 18312d _W_store_winword 60 API calls 100018->100020 100021 1b0a68 100019->100021 100022 174fc3 100020->100022 100024 1755bc 59 API calls 100021->100024 100022->100021 100023 174fcd 100022->100023 100025 18312d _W_store_winword 60 API calls 100023->100025 100026 1b0a84 100024->100026 100027 174fd8 100025->100027 100030 1800cf 61 API calls 100026->100030 100027->100026 100028 174fe2 100027->100028 100029 18312d _W_store_winword 60 API calls 100028->100029 100032 174fed 100029->100032 100031 1b0aa7 100030->100031 100033 1755bc 59 API calls 100031->100033 100034 174ff7 100032->100034 100049 1b0ad0 100032->100049 100035 1b0ab3 100033->100035 100038 171c9c 59 API calls 100034->100038 100039 17501b 100034->100039 100037 171c9c 59 API calls 100035->100037 100036 1755bc 59 API calls 100040 1b0aee 100036->100040 100041 1b0ac1 100037->100041 100042 17500e 100038->100042 100043 1647be 59 API calls 100039->100043 100044 171c9c 59 API calls 100040->100044 100045 1755bc 59 API calls 100041->100045 100046 1755bc 59 API calls 100042->100046 100047 17502a 100043->100047 100048 1b0afc 100044->100048 100045->100049 100046->100039 100050 164540 59 API calls 100047->100050 100051 1755bc 59 API calls 100048->100051 100049->100036 100052 175038 100050->100052 100053 1b0b0b 100051->100053 100125 1643d0 100052->100125 100053->100053 100055 16477a 59 API calls 100057 175055 100055->100057 100056 1643d0 59 API calls 100056->100057 100057->100055 100057->100056 100058 1755bc 59 API calls 100057->100058 100059 17509b Mailbox 100057->100059 100058->100057 100059->99942 100061 1731cc __ftell_nolock 100060->100061 100062 1731e5 100061->100062 100063 1b0314 _memset 100061->100063 100064 180284 60 API calls 100062->100064 100065 1b0330 GetOpenFileNameW 100063->100065 100066 1731ee 100064->100066 100067 1b037f 100065->100067 100135 1809c5 100066->100135 100069 171821 59 API calls 100067->100069 100071 1b0394 100069->100071 100071->100071 100073 173203 100153 17278a 100073->100153 100100->99950 100103 17542d __ftell_nolock 100102->100103 100104 171821 59 API calls 100103->100104 100108 175590 Mailbox 100103->100108 100106 17545f 100104->100106 100105 171609 59 API calls 100105->100106 100106->100105 100114 175495 Mailbox 100106->100114 100107 175563 100107->100108 100109 171a36 59 API calls 100107->100109 100108->99996 100110 175584 100109->100110 100113 174c94 59 API calls 100110->100113 100111 171a36 59 API calls 100111->100114 100112 171609 59 API calls 100112->100114 100113->100108 100114->100107 100114->100108 100114->100111 100114->100112 100115 174c94 59 API calls 100114->100115 100115->100114 100117 180fe6 Mailbox 59 API calls 100116->100117 100118 164787 100117->100118 100118->100003 100120 1755c6 100119->100120 100121 1755df 100119->100121 100122 171c9c 59 API calls 100120->100122 100123 171821 59 API calls 100121->100123 100124 174fa0 100122->100124 100123->100124 100124->100015 100126 19d6c9 100125->100126 100128 1643e7 100125->100128 100126->100128 100134 1640cb 59 API calls Mailbox 100126->100134 100129 164530 100128->100129 100130 1644e8 100128->100130 100133 1644ef 100128->100133 100131 16523c 59 API calls 100129->100131 100132 180fe6 Mailbox 59 API calls 100130->100132 100131->100133 100132->100133 100133->100057 100134->100128 100136 191b70 __ftell_nolock 100135->100136 100137 1809d2 GetLongPathNameW 100136->100137 100138 171821 59 API calls 100137->100138 100139 1731f7 100138->100139 100140 172f3d 100139->100140 100141 171207 59 API calls 100140->100141 100142 172f4f 100141->100142 100143 180284 60 API calls 100142->100143 100144 172f5a 100143->100144 100145 172f65 100144->100145 100146 1b0177 100144->100146 100147 174c94 59 API calls 100145->100147 100151 1b0191 100146->100151 100193 17151f 61 API calls 100146->100193 100149 172f71 100147->100149 100187 161307 100149->100187 100152 172f84 Mailbox 100152->100073 100194 1749c2 100153->100194 100156 1af8d6 100311 1c9b16 100156->100311 100157 1749c2 136 API calls 100159 1727c3 100157->100159 100159->100156 100161 1727cb 100159->100161 100165 1727d7 100161->100165 100166 1af8f3 100161->100166 100162 1af8eb 100369 174a2f 100162->100369 100163 1af908 100164 180fe6 Mailbox 59 API calls 100163->100164 100178 1af94d Mailbox 100164->100178 100218 1729be 100165->100218 100375 1c47e8 90 API calls _wprintf 100166->100375 100171 1af901 100171->100163 100172 1afb01 100178->100172 100181 1afb12 100178->100181 100184 171a36 59 API calls 100178->100184 100346 1bfef8 100178->100346 100349 1c793a 100178->100349 100355 17343f 100178->100355 100363 173297 100178->100363 100184->100178 100188 161319 100187->100188 100192 161338 _memmove 100187->100192 100191 180fe6 Mailbox 59 API calls 100188->100191 100189 180fe6 Mailbox 59 API calls 100190 16134f 100189->100190 100190->100152 100191->100192 100192->100189 100193->100146 100378 174b29 100194->100378 100199 1b08bb 100202 174a2f 84 API calls 100199->100202 100200 1749ed LoadLibraryExW 100388 174ade 100200->100388 100204 1b08c2 100202->100204 100206 174ade 3 API calls 100204->100206 100207 1b08ca 100206->100207 100414 174ab2 100207->100414 100208 174a14 100208->100207 100209 174a20 100208->100209 100211 174a2f 84 API calls 100209->100211 100213 1727af 100211->100213 100213->100156 100213->100157 100215 1b08f1 100422 174a6e 100215->100422 100219 1729e7 100218->100219 100220 1afd14 100218->100220 100779 173df7 60 API calls Mailbox 100219->100779 100795 1bff5c 89 API calls 4 library calls 100220->100795 100223 172a09 100780 173e47 67 API calls 100223->100780 100224 1afd27 100796 1bff5c 89 API calls 4 library calls 100224->100796 100226 172a1e 100226->100224 100312 174a8c 85 API calls 100311->100312 100313 1c9b85 100312->100313 100804 1c9cf1 100313->100804 100316 174ab2 74 API calls 100317 1c9bb4 100316->100317 100343 1af8e7 100343->100162 100343->100163 100375->100171 100427 174b77 100378->100427 100381 174b77 2 API calls 100384 174b50 100381->100384 100382 174b60 FreeLibrary 100383 1749d4 100382->100383 100385 18547b 100383->100385 100384->100382 100384->100383 100431 185490 100385->100431 100387 1749e1 100387->100199 100387->100200 100512 174baa 100388->100512 100391 174b03 100393 174b15 FreeLibrary 100391->100393 100394 174a05 100391->100394 100392 174baa 2 API calls 100392->100391 100393->100394 100395 1748b0 100394->100395 100396 180fe6 Mailbox 59 API calls 100395->100396 100397 1748c5 100396->100397 100398 17433f 59 API calls 100397->100398 100399 1748d1 _memmove 100398->100399 100400 1b080a 100399->100400 100401 17490c 100399->100401 100402 1b0817 100400->100402 100521 1c9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 100400->100521 100403 174a6e 69 API calls 100401->100403 100522 1c9f5e 95 API calls 100402->100522 100406 174915 100403->100406 100407 174ab2 74 API calls 100406->100407 100408 1b0859 100406->100408 100411 174a8c 85 API calls 100406->100411 100413 1749a0 100406->100413 100407->100406 100516 174a8c 100408->100516 100411->100406 100412 174ab2 74 API calls 100412->100413 100413->100208 100415 174ac4 100414->100415 100416 1b0945 100414->100416 100628 185802 100415->100628 100419 1c96c4 100753 1c951a 100419->100753 100421 1c96da 100421->100215 100423 1b0908 100422->100423 100424 174a7d 100422->100424 100758 185e80 100424->100758 100426 174a85 100428 174b44 100427->100428 100429 174b80 LoadLibraryA 100427->100429 100428->100381 100428->100384 100429->100428 100430 174b91 GetProcAddress 100429->100430 100430->100428 100433 18549c _doexit 100431->100433 100432 1854af 100480 188d58 58 API calls __getptd_noexit 100432->100480 100433->100432 100435 1854e0 100433->100435 100450 190718 100435->100450 100436 1854b4 100481 188fe6 9 API calls __ftell_nolock 100436->100481 100439 1854e5 100440 1854fb 100439->100440 100441 1854ee 100439->100441 100443 185525 100440->100443 100444 185505 100440->100444 100482 188d58 58 API calls __getptd_noexit 100441->100482 100465 190837 100443->100465 100483 188d58 58 API calls __getptd_noexit 100444->100483 100445 1854bf _doexit @_EH4_CallFilterFunc@8 100445->100387 100451 190724 _doexit 100450->100451 100452 189e3b __lock 58 API calls 100451->100452 100453 190732 100452->100453 100454 1907ad 100453->100454 100460 189ec3 __mtinitlocknum 58 API calls 100453->100460 100463 1907a6 100453->100463 100488 186e7d 59 API calls __lock 100453->100488 100489 186ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100453->100489 100490 188a4d 58 API calls 2 library calls 100454->100490 100457 1907b4 100457->100463 100491 18a05b InitializeCriticalSectionAndSpinCount 100457->100491 100458 190823 _doexit 100458->100439 100460->100453 100462 1907da EnterCriticalSection 100462->100463 100485 19082e 100463->100485 100473 190857 __wopenfile 100465->100473 100466 190871 100496 188d58 58 API calls __getptd_noexit 100466->100496 100468 190876 100497 188fe6 9 API calls __ftell_nolock 100468->100497 100470 190a8f 100493 1987d1 100470->100493 100471 185530 100484 185552 LeaveCriticalSection LeaveCriticalSection _fseek 100471->100484 100473->100466 100479 190a2c 100473->100479 100498 1839fb 60 API calls 2 library calls 100473->100498 100475 190a25 100475->100479 100499 1839fb 60 API calls 2 library calls 100475->100499 100477 190a44 100477->100479 100500 1839fb 60 API calls 2 library calls 100477->100500 100479->100466 100479->100470 100480->100436 100481->100445 100482->100445 100483->100445 100484->100445 100492 189fa5 LeaveCriticalSection 100485->100492 100487 190835 100487->100458 100488->100453 100489->100453 100490->100457 100491->100462 100492->100487 100501 197fb5 100493->100501 100495 1987ea 100495->100471 100496->100468 100497->100471 100498->100475 100499->100477 100500->100479 100502 197fc1 _doexit 100501->100502 100503 197fd7 100502->100503 100505 19800d 100502->100505 100504 188d58 __ftell_nolock 58 API calls 100503->100504 100506 197fdc 100504->100506 100507 19807e __wsopen_nolock 109 API calls 100505->100507 100508 188fe6 __ftell_nolock 9 API calls 100506->100508 100509 198029 100507->100509 100511 197fe6 _doexit 100508->100511 100510 198052 __wsopen_helper LeaveCriticalSection 100509->100510 100510->100511 100511->100495 100513 174af7 100512->100513 100514 174bb3 LoadLibraryA 100512->100514 100513->100391 100513->100392 100514->100513 100515 174bc4 GetProcAddress 100514->100515 100515->100513 100517 174a9b 100516->100517 100520 1b0923 100516->100520 100523 185a6d 100517->100523 100519 174aa9 100519->100412 100521->100402 100522->100406 100524 185a79 _doexit 100523->100524 100525 185a8b 100524->100525 100527 185ab1 100524->100527 100554 188d58 58 API calls __getptd_noexit 100525->100554 100536 186e3e 100527->100536 100528 185a90 100555 188fe6 9 API calls __ftell_nolock 100528->100555 100535 185a9b _doexit 100535->100519 100537 186e4e 100536->100537 100538 186e70 EnterCriticalSection 100536->100538 100537->100538 100539 186e56 100537->100539 100540 185ab7 100538->100540 100541 189e3b __lock 58 API calls 100539->100541 100542 1859de 100540->100542 100541->100540 100543 1859fc 100542->100543 100544 1859ec 100542->100544 100546 185a12 100543->100546 100557 185af0 100543->100557 100627 188d58 58 API calls __getptd_noexit 100544->100627 100586 184c5d 100546->100586 100547 1859f1 100556 185ae8 LeaveCriticalSection LeaveCriticalSection _fseek 100547->100556 100554->100528 100555->100535 100556->100535 100558 185afd __ftell_nolock 100557->100558 100559 185b2d 100558->100559 100560 185b15 100558->100560 100561 184906 __ftell_nolock 58 API calls 100559->100561 100562 188d58 __ftell_nolock 58 API calls 100560->100562 100587 184c70 100586->100587 100588 184c94 100586->100588 100587->100588 100589 184906 __ftell_nolock 58 API calls 100587->100589 100592 184906 100588->100592 100627->100547 100631 18581d 100628->100631 100630 174ad5 100630->100419 100632 185829 _doexit 100631->100632 100633 18586c 100632->100633 100634 18583f _memset 100632->100634 100635 185864 _doexit 100632->100635 100636 186e3e __lock_file 59 API calls 100633->100636 100658 188d58 58 API calls __getptd_noexit 100634->100658 100635->100630 100637 185872 100636->100637 100644 18563d 100637->100644 100639 185859 100659 188fe6 9 API calls __ftell_nolock 100639->100659 100647 185658 _memset 100644->100647 100651 185673 100644->100651 100645 185663 100749 188d58 58 API calls __getptd_noexit 100645->100749 100647->100645 100647->100651 100652 1856b3 100647->100652 100648 185668 100750 188fe6 9 API calls __ftell_nolock 100648->100750 100660 1858a6 LeaveCriticalSection LeaveCriticalSection _fseek 100651->100660 100652->100651 100653 1857c4 _memset 100652->100653 100654 184906 __ftell_nolock 58 API calls 100652->100654 100661 19108b 100652->100661 100729 190dd7 100652->100729 100751 190ef8 58 API calls 3 library calls 100652->100751 100752 188d58 58 API calls __getptd_noexit 100653->100752 100654->100652 100658->100639 100659->100635 100660->100635 100662 1910ac 100661->100662 100666 1910c3 100661->100666 100663 188d24 __chsize_nolock 58 API calls 100662->100663 100665 1910b1 100663->100665 100664 1917fb 100667 188d24 __chsize_nolock 58 API calls 100664->100667 100669 188d58 __ftell_nolock 58 API calls 100665->100669 100666->100664 100670 1910fd 100666->100670 100668 191800 100667->100668 100671 188d58 __ftell_nolock 58 API calls 100668->100671 100709 1910b8 100669->100709 100672 191105 100670->100672 100677 19111c 100670->100677 100673 191111 100671->100673 100674 188d24 __chsize_nolock 58 API calls 100672->100674 100676 188fe6 __ftell_nolock 9 API calls 100673->100676 100675 19110a 100674->100675 100679 188d58 __ftell_nolock 58 API calls 100675->100679 100676->100709 100678 191131 100677->100678 100681 19114b 100677->100681 100682 191169 100677->100682 100677->100709 100680 188d24 __chsize_nolock 58 API calls 100678->100680 100679->100673 100680->100675 100681->100678 100686 191156 100681->100686 100683 188a4d __malloc_crt 58 API calls 100682->100683 100684 191179 100683->100684 100687 19119c 100684->100687 100688 191181 100684->100688 100685 195e9b __stbuf 58 API calls 100689 19126a 100685->100689 100686->100685 100692 191af1 __lseeki64_nolock 60 API calls 100687->100692 100690 188d58 __ftell_nolock 58 API calls 100688->100690 100691 1912e3 ReadFile 100689->100691 100696 191280 GetConsoleMode 100689->100696 100693 191186 100690->100693 100694 1917c3 GetLastError 100691->100694 100695 191305 100691->100695 100692->100686 100697 188d24 __chsize_nolock 58 API calls 100693->100697 100698 1917d0 100694->100698 100699 1912c3 100694->100699 100695->100694 100703 1912d5 100695->100703 100700 1912e0 100696->100700 100701 191294 100696->100701 100697->100709 100702 188d58 __ftell_nolock 58 API calls 100698->100702 100707 188d37 __dosmaperr 58 API calls 100699->100707 100711 1912c9 100699->100711 100700->100691 100701->100700 100704 19129a ReadConsoleW 100701->100704 100703->100711 100713 19133a 100703->100713 100719 1915a7 100703->100719 100704->100703 100706 1912bd GetLastError 100704->100706 100706->100699 100707->100711 100709->100652 100710 182f85 _free 58 API calls 100710->100709 100711->100709 100711->100710 100714 1913a6 ReadFile 100713->100714 100720 191427 100713->100720 100718 1916ad ReadFile 100719->100711 100719->100718 100720->100711 100730 190de2 100729->100730 100735 190df7 100729->100735 100731 188d58 __ftell_nolock 58 API calls 100730->100731 100732 190de7 100731->100732 100733 188fe6 __ftell_nolock 9 API calls 100732->100733 100740 190df2 100733->100740 100734 190e2c 100737 184906 __ftell_nolock 58 API calls 100734->100737 100735->100734 100736 196214 __getbuf 58 API calls 100735->100736 100735->100740 100736->100734 100738 190e40 100737->100738 100739 190f77 __read 72 API calls 100738->100739 100741 190e47 100739->100741 100740->100652 100741->100740 100742 184906 __ftell_nolock 58 API calls 100741->100742 100743 190e6a 100742->100743 100743->100740 100744 184906 __ftell_nolock 58 API calls 100743->100744 100745 190e76 100744->100745 100745->100740 100746 184906 __ftell_nolock 58 API calls 100745->100746 100747 190e83 100746->100747 100749->100648 100750->100651 100751->100652 100752->100648 100756 18542a GetSystemTimeAsFileTime 100753->100756 100755 1c9529 100755->100421 100757 185458 __aulldiv 100756->100757 100757->100755 100759 185e8c _doexit 100758->100759 100760 185e9e 100759->100760 100761 185eb3 100759->100761 100771 188d58 58 API calls __getptd_noexit 100760->100771 100763 186e3e __lock_file 59 API calls 100761->100763 100765 185eb9 100763->100765 100764 185ea3 100772 188fe6 9 API calls __ftell_nolock 100764->100772 100767 185af0 __ftell_nolock 67 API calls 100765->100767 100768 185ec4 100767->100768 100773 185ee4 LeaveCriticalSection LeaveCriticalSection _fseek 100768->100773 100770 185eae _doexit 100770->100426 100771->100764 100772->100770 100773->100770 100779->100223 100780->100226 100795->100224 100805 1c9d05 __tzset_nolock _wcscmp 100804->100805 100806 1c9b99 100805->100806 100807 174ab2 74 API calls 100805->100807 100808 1c96c4 GetSystemTimeAsFileTime 100805->100808 100809 174a8c 85 API calls 100805->100809 100806->100316 100806->100343 100807->100805 100808->100805 100809->100805 100941 169b8b 100944 1686e0 100941->100944 100945 1686fd 100944->100945 100946 1a0ff8 100945->100946 100947 1a0fad 100945->100947 100968 168724 100945->100968 100979 1daad0 273 API calls __cinit 100946->100979 100950 1a0fb5 100947->100950 100953 1a0fc2 100947->100953 100947->100968 100948 165278 59 API calls 100948->100968 100977 1db0e4 273 API calls 100950->100977 100951 182f70 __cinit 67 API calls 100951->100968 100969 16898d 100953->100969 100978 1db58c 273 API calls 3 library calls 100953->100978 100956 163c30 68 API calls 100956->100968 100957 1a1289 100957->100957 100958 1a11af 100981 1dae3b 89 API calls 100958->100981 100959 163f42 68 API calls 100959->100968 100962 168a17 100963 1639be 68 API calls 100963->100968 100966 16523c 59 API calls 100966->100968 100968->100948 100968->100951 100968->100956 100968->100958 100968->100959 100968->100962 100968->100963 100968->100966 100968->100969 100970 1653b0 273 API calls 100968->100970 100971 171c9c 59 API calls 100968->100971 100973 163938 68 API calls 100968->100973 100974 16855e 273 API calls 100968->100974 100975 1684e2 89 API calls 100968->100975 100976 16835f 273 API calls 100968->100976 100980 1b73ab 59 API calls 100968->100980 100969->100962 100982 1ca48d 89 API calls 4 library calls 100969->100982 100970->100968 100971->100968 100973->100968 100974->100968 100975->100968 100976->100968 100977->100953 100978->100969 100979->100968 100980->100968 100981->100969 100982->100957 100983 169a88 100984 1686e0 273 API calls 100983->100984 100985 169a96 100984->100985

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0017526C
                                                                            • IsDebuggerPresent.KERNEL32 ref: 0017527E
                                                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 001752E6
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                              • Part of subcall function 0016BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0016BC07
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00175366
                                                                            • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 001B0B2E
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001B0B66
                                                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00216D10), ref: 001B0BE9
                                                                            • ShellExecuteW.SHELL32(00000000), ref: 001B0BF0
                                                                              • Part of subcall function 0017514C: GetSysColorBrush.USER32(0000000F), ref: 00175156
                                                                              • Part of subcall function 0017514C: LoadCursorW.USER32(00000000,00007F00), ref: 00175165
                                                                              • Part of subcall function 0017514C: LoadIconW.USER32(00000063), ref: 0017517C
                                                                              • Part of subcall function 0017514C: LoadIconW.USER32(000000A4), ref: 0017518E
                                                                              • Part of subcall function 0017514C: LoadIconW.USER32(000000A2), ref: 001751A0
                                                                              • Part of subcall function 0017514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001751C6
                                                                              • Part of subcall function 0017514C: RegisterClassExW.USER32(?), ref: 0017521C
                                                                              • Part of subcall function 001750DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00175109
                                                                              • Part of subcall function 001750DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0017512A
                                                                              • Part of subcall function 001750DB: ShowWindow.USER32(00000000), ref: 0017513E
                                                                              • Part of subcall function 001750DB: ShowWindow.USER32(00000000), ref: 00175147
                                                                              • Part of subcall function 001759D3: _memset.LIBCMT ref: 001759F9
                                                                              • Part of subcall function 001759D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00175A9E
                                                                            Strings
                                                                            • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 001B0B28
                                                                            • runas, xrefs: 001B0BE4
                                                                            • AutoIt, xrefs: 001B0B23
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                            • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                            • API String ID: 529118366-2030392706
                                                                            • Opcode ID: 614009ec9dec45562652854f03394a2f37abbae16173e6a0f1291cf483c059a4
                                                                            • Instruction ID: aee7f52b48dbac591ac02c94dd634f882673201338f35311edd43c0630c56d1c
                                                                            • Opcode Fuzzy Hash: 614009ec9dec45562652854f03394a2f37abbae16173e6a0f1291cf483c059a4
                                                                            • Instruction Fuzzy Hash: C351F93190C248FBCF22EBF4EC4AEFE7B75AB29340F109265F95962162CBB05585C721

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 871 175d13-175d73 call 171207 GetVersionExW call 171821 876 175d79 871->876 877 175e78-175e7a 871->877 878 175d7c-175d81 876->878 879 1b0fa9-1b0fb5 877->879 881 175d87 878->881 882 175e7f-175e80 878->882 880 1b0fb6-1b0fba 879->880 884 1b0fbd-1b0fc9 880->884 885 1b0fbc 880->885 883 175d88-175dbf call 171981 call 17133d 881->883 882->883 894 175dc5-175dc6 883->894 895 1b1098-1b109b 883->895 884->880 886 1b0fcb-1b0fd0 884->886 885->884 886->878 888 1b0fd6-1b0fdd 886->888 888->879 890 1b0fdf 888->890 893 1b0fe4-1b0fea 890->893 896 175e00-175e17 GetCurrentProcess IsWow64Process 893->896 897 1b0fef-1b0ffa 894->897 898 175dcc-175dcf 894->898 899 1b109d 895->899 900 1b10b4-1b10b8 895->900 901 175e1c-175e2d 896->901 902 175e19 896->902 905 1b0ffc-1b1002 897->905 906 1b1017-1b1019 897->906 898->896 907 175dd1-175def 898->907 908 1b10a0 899->908 903 1b10ba-1b10c3 900->903 904 1b10a3-1b10ac 900->904 912 175e2f-175e3f call 1755f0 901->912 913 175e98-175ea2 GetSystemInfo 901->913 902->901 903->908 911 1b10c5-1b10c8 903->911 904->900 914 1b100c-1b1012 905->914 915 1b1004-1b1007 905->915 909 1b101b-1b1027 906->909 910 1b103c-1b103f 906->910 907->896 916 175df1-175df7 907->916 908->904 918 1b1029-1b102c 909->918 919 1b1031-1b1037 909->919 921 1b1041-1b1050 910->921 922 1b1065-1b1068 910->922 911->904 928 175e41-175e4e call 1755f0 912->928 929 175e8c-175e96 GetSystemInfo 912->929 920 175e65-175e75 913->920 914->896 915->896 916->893 917 175dfd 916->917 917->896 918->896 919->896 924 1b105a-1b1060 921->924 925 1b1052-1b1055 921->925 922->896 927 1b106e-1b1083 922->927 924->896 925->896 930 1b108d-1b1093 927->930 931 1b1085-1b1088 927->931 936 175e85-175e8a 928->936 937 175e50-175e54 GetNativeSystemInfo 928->937 932 175e56-175e5a 929->932 930->896 931->896 932->920 935 175e5c-175e5f FreeLibrary 932->935 935->920 936->937 937->932
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?), ref: 00175D40
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • GetCurrentProcess.KERNEL32(?,001F0A18,00000000,00000000,?), ref: 00175E07
                                                                            • IsWow64Process.KERNEL32(00000000), ref: 00175E0E
                                                                            • GetNativeSystemInfo.KERNEL32(00000000), ref: 00175E54
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00175E5F
                                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00175E90
                                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00175E9C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                            • String ID:
                                                                            • API String ID: 1986165174-0
                                                                            • Opcode ID: 3c7a6f451f368f5cfd0a9b6f385ddf383cd9816af413d27213369831c32d4f70
                                                                            • Instruction ID: 1fe11b01f293da236c1155b7193a826d5d87fc8b24cf8d8b248aea83e7e2cca4
                                                                            • Opcode Fuzzy Hash: 3c7a6f451f368f5cfd0a9b6f385ddf383cd9816af413d27213369831c32d4f70
                                                                            • Instruction Fuzzy Hash: F191A431549BC0DEC735DB6884505ABFFF6AF29300B988A5ED0CB93A41D770A648C769

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00180284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00172A58,?,00008000), ref: 001802A4
                                                                              • Part of subcall function 001C4FEC: GetFileAttributesW.KERNEL32(?,001C3BFE), ref: 001C4FED
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 001C407C
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 001C40CC
                                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 001C40DD
                                                                            • FindClose.KERNEL32(00000000), ref: 001C40F4
                                                                            • FindClose.KERNEL32(00000000), ref: 001C40FD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 2649000838-1173974218
                                                                            • Opcode ID: e8c9bd62a3b539b92a8e0eef471da870b06549655d8648d3968decd566474c26
                                                                            • Instruction ID: 75275d3dde923752ac05f968bcaba61c4614db6f52cfc127ef14401ffb5f184a
                                                                            • Opcode Fuzzy Hash: e8c9bd62a3b539b92a8e0eef471da870b06549655d8648d3968decd566474c26
                                                                            • Instruction Fuzzy Hash: 5431803104C345ABC315EB64C895DEFB7B8BEB5304F444A1DF5E582192DB20DA19CB62
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 001C416D
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 001C417B
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 001C419B
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001C4245
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 420147892-0
                                                                            • Opcode ID: 84a6f28ba6177f7931800543adc1643aff0ea3455b4f67bf4f6601d5666e6dab
                                                                            • Instruction ID: 470b548d627479f6b93c312c73ac6da03afaeb41b18544b53bd7578eaeee8813
                                                                            • Opcode Fuzzy Hash: 84a6f28ba6177f7931800543adc1643aff0ea3455b4f67bf4f6601d5666e6dab
                                                                            • Instruction Fuzzy Hash: 52318D71108341ABD315EF94E895BAEBBF8BFA9350F00052DF585821A1EB61EA49CB52
                                                                            APIs
                                                                              • Part of subcall function 00173740: CharUpperBuffW.USER32(?,002271DC,00000000,?,00000000,002271DC,?,001653A5,?,?,?,?), ref: 0017375D
                                                                            • _memmove.LIBCMT ref: 0016B68A
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper_memmove
                                                                            • String ID:
                                                                            • API String ID: 2819905725-0
                                                                            • Opcode ID: e2d9f9dcaec62c8ee67db02552849c314c141d71f2ee29cd32332ae4f94b0357
                                                                            • Instruction ID: 19ba07b05176a1af68fdbff529cf7463b51e3d7eab1826442de666417c32f521
                                                                            • Opcode Fuzzy Hash: e2d9f9dcaec62c8ee67db02552849c314c141d71f2ee29cd32332ae4f94b0357
                                                                            • Instruction Fuzzy Hash: 35A298746083419FC724DF18C880B2AB7E1BF99304F15896DF89A8B362D731ED95CB92
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 528787ab1d36a57832483fd22e44f9d57ac50ccb0a61941202fe76144df2625d
                                                                            • Instruction ID: 5d124c131b86aa8d0ef5a8df017a907a6343e2370c6ebfbca4fef6f996ab1136
                                                                            • Opcode Fuzzy Hash: 528787ab1d36a57832483fd22e44f9d57ac50ccb0a61941202fe76144df2625d
                                                                            • Instruction Fuzzy Hash: 3322B07490021ADFDB24DF58C880ABEB7F8FF19300F15816AE846AB351E374AD95CB91
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleMemoryProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 2407445808-0
                                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction ID: a780dc79d28ab7a117ecc1887c7f07e627b5d10198ab214a83a5052392708036
                                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction Fuzzy Hash: 6131C4B1A0010DDFD79AEF58C48096AF7A6FF59300B658AA5E409CB251E731EEC5CF90
                                                                            APIs
                                                                            • timeGetTime.WINMM ref: 0016BF57
                                                                              • Part of subcall function 001652B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001652E6
                                                                            • Sleep.KERNEL32(0000000A,?,?), ref: 001A36B5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePeekSleepTimetime
                                                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                                            • API String ID: 1792118007-922114024
                                                                            • Opcode ID: 82bd6c32bb71a09199fd76dc4a29604d02aad38e2499735b23b9b30edb099737
                                                                            • Instruction ID: 4d56bc93a360952c79e4f91aade897dac75083aa95b7d860a876c3a5ce876b94
                                                                            • Opcode Fuzzy Hash: 82bd6c32bb71a09199fd76dc4a29604d02aad38e2499735b23b9b30edb099737
                                                                            • Instruction Fuzzy Hash: 2BC2F074608341DFC728DF24C884BAAB7E4FF95304F14891DF49A872A1DB71E995CB82

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 001800CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00173094), ref: 001800ED
                                                                              • Part of subcall function 001808C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,0017309F), ref: 001808E3
                                                                            • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 001730E2
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 001B01BA
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001B01FB
                                                                            • RegCloseKey.ADVAPI32(?), ref: 001B0239
                                                                            • _wcscat.LIBCMT ref: 001B0292
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\$`T
                                                                            • API String ID: 2673923337-541401564
                                                                            • Opcode ID: 60516ca75a9cd5cd8f53fd5ca947c03ccf60c83d9d4d68c58df0da0a40b363fc
                                                                            • Instruction ID: c9a1315e7454f6305a2ffa7228c3d7a8ea65237d56d526946a2fd58a421b362d
                                                                            • Opcode Fuzzy Hash: 60516ca75a9cd5cd8f53fd5ca947c03ccf60c83d9d4d68c58df0da0a40b363fc
                                                                            • Instruction Fuzzy Hash: 33715C71406341AEC325EFA9EC459ABBBF8FF58340B40562EF949831A1EF70D949CB52

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00163444
                                                                            • RegisterClassExW.USER32(00000030), ref: 0016346E
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0016347F
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 0016349C
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001634AC
                                                                            • LoadIconW.USER32(000000A9), ref: 001634C2
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001634D1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 144542616d17e3ec91a75a51d7c3d6c0c03bfd36e0d274f9135b98cdb30e3ab4
                                                                            • Instruction ID: e7e0eb8f1440cf3e20c2f84a7f77ca24a8589aad9738b65c143136f861a5da31
                                                                            • Opcode Fuzzy Hash: 144542616d17e3ec91a75a51d7c3d6c0c03bfd36e0d274f9135b98cdb30e3ab4
                                                                            • Instruction Fuzzy Hash: 54312771849309EFDB52DFA4EC89AD9BBF0FB09310F14425AE580A62A1E7B51582CF91

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00163444
                                                                            • RegisterClassExW.USER32(00000030), ref: 0016346E
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0016347F
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 0016349C
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001634AC
                                                                            • LoadIconW.USER32(000000A9), ref: 001634C2
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001634D1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 046fce485e625b6b20c5ad96ea10e820fa5b8074ca3a6f1550754a5fad341840
                                                                            • Instruction ID: 6534ae44c99decb046a0d1ee059138665107af3e1591ba21b5948cf1004a2bf3
                                                                            • Opcode Fuzzy Hash: 046fce485e625b6b20c5ad96ea10e820fa5b8074ca3a6f1550754a5fad341840
                                                                            • Instruction Fuzzy Hash: FE21E3B1909218AFDB11DFE4EC89BADBBF4FB08700F00525AFA14A62A1D7B11581DF91

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00175156
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00175165
                                                                            • LoadIconW.USER32(00000063), ref: 0017517C
                                                                            • LoadIconW.USER32(000000A4), ref: 0017518E
                                                                            • LoadIconW.USER32(000000A2), ref: 001751A0
                                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001751C6
                                                                            • RegisterClassExW.USER32(?), ref: 0017521C
                                                                              • Part of subcall function 00163411: GetSysColorBrush.USER32(0000000F), ref: 00163444
                                                                              • Part of subcall function 00163411: RegisterClassExW.USER32(00000030), ref: 0016346E
                                                                              • Part of subcall function 00163411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0016347F
                                                                              • Part of subcall function 00163411: InitCommonControlsEx.COMCTL32(?), ref: 0016349C
                                                                              • Part of subcall function 00163411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001634AC
                                                                              • Part of subcall function 00163411: LoadIconW.USER32(000000A9), ref: 001634C2
                                                                              • Part of subcall function 00163411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001634D1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                            • String ID: #$0$AutoIt v3
                                                                            • API String ID: 423443420-4155596026
                                                                            • Opcode ID: 6b5701828cdcfd5afac54467e5c3cf78ce7e21c86bed0faaf9a1b8e66d571b77
                                                                            • Instruction ID: 5b94509019f76477a957fbad1b0347c45a9a5efaa874386dac5e750b5c24c6c7
                                                                            • Opcode Fuzzy Hash: 6b5701828cdcfd5afac54467e5c3cf78ce7e21c86bed0faaf9a1b8e66d571b77
                                                                            • Instruction Fuzzy Hash: FA213770908308FBEB219FA4FD0ABAD7BB5FB18311F00525AF904A62A1D7B65951CF84

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 710 1d5e1d-1d5e54 call 164dc0 713 1d5e74-1d5e86 WSAStartup 710->713 714 1d5e56-1d5e63 call 16502b 710->714 716 1d5e9d-1d5edb call 1740cd call 164d37 call 17402a inet_addr gethostbyname 713->716 717 1d5e88-1d5e98 call 1b7135 713->717 714->713 721 1d5e65-1d5e70 call 16502b 714->721 731 1d5edd-1d5eea IcmpCreateFile 716->731 732 1d5eec-1d5efc call 1b7135 716->732 725 1d5ff6-1d5ffe 717->725 721->713 731->732 733 1d5f01-1d5f32 call 180fe6 call 17433f 731->733 737 1d5fed-1d5ff1 call 171cb6 732->737 742 1d5f55-1d5f69 IcmpSendEcho 733->742 743 1d5f34-1d5f53 IcmpSendEcho 733->743 737->725 744 1d5f6d-1d5f6f 742->744 743->744 745 1d5f71-1d5f76 744->745 746 1d5fa2-1d5fa4 744->746 748 1d5f78-1d5f7d 745->748 749 1d5fba-1d5fcc call 164dc0 745->749 747 1d5fa6-1d5fb2 call 1b7135 746->747 759 1d5fd4-1d5fe8 IcmpCloseHandle WSACleanup call 1745ae 747->759 752 1d5f7f-1d5f84 748->752 753 1d5fb4-1d5fb8 748->753 760 1d5fce-1d5fd0 749->760 761 1d5fd2 749->761 752->746 754 1d5f86-1d5f8b 752->754 753->747 757 1d5f8d-1d5f92 754->757 758 1d5f9a-1d5fa0 754->758 757->753 762 1d5f94-1d5f98 757->762 758->747 759->737 760->759 761->759 762->747
                                                                            APIs
                                                                            • WSAStartup.WS2_32(00000101,?), ref: 001D5E7E
                                                                            • inet_addr.WSOCK32(?,?,?), ref: 001D5EC3
                                                                            • gethostbyname.WS2_32(?), ref: 001D5ECF
                                                                            • IcmpCreateFile.IPHLPAPI ref: 001D5EDD
                                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001D5F4D
                                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001D5F63
                                                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 001D5FD8
                                                                            • WSACleanup.WSOCK32 ref: 001D5FDE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                            • String ID: Ping
                                                                            • API String ID: 1028309954-2246546115
                                                                            • Opcode ID: c84ba4745c59b864dcced0e873e81839c3cc5f7099b4525b13e5c923e314dae5
                                                                            • Instruction ID: 57bd4418db32525fc04ed6e2c8506771d5cfd979c89da1d1683a31322b8ef91d
                                                                            • Opcode Fuzzy Hash: c84ba4745c59b864dcced0e873e81839c3cc5f7099b4525b13e5c923e314dae5
                                                                            • Instruction Fuzzy Hash: 3B517D31604601AFD721EF24CC49B6AB7E5EF88710F14856AF9A9DB3A1DB70ED40DB42

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 764 174d83-174dd1 766 174dd3-174dd6 764->766 767 174e31-174e33 764->767 769 174e37 766->769 770 174dd8-174ddf 766->770 767->766 768 174e35 767->768 771 174e1a-174e22 DefWindowProcW 768->771 772 1b09c2-1b09f0 call 16c460 call 16c483 769->772 773 174e3d-174e40 769->773 774 174de5-174dea 770->774 775 174ead-174eb5 PostQuitMessage 770->775 776 174e28-174e2e 771->776 807 1b09f5-1b09fc 772->807 778 174e65-174e8c SetTimer RegisterWindowMessageW 773->778 779 174e42-174e43 773->779 780 174df0-174df2 774->780 781 1b0a35-1b0a49 call 1c2cce 774->781 777 174e61-174e63 775->777 777->776 778->777 785 174e8e-174e99 CreatePopupMenu 778->785 783 1b0965-1b0968 779->783 784 174e49-174e5c KillTimer call 175ac3 call 1634e4 779->784 786 174eb7-174ec1 call 175b29 780->786 787 174df8-174dfd 780->787 781->777 798 1b0a4f 781->798 792 1b096a-1b096c 783->792 793 1b099e-1b09bd MoveWindow 783->793 784->777 785->777 800 174ec6 786->800 795 1b0a1a-1b0a21 787->795 796 174e03-174e08 787->796 801 1b096e-1b0971 792->801 802 1b098d-1b0999 SetFocus 792->802 793->777 795->771 804 1b0a27-1b0a30 call 1b8854 795->804 805 174e0e-174e14 796->805 806 174e9b-174eab call 175bd7 796->806 798->771 800->777 801->805 808 1b0977-1b0988 call 16c460 801->808 802->777 804->771 805->771 805->807 806->777 807->771 813 1b0a02-1b0a15 call 175ac3 call 1759d3 807->813 808->777 813->771
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 00174E22
                                                                            • KillTimer.USER32(?,00000001), ref: 00174E4C
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00174E6F
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00174E7A
                                                                            • CreatePopupMenu.USER32 ref: 00174E8E
                                                                            • PostQuitMessage.USER32(00000000), ref: 00174EAF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 129472671-2362178303
                                                                            • Opcode ID: 8e5c6b12ccc3d82d4aa98296afd6bcd69f0340d834817d581da54d1d09d5be8a
                                                                            • Instruction ID: d048a70fe08539006b2f6c9f26d6a9540c25c821bf296cfddc151435286f2ac8
                                                                            • Opcode Fuzzy Hash: 8e5c6b12ccc3d82d4aa98296afd6bcd69f0340d834817d581da54d1d09d5be8a
                                                                            • Instruction Fuzzy Hash: AA41E93120C20AFBDB366FA4AC4DBBE3675F754310F048625F949926A2CF789C51D762

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001B0C5B
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • _memset.LIBCMT ref: 00175787
                                                                            • _wcscpy.LIBCMT ref: 001757DB
                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001757EB
                                                                            • __swprintf.LIBCMT ref: 001B0CD1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                                            • String ID: Line %d: $AutoIt -
                                                                            • API String ID: 230667853-4094128768
                                                                            • Opcode ID: 88cd5d26b0794eecc352cd041c29932ad0643599dcb8bcb85aaa9dcf62e4803d
                                                                            • Instruction ID: 20887e7dff7c5cf8a35c8e6de4696f04c13b4afa11627b7d8f68f7746a5f3377
                                                                            • Opcode Fuzzy Hash: 88cd5d26b0794eecc352cd041c29932ad0643599dcb8bcb85aaa9dcf62e4803d
                                                                            • Instruction Fuzzy Hash: 7A41B671008300BAD326EB64DC45FDF77FCAF69354F504A1EF589920A2EB709649CB92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 974 1750db-17514b CreateWindowExW * 2 ShowWindow * 2
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00175109
                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0017512A
                                                                            • ShowWindow.USER32(00000000), ref: 0017513E
                                                                            • ShowWindow.USER32(00000000), ref: 00175147
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateShow
                                                                            • String ID: AutoIt v3$edit
                                                                            • API String ID: 1584632944-3779509399
                                                                            • Opcode ID: c9fa4ae1117efb0b15172001ec6ee930b98fa9c39bffac18fca1194398bf2356
                                                                            • Instruction ID: 939f6c627a84a4209fd95cf2f2e966420258810e118eeaff4b39bb43dd8dd4df
                                                                            • Opcode Fuzzy Hash: c9fa4ae1117efb0b15172001ec6ee930b98fa9c39bffac18fca1194398bf2356
                                                                            • Instruction Fuzzy Hash: 98F01770549294BAEB3217637C0DE773E7DE7CAF10F00121AFE00A21A1C6751882CAB0

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00174A8C: _fseek.LIBCMT ref: 00174AA4
                                                                              • Part of subcall function 001C9CF1: _wcscmp.LIBCMT ref: 001C9DE1
                                                                              • Part of subcall function 001C9CF1: _wcscmp.LIBCMT ref: 001C9DF4
                                                                            • _free.LIBCMT ref: 001C9C5F
                                                                            • _free.LIBCMT ref: 001C9C66
                                                                            • _free.LIBCMT ref: 001C9CD1
                                                                              • Part of subcall function 00182F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00189C54,00000000,00188D5D,001859C3), ref: 00182F99
                                                                              • Part of subcall function 00182F85: GetLastError.KERNEL32(00000000,?,00189C54,00000000,00188D5D,001859C3), ref: 00182FAB
                                                                            • _free.LIBCMT ref: 001C9CD9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                            • String ID: >>>AUTOIT SCRIPT<<<
                                                                            • API String ID: 1552873950-2806939583
                                                                            • Opcode ID: 2fcacae1ded69b2989221889a03f20db8fc1aade9c27113e1866353ebf081166
                                                                            • Instruction ID: 42e6bae19d175349677877b8438cde919a9ad25a4487773b33db4bf18bc1f788
                                                                            • Opcode Fuzzy Hash: 2fcacae1ded69b2989221889a03f20db8fc1aade9c27113e1866353ebf081166
                                                                            • Instruction Fuzzy Hash: FA5128B1D04259ABDB249F64DC85AAEBBB9FF58304F00449EF649A3241DB715A80CF58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1232 18563d-185656 1233 185658-18565d 1232->1233 1234 185673 1232->1234 1233->1234 1235 18565f-185661 1233->1235 1236 185675-18567b 1234->1236 1237 18567c-185681 1235->1237 1238 185663-185668 call 188d58 1235->1238 1240 18568f-185693 1237->1240 1241 185683-18568d 1237->1241 1250 18566e call 188fe6 1238->1250 1244 1856a3-1856a5 1240->1244 1245 185695-1856a0 call 183010 1240->1245 1241->1240 1243 1856b3-1856c2 1241->1243 1248 1856c9 1243->1248 1249 1856c4-1856c7 1243->1249 1244->1238 1247 1856a7-1856b1 1244->1247 1245->1244 1247->1238 1247->1243 1252 1856ce-1856d3 1248->1252 1249->1252 1250->1234 1254 1856d9-1856e0 1252->1254 1255 1857bc-1857bf 1252->1255 1256 185721-185723 1254->1256 1257 1856e2-1856ea 1254->1257 1255->1236 1258 18578d-18578e call 190dd7 1256->1258 1259 185725-185727 1256->1259 1257->1256 1260 1856ec 1257->1260 1267 185793-185797 1258->1267 1262 185729-185731 1259->1262 1263 18574b-185756 1259->1263 1264 1857ea 1260->1264 1265 1856f2-1856f4 1260->1265 1268 185741-185745 1262->1268 1269 185733-18573f 1262->1269 1270 185758 1263->1270 1271 18575a-18575d 1263->1271 1266 1857ee-1857f7 1264->1266 1272 1856fb-185700 1265->1272 1273 1856f6-1856f8 1265->1273 1266->1236 1267->1266 1274 185799-18579e 1267->1274 1275 185747-185749 1268->1275 1269->1275 1270->1271 1276 18575f-18576b call 184906 call 19108b 1271->1276 1277 1857c4-1857c8 1271->1277 1272->1277 1278 185706-18571f call 190ef8 1272->1278 1273->1272 1274->1277 1279 1857a0-1857b1 1274->1279 1275->1271 1293 185770-185775 1276->1293 1280 1857da-1857e5 call 188d58 1277->1280 1281 1857ca-1857d7 call 183010 1277->1281 1289 185782-18578b 1278->1289 1285 1857b4-1857b6 1279->1285 1280->1250 1281->1280 1285->1254 1285->1255 1289->1285 1294 18577b-18577e 1293->1294 1295 1857fc-185800 1293->1295 1294->1264 1296 185780 1294->1296 1295->1266 1296->1289
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                            • String ID:
                                                                            • API String ID: 1559183368-0
                                                                            • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                            • Instruction ID: abd3b85d610243a488a3ec4e00fe7b58a660e047d015e3b21c3a0a49697efd04
                                                                            • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                            • Instruction Fuzzy Hash: 0E51A330A00B05DBDB28AFA9C88466E77A7EF50324FA4C769F835962D0E7709F509F50

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1297 1652b0-1652c0 1298 1652c6-1652cd 1297->1298 1299 19df28-19df2f 1297->1299 1300 19df3a-19df41 1298->1300 1301 1652d3-1652ea PeekMessageW 1298->1301 1302 16530c 1299->1302 1303 19df35 1299->1303 1300->1302 1306 19df47 1300->1306 1304 165313-165317 1301->1304 1305 1652ec-1652f4 1301->1305 1307 16530e-165312 1302->1307 1303->1300 1308 16531d-165326 1304->1308 1309 19df95-19df9c 1304->1309 1310 19dfab-19dfbc 1305->1310 1311 1652fa-165306 1305->1311 1312 19df4c-19df52 1306->1312 1308->1312 1313 16532c-16533c call 16359e 1308->1313 1309->1310 1314 165368-16536d 1311->1314 1315 165308-16530a 1311->1315 1316 19df54-19df60 1312->1316 1317 19df86 1312->1317 1323 165352-165366 TranslateMessage DispatchMessageW 1313->1323 1324 16533e-16534e PeekMessageW 1313->1324 1314->1307 1315->1302 1319 16536f-165374 1315->1319 1316->1317 1320 19df62-19df66 1316->1320 1317->1309 1319->1307 1320->1317 1322 19df68-19df7b TranslateAcceleratorW 1320->1322 1322->1324 1325 19df81 1322->1325 1323->1324 1324->1305 1326 165350 1324->1326 1325->1313 1326->1304
                                                                            APIs
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001652E6
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0016534A
                                                                            • TranslateMessage.USER32(?), ref: 00165356
                                                                            • DispatchMessageW.USER32(?), ref: 00165360
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Peek$DispatchTranslate
                                                                            • String ID:
                                                                            • API String ID: 1795658109-0
                                                                            • Opcode ID: ffe330bd9b11dc4b39d76ff532f05ada20a78dd5f7535402aea99e88de61dbdc
                                                                            • Instruction ID: 83076b08e555f72212d1f76ed0191a367583bfbf8fded5eaf7d0098348c1f2b2
                                                                            • Opcode Fuzzy Hash: ffe330bd9b11dc4b39d76ff532f05ada20a78dd5f7535402aea99e88de61dbdc
                                                                            • Instruction Fuzzy Hash: 25315830508B06EBEF30CBA4EC49FBA77E9BB01B40F101159F412972E1D7B19896E722
                                                                            APIs
                                                                              • Part of subcall function 0017FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,001E4186,00000001,001F0980), ref: 0017FFA7
                                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0016AD08
                                                                            • OleInitialize.OLE32(00000000), ref: 0016AD85
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001A2F56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                                            • String ID: <w"
                                                                            • API String ID: 3815369404-1731095347
                                                                            • Opcode ID: 4d535e86b4bbaa7f2c77849cf199d5b099a016c5eab2fbecf9cf6aee66828dd9
                                                                            • Instruction ID: 75f38d614f0b86f3e18fb580a723613064f8bbd84d35b3d67555e381b20109aa
                                                                            • Opcode Fuzzy Hash: 4d535e86b4bbaa7f2c77849cf199d5b099a016c5eab2fbecf9cf6aee66828dd9
                                                                            • Instruction Fuzzy Hash: 524102B090D240AFC369EFE9BC49669BFF5EB69310750A16AE418D32B2EB700412CF51
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00161275,SwapMouseButtons,00000004,?), ref: 001612A8
                                                                            • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00161275,SwapMouseButtons,00000004,?), ref: 001612C9
                                                                            • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00161275,SwapMouseButtons,00000004,?), ref: 001612EB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: Control Panel\Mouse
                                                                            • API String ID: 3677997916-824357125
                                                                            • Opcode ID: 459b1adda1e78a7e24b5ea9a1405a4ae03005b94ed40ae11b4b01a4c71b13a22
                                                                            • Instruction ID: 530dc91d4203decec8977d524f4a2d1d5a0875860efe7ba5d47658f6f056c3bb
                                                                            • Opcode Fuzzy Hash: 459b1adda1e78a7e24b5ea9a1405a4ae03005b94ed40ae11b4b01a4c71b13a22
                                                                            • Instruction Fuzzy Hash: 42111575610208BFDB218FA8DC84EAEBBA8EF05751F144569F805D7210E7719E50DBA4
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00175B58
                                                                              • Part of subcall function 001756F8: _memset.LIBCMT ref: 00175787
                                                                              • Part of subcall function 001756F8: _wcscpy.LIBCMT ref: 001757DB
                                                                              • Part of subcall function 001756F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001757EB
                                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00175BAD
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00175BBC
                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001B0D7C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 1378193009-0
                                                                            • Opcode ID: 99629bffbd0d582d55c393e7acc0ec809fdb867575c337e6b71ec1c20baff2a2
                                                                            • Instruction ID: d3900b4e3e14408bf5f83f4d212025274e79266f9eccda7e8b564d4c82eeb0e7
                                                                            • Opcode Fuzzy Hash: 99629bffbd0d582d55c393e7acc0ec809fdb867575c337e6b71ec1c20baff2a2
                                                                            • Instruction Fuzzy Hash: 9C21C570504B84AFE7738B648899BFBBBEDAF05304F04448DE69E57181C3B42A85CB51
                                                                            APIs
                                                                              • Part of subcall function 001749C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,001727AF,?,00000001), ref: 001749F4
                                                                            • _free.LIBCMT ref: 001AFB04
                                                                            • _free.LIBCMT ref: 001AFB4B
                                                                              • Part of subcall function 001729BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00172ADF
                                                                            Strings
                                                                            • Bad directive syntax error, xrefs: 001AFB33
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                                                            • String ID: Bad directive syntax error
                                                                            • API String ID: 2861923089-2118420937
                                                                            • Opcode ID: 841744cea33e7fbba84edb888eff47739f7df96c19c39ed1d78c982555a58c8d
                                                                            • Instruction ID: b6797d3a4e0322a3d95c1a9a9e7e54146c1772daea78ebc45887e9f522516f1f
                                                                            • Opcode Fuzzy Hash: 841744cea33e7fbba84edb888eff47739f7df96c19c39ed1d78c982555a58c8d
                                                                            • Instruction Fuzzy Hash: 3F915175910219AFCF18EFA4CC519EEB7B4BF29314F14452DF41AAB2A1DB709A06CB50
                                                                            APIs
                                                                              • Part of subcall function 00174AB2: __fread_nolock.LIBCMT ref: 00174AD0
                                                                            • _wcscmp.LIBCMT ref: 001C9DE1
                                                                            • _wcscmp.LIBCMT ref: 001C9DF4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscmp$__fread_nolock
                                                                            • String ID: FILE
                                                                            • API String ID: 4029003684-3121273764
                                                                            • Opcode ID: 27cdb1ede82e5f6f0d8645f7dac7d15e1b04db0e25535186b4387eff98061873
                                                                            • Instruction ID: a21de969eb493a72235f04495522631f589465e87fe5d998168e99feec152dc4
                                                                            • Opcode Fuzzy Hash: 27cdb1ede82e5f6f0d8645f7dac7d15e1b04db0e25535186b4387eff98061873
                                                                            • Instruction Fuzzy Hash: E841F571A40249BBDF21AAA0CC49FEF77BDDF65710F00446AF905A7180D771DA448B64
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001B032B
                                                                            • GetOpenFileNameW.COMDLG32(?), ref: 001B0375
                                                                              • Part of subcall function 00180284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00172A58,?,00008000), ref: 001802A4
                                                                              • Part of subcall function 001809C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 001809E4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Name$Path$FileFullLongOpen_memset
                                                                            • String ID: X
                                                                            • API String ID: 3777226403-3081909835
                                                                            • Opcode ID: f6ed156dd6c5683a01d5551e09230b390abfa848e50b6177f854cbb4e9a14fcf
                                                                            • Instruction ID: c05ed5a7fdf37cc775d804e4ff7d89e3de3fcdf1fc9fc7a61add1c6c39fccad9
                                                                            • Opcode Fuzzy Hash: f6ed156dd6c5683a01d5551e09230b390abfa848e50b6177f854cbb4e9a14fcf
                                                                            • Instruction Fuzzy Hash: 7321D571A142889BCF42DFD4C809BEE7BF8AF5D300F00805AF408A7241DBB55A89DFA1
                                                                            APIs
                                                                            • IsThemeActive.UXTHEME ref: 00175FEF
                                                                              • Part of subcall function 0018359C: __lock.LIBCMT ref: 001835A2
                                                                              • Part of subcall function 0018359C: DecodePointer.KERNEL32(00000001,?,00176004,001B8892), ref: 001835AE
                                                                              • Part of subcall function 0018359C: EncodePointer.KERNEL32(?,?,00176004,001B8892), ref: 001835B9
                                                                              • Part of subcall function 00175F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00175F18
                                                                              • Part of subcall function 00175F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00175F2D
                                                                              • Part of subcall function 00175240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0017526C
                                                                              • Part of subcall function 00175240: IsDebuggerPresent.KERNEL32 ref: 0017527E
                                                                              • Part of subcall function 00175240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 001752E6
                                                                              • Part of subcall function 00175240: SetCurrentDirectoryW.KERNEL32(?), ref: 00175366
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0017602F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                            • String ID:
                                                                            • API String ID: 1438897964-3162483948
                                                                            • Opcode ID: 65e216aea7d4bf3bc082d907eb59cf735fe0889d8dd461dceaa2b557ba1c912b
                                                                            • Instruction ID: 2e5b260d38afaf2209e5a011e0d12d2b0a354796f99573d60131fb0f3897314e
                                                                            • Opcode Fuzzy Hash: 65e216aea7d4bf3bc082d907eb59cf735fe0889d8dd461dceaa2b557ba1c912b
                                                                            • Instruction Fuzzy Hash: DE119371808301ABC310EFA9EC0995ABBF8EFA9750F00461EF45487271DBB09645CB96
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cd40ff564c4d7cc5e559979df322b2b146ed741337bc546a9049d2086e686233
                                                                            • Instruction ID: 2c90f5a56d710eea2fcf96e7270778c464bcf914ce35b86ae5cbc0d0d6b714d9
                                                                            • Opcode Fuzzy Hash: cd40ff564c4d7cc5e559979df322b2b146ed741337bc546a9049d2086e686233
                                                                            • Instruction Fuzzy Hash: 59F15BB0A083019FC714DF28D484A6ABBE5FF99314F15892EF8999B351D730E945CF82
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: 14309bfbf83f99e6681f547f1365e4e854f8319b245783fabf4358c434501220
                                                                            • Instruction ID: 25625a8dab6a9a955c973e391978efc5df252b051ee3407122196a45f7ad7576
                                                                            • Opcode Fuzzy Hash: 14309bfbf83f99e6681f547f1365e4e854f8319b245783fabf4358c434501220
                                                                            • Instruction Fuzzy Hash: 2561BE71600209EBDF088F29D8816AA7BB5FF54310F65C5A9EC19CF294EB31DA60CB51
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001759F9
                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00175A9E
                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00175ABB
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_$_memset
                                                                            • String ID:
                                                                            • API String ID: 1505330794-0
                                                                            • Opcode ID: d576ba09de0fcd5dac094f9b3686bb6489ef695d4d943d9a63743ec2650c6ee4
                                                                            • Instruction ID: 35a8b364e1c063729897e40563d5dbb93b16f72aed17033643d99d0129efb89b
                                                                            • Opcode Fuzzy Hash: d576ba09de0fcd5dac094f9b3686bb6489ef695d4d943d9a63743ec2650c6ee4
                                                                            • Instruction Fuzzy Hash: EF318FB0509B01DFD721DF64D885697BBF8FB58304F004A3EF99A83251E7B1A944CB52
                                                                            APIs
                                                                            • __FF_MSGBANNER.LIBCMT ref: 00185953
                                                                              • Part of subcall function 0018A39B: __NMSG_WRITE.LIBCMT ref: 0018A3C2
                                                                              • Part of subcall function 0018A39B: __NMSG_WRITE.LIBCMT ref: 0018A3CC
                                                                            • __NMSG_WRITE.LIBCMT ref: 0018595A
                                                                              • Part of subcall function 0018A3F8: GetModuleFileNameW.KERNEL32(00000000,002253BA,00000104,00000004,00000001,00181003), ref: 0018A48A
                                                                              • Part of subcall function 0018A3F8: ___crtMessageBoxW.LIBCMT ref: 0018A538
                                                                              • Part of subcall function 001832CF: ___crtCorExitProcess.LIBCMT ref: 001832D5
                                                                              • Part of subcall function 001832CF: ExitProcess.KERNEL32 ref: 001832DE
                                                                              • Part of subcall function 00188D58: __getptd_noexit.LIBCMT ref: 00188D58
                                                                            • RtlAllocateHeap.NTDLL(00EA0000,00000000,00000001,?,00000004,?,?,00181003,?), ref: 0018597F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                            • String ID:
                                                                            • API String ID: 1372826849-0
                                                                            • Opcode ID: 1fde32cd135454179473ba014034c18132624c404f8ced4d226bbf42450dcd47
                                                                            • Instruction ID: 894603cb6902fdb431226bcbac94b1cb82dfafb7fdeaa87ec04126e7bd86ff46
                                                                            • Opcode Fuzzy Hash: 1fde32cd135454179473ba014034c18132624c404f8ced4d226bbf42450dcd47
                                                                            • Instruction Fuzzy Hash: 5E01F531601B11EBE7253BA4AC42A2E324ADF62774F910526F8249A1D1DF708F414F61
                                                                            APIs
                                                                            • _free.LIBCMT ref: 001C92D6
                                                                              • Part of subcall function 00182F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00189C54,00000000,00188D5D,001859C3), ref: 00182F99
                                                                              • Part of subcall function 00182F85: GetLastError.KERNEL32(00000000,?,00189C54,00000000,00188D5D,001859C3), ref: 00182FAB
                                                                            • _free.LIBCMT ref: 001C92E7
                                                                            • _free.LIBCMT ref: 001C92F9
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                            • Instruction ID: 4273a7d29d501d5b869276f3b6aefa7ee2cd40f7f4b4b47d768869e3fef2aa9f
                                                                            • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                            • Instruction Fuzzy Hash: 44E0C2B120462253CA20B5386844F8377EC0FA8312714040DF549D3142CF70E840C628
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CALL
                                                                            • API String ID: 0-4196123274
                                                                            • Opcode ID: 1aeb1a100c46518d637d85b969ffea1bc6e1403aa89d281bedc6f335ea693a57
                                                                            • Instruction ID: e8728632c1f002c435acb558dbaf47b4fe103f39e639578dd8444fb8b8133899
                                                                            • Opcode Fuzzy Hash: 1aeb1a100c46518d637d85b969ffea1bc6e1403aa89d281bedc6f335ea693a57
                                                                            • Instruction Fuzzy Hash: 70326B70508341DFCB28DF14C894A2ABBE1BF95304F15896DF88A9B362D735ED55CB82
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID: EA06
                                                                            • API String ID: 4104443479-3962188686
                                                                            • Opcode ID: 51d757a7c66863ca1293258a4ca21eaeb4209118777e716449d6aa5950a1e3e3
                                                                            • Instruction ID: 1257ba6f9f57020ecfc87d96fa470221e0e7c992b49b1536ead44094a3e89e52
                                                                            • Opcode Fuzzy Hash: 51d757a7c66863ca1293258a4ca21eaeb4209118777e716449d6aa5950a1e3e3
                                                                            • Instruction Fuzzy Hash: 8441A021E042589BDF269B54C8517BF7FB58B6D304F15C075F98AE7286D7218E84C3E2
                                                                            APIs
                                                                            • _strcat.LIBCMT ref: 001DE20C
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • _wcscpy.LIBCMT ref: 001DE29B
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __itow__swprintf_strcat_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 1012013722-0
                                                                            • Opcode ID: 036255211c1ec2e98b37999903ac08fed8b1c15d2269d64fc13045674f644dbe
                                                                            • Instruction ID: e13971f37e63d439b3b77f32caf20e58d6ceebc8d8e93981394543f59d39c471
                                                                            • Opcode Fuzzy Hash: 036255211c1ec2e98b37999903ac08fed8b1c15d2269d64fc13045674f644dbe
                                                                            • Instruction Fuzzy Hash: 68911735A00604EFCB18EF18C5819ADBBE5FF59311B55805AF81A8F362DB30EE51CB81
                                                                            APIs
                                                                            • _memmove.LIBCMT ref: 001C68EC
                                                                            • _memmove.LIBCMT ref: 001C690A
                                                                              • Part of subcall function 001C6A73: _memmove.LIBCMT ref: 001C6B01
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                                                            • Instruction ID: 03f404803536ac7a26b56a1b46cec0b2a5c96f9b9b076e11aa6e8bf4763a75d0
                                                                            • Opcode Fuzzy Hash: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                                                            • Instruction Fuzzy Hash: F571AE716006049FCB289F18C845FBAB7B5EFB4364F25891DE8D52B292CB35ED51CB90
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?), ref: 001C614E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLower
                                                                            • String ID:
                                                                            • API String ID: 2358735015-0
                                                                            • Opcode ID: e9dc520ff958a24c3a7492e71b3f651e7b91dd02680de706319708cc00d46dc5
                                                                            • Instruction ID: 266570005fb41726594e99a720403fef23d64bdf88c1533379e8793d7ab89fd1
                                                                            • Opcode Fuzzy Hash: e9dc520ff958a24c3a7492e71b3f651e7b91dd02680de706319708cc00d46dc5
                                                                            • Instruction Fuzzy Hash: 2F41C9B6500209AFDB25EFA8C881EAE73B8FF64350B14852EF516D7251EB70DE44CB50
                                                                            APIs
                                                                              • Part of subcall function 0018593C: __FF_MSGBANNER.LIBCMT ref: 00185953
                                                                              • Part of subcall function 0018593C: __NMSG_WRITE.LIBCMT ref: 0018595A
                                                                              • Part of subcall function 0018593C: RtlAllocateHeap.NTDLL(00EA0000,00000000,00000001,?,00000004,?,?,00181003,?), ref: 0018597F
                                                                            • std::exception::exception.LIBCMT ref: 0018101C
                                                                            • __CxxThrowException@8.LIBCMT ref: 00181031
                                                                              • Part of subcall function 001887CB: RaiseException.KERNEL32(?,?,?,0021CAF8,?,?,?,?,?,00181036,?,0021CAF8,?,00000001), ref: 00188820
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 3902256705-0
                                                                            • Opcode ID: b9e7a321df02599759204d4bac4b7f15aec5815f83029101aac7d87fdf1a1729
                                                                            • Instruction ID: c092d7a1fb1bc2de7ff08e08add4862549aca2cb9fd99d9ae9cec9b3cc04cf8f
                                                                            • Opcode Fuzzy Hash: b9e7a321df02599759204d4bac4b7f15aec5815f83029101aac7d87fdf1a1729
                                                                            • Instruction Fuzzy Hash: 4FF0287550421DB2CB21BA98DD059EE7BAC9F11310F600425FA14A2181DFB08B81DFE1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __lock_file_memset
                                                                            • String ID:
                                                                            • API String ID: 26237723-0
                                                                            • Opcode ID: d3c7121ba050b53255a15bb7cb585c75e8baff87aa4b6fdd6f5e1cbbd1bd7889
                                                                            • Instruction ID: 5c5bcf400047e4bf54ca88bcb7b2fa01f769e28fb178814f1ef240a2b4a2c559
                                                                            • Opcode Fuzzy Hash: d3c7121ba050b53255a15bb7cb585c75e8baff87aa4b6fdd6f5e1cbbd1bd7889
                                                                            • Instruction Fuzzy Hash: 54018471800608EBCF21BFA68C0599F7BA2EFA1760F588116B8241A1A1D7318B21DFA1
                                                                            APIs
                                                                              • Part of subcall function 00188D58: __getptd_noexit.LIBCMT ref: 00188D58
                                                                            • __lock_file.LIBCMT ref: 0018560B
                                                                              • Part of subcall function 00186E3E: __lock.LIBCMT ref: 00186E61
                                                                            • __fclose_nolock.LIBCMT ref: 00185616
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                            • String ID:
                                                                            • API String ID: 2800547568-0
                                                                            • Opcode ID: e37dd43cc7a749eb31f5300f7461a8866e912a1805f07a056938bbb3152499cc
                                                                            • Instruction ID: 4b4466584d44ad5130c24b3e331b853b22c20b347d18671ab38a92a4ea19c6eb
                                                                            • Opcode Fuzzy Hash: e37dd43cc7a749eb31f5300f7461a8866e912a1805f07a056938bbb3152499cc
                                                                            • Instruction Fuzzy Hash: 90F0BE71801B059BD720BF798802BAE77E2AF61335FA58209B428AB1C1CB7C8B419F51
                                                                            APIs
                                                                            • __lock_file.LIBCMT ref: 00185EB4
                                                                            • __ftell_nolock.LIBCMT ref: 00185EBF
                                                                              • Part of subcall function 00188D58: __getptd_noexit.LIBCMT ref: 00188D58
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                            • String ID:
                                                                            • API String ID: 2999321469-0
                                                                            • Opcode ID: 78e18ec9defb85a8458c611d11cc2546e551963bb24edd0f9144cf362daea550
                                                                            • Instruction ID: 07c40a1e6a5a6e5db18ca0ba77c3738cc74feeeaf031261d8c912165128b6f13
                                                                            • Opcode Fuzzy Hash: 78e18ec9defb85a8458c611d11cc2546e551963bb24edd0f9144cf362daea550
                                                                            • Instruction Fuzzy Hash: C7F0E5319116159ADB10BBB88D0379EB2A1AF71331F614306B420BF1C2CF788F429F91
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00175AEF
                                                                            • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00175B1F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell__memset
                                                                            • String ID:
                                                                            • API String ID: 928536360-0
                                                                            • Opcode ID: 8fe8bd06c6b2a76a7387d425ebcb9235d541564d17a64067a5ab2cd2e23d9afd
                                                                            • Instruction ID: 8c9f8aad1961f6451fa30a457cba38fd99c57b01123e0649ca3a7967f7c8264c
                                                                            • Opcode Fuzzy Hash: 8fe8bd06c6b2a76a7387d425ebcb9235d541564d17a64067a5ab2cd2e23d9afd
                                                                            • Instruction Fuzzy Hash: 9FF0A77080C3089FD7A2DB64EC4A7A577BC9700308F0402E9FE4896292D7750B88CF51
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$__swprintf
                                                                            • String ID:
                                                                            • API String ID: 207118244-0
                                                                            • Opcode ID: 17f4e3fcaa8a98ad6bab79ae8569be47d1c951d05d7b4688230f7c9b795a3f10
                                                                            • Instruction ID: 01ca2b3a351567c3b0d0816a1b03154f390a93348098118b6b96599f333683f0
                                                                            • Opcode Fuzzy Hash: 17f4e3fcaa8a98ad6bab79ae8569be47d1c951d05d7b4688230f7c9b795a3f10
                                                                            • Instruction Fuzzy Hash: 0DB14C35A0010AEFCB14EF98D891DEEB7B5FF68710F10851AF915A7391EB70AA51CB90
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6c00e00610a2f6b5b9c75c50a0c0d75d754e7477f8d5fd79ed90822e01c4b6f7
                                                                            • Instruction ID: 44785fac4c7caaff717945857554aac9f7db32d074691d4abc1ddd994d76b766
                                                                            • Opcode Fuzzy Hash: 6c00e00610a2f6b5b9c75c50a0c0d75d754e7477f8d5fd79ed90822e01c4b6f7
                                                                            • Instruction Fuzzy Hash: 4161EC70600206DFDB14EF64C881A7AB7E9EF15304F66802DE916AB292D774EDA0CF52
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: 719ee5b0fa6b9ba4850e2a8071915d723d28199ea914ec437d6a439a6195b7a7
                                                                            • Instruction ID: b2d82409cb83a8df266feee1de130e6ada137dcfdb531b6435b804cb73185e6f
                                                                            • Opcode Fuzzy Hash: 719ee5b0fa6b9ba4850e2a8071915d723d28199ea914ec437d6a439a6195b7a7
                                                                            • Instruction Fuzzy Hash: 0731A176604602EFC729DF18D490A21F7B0FF08320B15C569E9AE8B7A1D730ED82DB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: acd72badccd1bec8d692e262fe7d6a60571895ac8edf7602ee50ab476a59493a
                                                                            • Instruction ID: 727e7f068e9a5bbccc83c0a1ec9e28f2981b85679c34723bfc96a52146f28433
                                                                            • Opcode Fuzzy Hash: acd72badccd1bec8d692e262fe7d6a60571895ac8edf7602ee50ab476a59493a
                                                                            • Instruction Fuzzy Hash: 8041E574508351DFDB14DF14C894B1ABBE1BF55308F1988ACE8899B362C371E895CB92
                                                                            APIs
                                                                              • Part of subcall function 00174B29: FreeLibrary.KERNEL32(00000000,?), ref: 00174B63
                                                                              • Part of subcall function 0018547B: __wfsopen.LIBCMT ref: 00185486
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,001727AF,?,00000001), ref: 001749F4
                                                                              • Part of subcall function 00174ADE: FreeLibrary.KERNEL32(00000000), ref: 00174B18
                                                                              • Part of subcall function 001748B0: _memmove.LIBCMT ref: 001748FA
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$Load__wfsopen_memmove
                                                                            • String ID:
                                                                            • API String ID: 1396898556-0
                                                                            • Opcode ID: 1700f896ae27569641732cfbda18a06555a1f69c9d8057e4992c1266c2eb0909
                                                                            • Instruction ID: e882633b53553a7c6649da357c72166015ce70e42cb2a77c81943e9f50f52a14
                                                                            • Opcode Fuzzy Hash: 1700f896ae27569641732cfbda18a06555a1f69c9d8057e4992c1266c2eb0909
                                                                            • Instruction Fuzzy Hash: 8411E731650219ABCB15FB70CC06FAE77B99F64701F10C42DF54AA7191EB719A10AB94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: d3511936f2c3a9f0ed1f08c39fcca023c8dcb164a1ab07be1a9a79502957a79d
                                                                            • Instruction ID: 131129ed73467da04712114c60794e23f6164e169acb37090b8cdb39f44ad48e
                                                                            • Opcode Fuzzy Hash: d3511936f2c3a9f0ed1f08c39fcca023c8dcb164a1ab07be1a9a79502957a79d
                                                                            • Instruction Fuzzy Hash: 7E113776204605EFC724DF68D981916B7F9FF49350B20C82EE98ECB261E732E841CB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: fc8914caac8165ca67cf98e94366922181a954361250575662b17b87d39c0c9c
                                                                            • Instruction ID: 67f85757288b58bb8cffa30d2dd853892b8ceb61f944e60fa7c697c891169bc5
                                                                            • Opcode Fuzzy Hash: fc8914caac8165ca67cf98e94366922181a954361250575662b17b87d39c0c9c
                                                                            • Instruction Fuzzy Hash: 5E2123B4508341DFCB14DF14C854B1ABBE5BF88304F05896CF88A97722D731E859CB92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                                            • Instruction ID: 70934ef4b7cdc5f5f60d82f5cf218e6afa70133757f122de3cbef25da4b4f8b7
                                                                            • Opcode Fuzzy Hash: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                                            • Instruction Fuzzy Hash: 8201D6722017057ED3256B38DC02B67BBA8DB447A0F10C52AFA1ECB1D1EB31E6408B94
                                                                            APIs
                                                                              • Part of subcall function 00180FE6: std::exception::exception.LIBCMT ref: 0018101C
                                                                              • Part of subcall function 00180FE6: __CxxThrowException@8.LIBCMT ref: 00181031
                                                                            • _memset.LIBCMT ref: 001C7CB4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw_memsetstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 525207782-0
                                                                            • Opcode ID: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                                                            • Instruction ID: f1b13dbedc1930295f4ccd516bef366c2339335971d329c7674bf770f5ea14c2
                                                                            • Opcode Fuzzy Hash: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                                                            • Instruction Fuzzy Hash: 9A01E4746042059FD325EF5CD941F09BBE5AF69710F24C45AF5888B3A2DB72E9008F95
                                                                            APIs
                                                                              • Part of subcall function 00180FE6: std::exception::exception.LIBCMT ref: 0018101C
                                                                              • Part of subcall function 00180FE6: __CxxThrowException@8.LIBCMT ref: 00181031
                                                                            • _memmove.LIBCMT ref: 0019DC8B
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw_memmovestd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 1602317333-0
                                                                            • Opcode ID: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                                                            • Instruction ID: 158e337f68cae370a9fb5b4b2bd289bb98d30fb4cb8a3be15fb871ba284193e6
                                                                            • Opcode Fuzzy Hash: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                                                            • Instruction Fuzzy Hash: 17F0E774604101DFD755EF68C981E15BBE1BF2A700B24849CE2898B3A2E733E911CF91
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _fseek
                                                                            • String ID:
                                                                            • API String ID: 2937370855-0
                                                                            • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                            • Instruction ID: 20908d8d63b929e13e793076c8164e6f2fef25c2dc519f5cc3f69dc24f0f178d
                                                                            • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                            • Instruction Fuzzy Hash: 27F08CB6500208BFDF159F44DC00CEBBB79EB89324F004198F9045B210D332EA218BB0
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,?,?,001727AF,?,00000001), ref: 00174A63
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 5830e7ee45bcda3190fe43a3b1a5008aae43e9ce513b6f8fbf7b8bc1bbf17eb8
                                                                            • Instruction ID: 9ee648d9ffea072f8b0574399b171552d6e3472c103042f1a3bd4537a4dadb1c
                                                                            • Opcode Fuzzy Hash: 5830e7ee45bcda3190fe43a3b1a5008aae43e9ce513b6f8fbf7b8bc1bbf17eb8
                                                                            • Instruction Fuzzy Hash: E9F01571145702CFCB389F68E490826BBF1AF14325321CA3EE1DB83611C7319984DF44
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 435ed40abdbd8ffe9ef89e413792ac99171bc015b59e8e90f2d44f9542208f8f
                                                                            • Instruction ID: d164d08bfb45ed1bac6e3ca8c838408cf949c67a307340504ceb4defcdd56a61
                                                                            • Opcode Fuzzy Hash: 435ed40abdbd8ffe9ef89e413792ac99171bc015b59e8e90f2d44f9542208f8f
                                                                            • Instruction Fuzzy Hash: C0E061767083425FE735DF74DC04732FBD4AB16320F10445AD499C2681E37758A4A7B1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID:
                                                                            • API String ID: 2638373210-0
                                                                            • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                            • Instruction ID: 6a3cccce0d2ed5f55bb64fd5acd3b8521bcdff40b9b625ea790ff7d94045d886
                                                                            • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                            • Instruction Fuzzy Hash: 3AF0F87240020DFFDF05DF90C941EAABB79FB19314F218589F9198B212D336DA61AB91
                                                                            APIs
                                                                            • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 001809E4
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LongNamePath_memmove
                                                                            • String ID:
                                                                            • API String ID: 2514874351-0
                                                                            • Opcode ID: 38e00abe8e47b80b3fa24a9158eb273f9f01bb8053201e586ab28f6aab8b4b2f
                                                                            • Instruction ID: c1bc4996e707408253270fc54389e94b528ebc58b9c123da2fea9dfc918c256d
                                                                            • Opcode Fuzzy Hash: 38e00abe8e47b80b3fa24a9158eb273f9f01bb8053201e586ab28f6aab8b4b2f
                                                                            • Instruction Fuzzy Hash: 74E086329041286BCB2196989C05FEA77EDEB89690F0441B6FC0DD7204DA609CC18691
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?,001C3BFE), ref: 001C4FED
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 8a220f4697a69ca8a3eb0f9d6844645a55de42daee276083f138db632eb0d707
                                                                            • Instruction ID: eac3cbb79727647c6f24c14701dad5b57da0cbb2555e849290d7cc38997bab7b
                                                                            • Opcode Fuzzy Hash: 8a220f4697a69ca8a3eb0f9d6844645a55de42daee276083f138db632eb0d707
                                                                            • Instruction Fuzzy Hash: E4B0923400860057BD281F3C1968BAD338159663AA7D81B8DE478858E29339C88BE560
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __wfsopen
                                                                            • String ID:
                                                                            • API String ID: 197181222-0
                                                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                            • Instruction ID: 51185946aea0fbb45ea41906ffb18916e1fb4c66b75489a50642baac73cd7e31
                                                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                            • Instruction Fuzzy Hash: C2B0927644020C77CF012A82EC03A593B2A9B50668F408020FB0C1C172B673A6A09A89
                                                                            APIs
                                                                              • Part of subcall function 001C4005: FindFirstFileW.KERNEL32(?,?), ref: 001C407C
                                                                              • Part of subcall function 001C4005: DeleteFileW.KERNEL32(?,?,?,?), ref: 001C40CC
                                                                              • Part of subcall function 001C4005: FindNextFileW.KERNELBASE(00000000,00000010), ref: 001C40DD
                                                                              • Part of subcall function 001C4005: FindClose.KERNEL32(00000000), ref: 001C40F4
                                                                            • GetLastError.KERNEL32 ref: 001CC292
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                            • String ID:
                                                                            • API String ID: 2191629493-0
                                                                            • Opcode ID: d9fb52970808d37cb1f80d591ad528886399fee9256ddba263890fbf73cb8036
                                                                            • Instruction ID: 786b80c2b243b959a69cf28c11d4adb13e97bdbe2a4d00434b9dec4be6fc6af5
                                                                            • Opcode Fuzzy Hash: d9fb52970808d37cb1f80d591ad528886399fee9256ddba263890fbf73cb8036
                                                                            • Instruction Fuzzy Hash: 5FF08C322102109FCB11EF99D850F6AB7E9AFA9320F058019F90A8B352CB70FC12CB94
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 001ED208
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001ED249
                                                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 001ED28E
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001ED2B8
                                                                            • SendMessageW.USER32 ref: 001ED2E1
                                                                            • _wcsncpy.LIBCMT ref: 001ED359
                                                                            • GetKeyState.USER32(00000011), ref: 001ED37A
                                                                            • GetKeyState.USER32(00000009), ref: 001ED387
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001ED39D
                                                                            • GetKeyState.USER32(00000010), ref: 001ED3A7
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001ED3D0
                                                                            • SendMessageW.USER32 ref: 001ED3F7
                                                                            • SendMessageW.USER32(?,00001030,?,001EB9BA), ref: 001ED4FD
                                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 001ED513
                                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 001ED526
                                                                            • SetCapture.USER32(?), ref: 001ED52F
                                                                            • ClientToScreen.USER32(?,?), ref: 001ED594
                                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001ED5A1
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001ED5BB
                                                                            • ReleaseCapture.USER32 ref: 001ED5C6
                                                                            • GetCursorPos.USER32(?), ref: 001ED600
                                                                            • ScreenToClient.USER32(?,?), ref: 001ED60D
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 001ED669
                                                                            • SendMessageW.USER32 ref: 001ED697
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 001ED6D4
                                                                            • SendMessageW.USER32 ref: 001ED703
                                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001ED724
                                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 001ED733
                                                                            • GetCursorPos.USER32(?), ref: 001ED753
                                                                            • ScreenToClient.USER32(?,?), ref: 001ED760
                                                                            • GetParent.USER32(?), ref: 001ED780
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 001ED7E9
                                                                            • SendMessageW.USER32 ref: 001ED81A
                                                                            • ClientToScreen.USER32(?,?), ref: 001ED878
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 001ED8A8
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 001ED8D2
                                                                            • SendMessageW.USER32 ref: 001ED8F5
                                                                            • ClientToScreen.USER32(?,?), ref: 001ED947
                                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 001ED97B
                                                                              • Part of subcall function 001629AB: GetWindowLongW.USER32(?,000000EB), ref: 001629BC
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001EDA17
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                            • String ID: @GUI_DRAGID$F
                                                                            • API String ID: 3977979337-4164748364
                                                                            • Opcode ID: 7a7012c2a9e16296a511c282a054aee8d5f8f867209905234d412ed2a9e7071f
                                                                            • Instruction ID: 7c285c5fdb47790914b404fcef9226fe35a472f80b08b45d22c99418f8166e1c
                                                                            • Opcode Fuzzy Hash: 7a7012c2a9e16296a511c282a054aee8d5f8f867209905234d412ed2a9e7071f
                                                                            • Instruction Fuzzy Hash: A342BB70208A81AFC725CF29EC48FAEBBE5FF98310F140659F695872A1C771D994CB52
                                                                            APIs
                                                                              • Part of subcall function 001B9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B93E3
                                                                              • Part of subcall function 001B9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B9410
                                                                              • Part of subcall function 001B9399: GetLastError.KERNEL32 ref: 001B941D
                                                                            • _memset.LIBCMT ref: 001B8F71
                                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 001B8FC3
                                                                            • CloseHandle.KERNEL32(?), ref: 001B8FD4
                                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001B8FEB
                                                                            • GetProcessWindowStation.USER32 ref: 001B9004
                                                                            • SetProcessWindowStation.USER32(00000000), ref: 001B900E
                                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 001B9028
                                                                              • Part of subcall function 001B8DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001B8F27), ref: 001B8DFE
                                                                              • Part of subcall function 001B8DE9: CloseHandle.KERNEL32(?,?,001B8F27), ref: 001B8E10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                            • String ID: $default$winsta0
                                                                            • API String ID: 2063423040-1027155976
                                                                            • Opcode ID: 8506adb63b6f42c96870bc57142a6f05484f4c781e5aefb1e63138685ff9a2c5
                                                                            • Instruction ID: 973568d0f04a6af6d64e4e4c9528a3ca1e425b6f907ba68a14c63b961b25b672
                                                                            • Opcode Fuzzy Hash: 8506adb63b6f42c96870bc57142a6f05484f4c781e5aefb1e63138685ff9a2c5
                                                                            • Instruction Fuzzy Hash: 52813971900209BFDF129FA4CD49AFE7B79BF08324F084159FA15A6261D7328E56EB60
                                                                            APIs
                                                                            • OpenClipboard.USER32(001F0980), ref: 001D465C
                                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 001D466A
                                                                            • GetClipboardData.USER32(0000000D), ref: 001D4672
                                                                            • CloseClipboard.USER32 ref: 001D467E
                                                                            • GlobalLock.KERNEL32(00000000), ref: 001D469A
                                                                            • CloseClipboard.USER32 ref: 001D46A4
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 001D46B9
                                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 001D46C6
                                                                            • GetClipboardData.USER32(00000001), ref: 001D46CE
                                                                            • GlobalLock.KERNEL32(00000000), ref: 001D46DB
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 001D470F
                                                                            • CloseClipboard.USER32 ref: 001D481F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                            • String ID:
                                                                            • API String ID: 3222323430-0
                                                                            • Opcode ID: 7dc155d55de88fc79862234ae81e1f108915b7bc9942b698bec5d9a47d813a92
                                                                            • Instruction ID: 36304b77a480553feaa01321d01d5f83540c26704fbb54bf76a2b0f7e92e5781
                                                                            • Opcode Fuzzy Hash: 7dc155d55de88fc79862234ae81e1f108915b7bc9942b698bec5d9a47d813a92
                                                                            • Instruction Fuzzy Hash: A051D031204201AFD302EF64DC8AF7E77A8AF98B51F00452AF646D22E2DF70D945CB62
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 001CCDD0
                                                                            • FindClose.KERNEL32(00000000), ref: 001CCE24
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001CCE49
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001CCE60
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 001CCE87
                                                                            • __swprintf.LIBCMT ref: 001CCED3
                                                                            • __swprintf.LIBCMT ref: 001CCF16
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • __swprintf.LIBCMT ref: 001CCF6A
                                                                              • Part of subcall function 001838C8: __woutput_l.LIBCMT ref: 00183921
                                                                            • __swprintf.LIBCMT ref: 001CCFB8
                                                                              • Part of subcall function 001838C8: __flsbuf.LIBCMT ref: 00183943
                                                                              • Part of subcall function 001838C8: __flsbuf.LIBCMT ref: 0018395B
                                                                            • __swprintf.LIBCMT ref: 001CD007
                                                                            • __swprintf.LIBCMT ref: 001CD056
                                                                            • __swprintf.LIBCMT ref: 001CD0A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                            • API String ID: 3953360268-2428617273
                                                                            • Opcode ID: 6f4d2d36b052008b69167818a8840c2c37bff107e9c1d668f43d63a4a4c74ec1
                                                                            • Instruction ID: 3df5225e42b2722456a919304ea050a24ca5ad03645b3f1d329ba9b1f96b0845
                                                                            • Opcode Fuzzy Hash: 6f4d2d36b052008b69167818a8840c2c37bff107e9c1d668f43d63a4a4c74ec1
                                                                            • Instruction Fuzzy Hash: 27A14CB1404304ABC710EFA4CC85EAFB7ECBFA5704F40491DF59582192EB74EA59CBA2
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001CF5F9
                                                                            • _wcscmp.LIBCMT ref: 001CF60E
                                                                            • _wcscmp.LIBCMT ref: 001CF625
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 001CF637
                                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 001CF651
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 001CF669
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF674
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 001CF690
                                                                            • _wcscmp.LIBCMT ref: 001CF6B7
                                                                            • _wcscmp.LIBCMT ref: 001CF6CE
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001CF6E0
                                                                            • SetCurrentDirectoryW.KERNEL32(0021B578), ref: 001CF6FE
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 001CF708
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF715
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF727
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1803514871-438819550
                                                                            • Opcode ID: c638586aa212d7a0fb35a6ba8008bf3c8acea59641ba8c04874fa486513c19e5
                                                                            • Instruction ID: 402ed7f88197289de9acb01fdd2ed6de96e4aab28310c1a2818663ffe9aadec2
                                                                            • Opcode Fuzzy Hash: c638586aa212d7a0fb35a6ba8008bf3c8acea59641ba8c04874fa486513c19e5
                                                                            • Instruction Fuzzy Hash: 9631C571540219ABDB11DBB4DC4DEEE77AEAF29321F54416DE814D20A1EB30DA85CA60
                                                                            APIs
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001E0FB3
                                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,001F0980,00000000,?,00000000,?,?), ref: 001E1021
                                                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 001E1069
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 001E10F2
                                                                            • RegCloseKey.ADVAPI32(?), ref: 001E1412
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 001E141F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectCreateRegistryValue
                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                            • API String ID: 536824911-966354055
                                                                            • Opcode ID: dd39b58e7270e2522e331ee2884920fdf191b81e329e61153bfa5cbe7e1e2931
                                                                            • Instruction ID: ccf7e0df0fc4a8f51f24c26edd786584aaa8eefbf9296445eea7d6ee7ff68357
                                                                            • Opcode Fuzzy Hash: dd39b58e7270e2522e331ee2884920fdf191b81e329e61153bfa5cbe7e1e2931
                                                                            • Instruction Fuzzy Hash: 53026975600A41AFCB15EF65C881E2AB7E5FF99710F04895CF85A9B3A2CB30ED41CB91
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001CF756
                                                                            • _wcscmp.LIBCMT ref: 001CF76B
                                                                            • _wcscmp.LIBCMT ref: 001CF782
                                                                              • Part of subcall function 001C4875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 001C4890
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 001CF7B1
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF7BC
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 001CF7D8
                                                                            • _wcscmp.LIBCMT ref: 001CF7FF
                                                                            • _wcscmp.LIBCMT ref: 001CF816
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001CF828
                                                                            • SetCurrentDirectoryW.KERNEL32(0021B578), ref: 001CF846
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 001CF850
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF85D
                                                                            • FindClose.KERNEL32(00000000), ref: 001CF86F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                            • String ID: *.*
                                                                            • API String ID: 1824444939-438819550
                                                                            • Opcode ID: 3b880a6caa67ff2d4edf869d5cd545941c53316e513c1f25f53a7ad4ac036c5b
                                                                            • Instruction ID: 80264819c5ebec34ac7170f910ca0878c76877dd8d1071bab608acecb4eeff13
                                                                            • Opcode Fuzzy Hash: 3b880a6caa67ff2d4edf869d5cd545941c53316e513c1f25f53a7ad4ac036c5b
                                                                            • Instruction Fuzzy Hash: 5731D671500219BADB21EBB4DC49FEE77AE9F29321F54016DF814A21A1DB30CE96CB60
                                                                            APIs
                                                                              • Part of subcall function 001B8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B8E3C
                                                                              • Part of subcall function 001B8E20: GetLastError.KERNEL32(?,001B8900,?,?,?), ref: 001B8E46
                                                                              • Part of subcall function 001B8E20: GetProcessHeap.KERNEL32(00000008,?,?,001B8900,?,?,?), ref: 001B8E55
                                                                              • Part of subcall function 001B8E20: HeapAlloc.KERNEL32(00000000,?,001B8900,?,?,?), ref: 001B8E5C
                                                                              • Part of subcall function 001B8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B8E73
                                                                              • Part of subcall function 001B8EBD: GetProcessHeap.KERNEL32(00000008,001B8916,00000000,00000000,?,001B8916,?), ref: 001B8EC9
                                                                              • Part of subcall function 001B8EBD: HeapAlloc.KERNEL32(00000000,?,001B8916,?), ref: 001B8ED0
                                                                              • Part of subcall function 001B8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,001B8916,?), ref: 001B8EE1
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001B8931
                                                                            • _memset.LIBCMT ref: 001B8946
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001B8965
                                                                            • GetLengthSid.ADVAPI32(?), ref: 001B8976
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 001B89B3
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001B89CF
                                                                            • GetLengthSid.ADVAPI32(?), ref: 001B89EC
                                                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 001B89FB
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 001B8A02
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001B8A23
                                                                            • CopySid.ADVAPI32(00000000), ref: 001B8A2A
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001B8A5B
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001B8A81
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001B8A95
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                            • String ID:
                                                                            • API String ID: 3996160137-0
                                                                            • Opcode ID: 66a64a125342aad65b21795cb136a74c7ad7aad5eaac6bd9d003a1982b8b3de9
                                                                            • Instruction ID: 12911600e02fccf43915a56a3d9139951082602e56bbc6ff4f231d702fd7be10
                                                                            • Opcode Fuzzy Hash: 66a64a125342aad65b21795cb136a74c7ad7aad5eaac6bd9d003a1982b8b3de9
                                                                            • Instruction Fuzzy Hash: A4613475A00209BFDF01DFA5DC85AEEBBB9BF48704F04812AF815A7291DB319A05CB60
                                                                            APIs
                                                                              • Part of subcall function 001E147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001E040D,?,?), ref: 001E1491
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001E0B0C
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 001E0BAB
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 001E0C43
                                                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 001E0E82
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 001E0E8F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 1240663315-0
                                                                            • Opcode ID: 79ccf69c1f7138cb1adfcf0743eda134f04ffed4919ebc285df2205c897eb17f
                                                                            • Instruction ID: 45ed4ff96350ea9086b1de88827e04f8dd67855ffecb9442eb5e57f5ec660334
                                                                            • Opcode Fuzzy Hash: 79ccf69c1f7138cb1adfcf0743eda134f04ffed4919ebc285df2205c897eb17f
                                                                            • Instruction Fuzzy Hash: 0DE15A31204600AFC715DF69C891E2EBBE8FF99714B04896DF849DB2A2DB30ED41CB52
                                                                            APIs
                                                                            • __swprintf.LIBCMT ref: 001C4451
                                                                            • __swprintf.LIBCMT ref: 001C445E
                                                                              • Part of subcall function 001838C8: __woutput_l.LIBCMT ref: 00183921
                                                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 001C4488
                                                                            • LoadResource.KERNEL32(?,00000000), ref: 001C4494
                                                                            • LockResource.KERNEL32(00000000), ref: 001C44A1
                                                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 001C44C1
                                                                            • LoadResource.KERNEL32(?,00000000), ref: 001C44D3
                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 001C44E2
                                                                            • LockResource.KERNEL32(?), ref: 001C44EE
                                                                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 001C454F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                            • String ID:
                                                                            • API String ID: 1433390588-0
                                                                            • Opcode ID: accd56052c23104355ce530b5b70938598dd1407a3e9221d1d08355ac0f8a1af
                                                                            • Instruction ID: 313dffd1429a6dbb1c7c54d943d699558a30052e634545a766630de4fe26f7de
                                                                            • Opcode Fuzzy Hash: accd56052c23104355ce530b5b70938598dd1407a3e9221d1d08355ac0f8a1af
                                                                            • Instruction Fuzzy Hash: 0D31AF71A0521ABBDB129FA0EC68FBB7BA8EF18701F044429F916D2151D774DA61CBB0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                            • String ID:
                                                                            • API String ID: 1737998785-0
                                                                            • Opcode ID: ca9b0047ce2d2a52cb41e62bbb91dab8703ab46ed7b47ef1d7da7bddb6a32a8b
                                                                            • Instruction ID: 626e11f7c80bb6a4356d42398e9bbbb194b1159fc39940e08e6b7ec2a18b89aa
                                                                            • Opcode Fuzzy Hash: ca9b0047ce2d2a52cb41e62bbb91dab8703ab46ed7b47ef1d7da7bddb6a32a8b
                                                                            • Instruction Fuzzy Hash: FB210831601210AFDB16AF60EC59F3E77A8EF58761F00801AF905DB3A2CB30AD50CB54
                                                                            APIs
                                                                              • Part of subcall function 00180284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00172A58,?,00008000), ref: 001802A4
                                                                              • Part of subcall function 001C4FEC: GetFileAttributesW.KERNEL32(?,001C3BFE), ref: 001C4FED
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 001C3D96
                                                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 001C3E3E
                                                                            • MoveFileW.KERNEL32(?,?), ref: 001C3E51
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 001C3E6E
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 001C3E90
                                                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 001C3EAC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 4002782344-1173974218
                                                                            • Opcode ID: 8516928da323c8c930bde93522ad9c0a321f78acfd9128cdc3e2da821bbee6d2
                                                                            • Instruction ID: 0988968844574e28c2148fc266166ff40b92d016a7970280b6f12795d6c2ec28
                                                                            • Opcode Fuzzy Hash: 8516928da323c8c930bde93522ad9c0a321f78acfd9128cdc3e2da821bbee6d2
                                                                            • Instruction Fuzzy Hash: 5051623180114DAACF16EBE4C952EFDB779AF35301F608169E456B7192DB31AF09CB60
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 001CFA83
                                                                            • FindClose.KERNEL32(00000000), ref: 001CFB96
                                                                              • Part of subcall function 001652B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001652E6
                                                                            • Sleep.KERNEL32(0000000A), ref: 001CFAB3
                                                                            • _wcscmp.LIBCMT ref: 001CFAC7
                                                                            • _wcscmp.LIBCMT ref: 001CFAE2
                                                                            • FindNextFileW.KERNEL32(?,?), ref: 001CFB80
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                                            • String ID: *.*
                                                                            • API String ID: 2185952417-438819550
                                                                            • Opcode ID: 3d6d39ebd84a5ff98ac263d438faf0dac4777add6f35d7f8e61a20709afc2390
                                                                            • Instruction ID: 364e5e159735a2d02bb8d4092feedb20f33eb8e7ef3ba7429d3d2edb1547bfdd
                                                                            • Opcode Fuzzy Hash: 3d6d39ebd84a5ff98ac263d438faf0dac4777add6f35d7f8e61a20709afc2390
                                                                            • Instruction Fuzzy Hash: 38416F7190021AABCB15DF64CC55FEEBBB5FF25350F14816AE818A2191EB30DE85CB50
                                                                            APIs
                                                                              • Part of subcall function 001B9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B93E3
                                                                              • Part of subcall function 001B9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B9410
                                                                              • Part of subcall function 001B9399: GetLastError.KERNEL32 ref: 001B941D
                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 001C57B4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                            • String ID: $@$SeShutdownPrivilege
                                                                            • API String ID: 2234035333-194228
                                                                            • Opcode ID: c6d716037d6b61ad1cbd3621a6a72283eb19336a3ea6b8b6e04eae1b6689aaf3
                                                                            • Instruction ID: e917527999f6614aebbab65a5b601c3f95a36cdd4c366777461350df9f88b2fc
                                                                            • Opcode Fuzzy Hash: c6d716037d6b61ad1cbd3621a6a72283eb19336a3ea6b8b6e04eae1b6689aaf3
                                                                            • Instruction Fuzzy Hash: 0C01F731650712EEE72863A49C8BFBB7259AB34741F90002DF913D20D2DB90FCD0C160
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 001D69C7
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D69D6
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 001D69F2
                                                                            • listen.WSOCK32(00000000,00000005), ref: 001D6A01
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D6A1B
                                                                            • closesocket.WSOCK32(00000000,00000000), ref: 001D6A2F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                                                            • String ID:
                                                                            • API String ID: 1279440585-0
                                                                            • Opcode ID: b30ce8ccd42e958922add4c3342d59e0e3cae9a30513eaf472bd6963d0a1cf1d
                                                                            • Instruction ID: 7bef9a467475b58e817506e2b0e44ef4ff0506467aa0fcf5a33628d80c5d3969
                                                                            • Opcode Fuzzy Hash: b30ce8ccd42e958922add4c3342d59e0e3cae9a30513eaf472bd6963d0a1cf1d
                                                                            • Instruction Fuzzy Hash: 2721B670600601AFCB10EF64CC85B7EB7A9EF58710F158559F856A73D2CB70AC41CB91
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00161DD6
                                                                            • GetSysColor.USER32(0000000F), ref: 00161E2A
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00161E3D
                                                                              • Part of subcall function 0016166C: DefDlgProcW.USER32(?,00000020,?), ref: 001616B4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ColorProc$LongWindow
                                                                            • String ID:
                                                                            • API String ID: 3744519093-0
                                                                            • Opcode ID: 2a07a67c9e99b3af86de51cf6b72ce793f703e9950014129d4c6a5b0bf59a60f
                                                                            • Instruction ID: d718a6c4c2e266364fb816b4d09b8f32fe2b7f6865a37b282c5eb4d2dd29c894
                                                                            • Opcode Fuzzy Hash: 2a07a67c9e99b3af86de51cf6b72ce793f703e9950014129d4c6a5b0bf59a60f
                                                                            • Instruction Fuzzy Hash: 0CA1477410D844BADB2CABEAAD8DE7F359DEF91305F1D010AF402D6192CB219D22D2B6
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 001CC329
                                                                            • _wcscmp.LIBCMT ref: 001CC359
                                                                            • _wcscmp.LIBCMT ref: 001CC36E
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 001CC37F
                                                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 001CC3AF
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File_wcscmp$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 2387731787-0
                                                                            • Opcode ID: e814030e83d0463ffbb7365fc5c820d6e86cb12f45bcb9929c0db61f530ff941
                                                                            • Instruction ID: 5639f0b393f64d03ef61ac650080e167fe3da38db6e5167c3a425b1eebacc539
                                                                            • Opcode Fuzzy Hash: e814030e83d0463ffbb7365fc5c820d6e86cb12f45bcb9929c0db61f530ff941
                                                                            • Instruction Fuzzy Hash: AA519D756046029FC718DF68D890EAAB3E8FF69310F14861DE95ACB3A1DB30ED05CB91
                                                                            APIs
                                                                              • Part of subcall function 001D8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 001D84A0
                                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 001D6E89
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D6EB2
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 001D6EEB
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D6EF8
                                                                            • closesocket.WSOCK32(00000000,00000000), ref: 001D6F0C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 99427753-0
                                                                            • Opcode ID: 54827bcce84db49b524b020d75e9ecd868b077052b94f5951d95eb693f9d37b9
                                                                            • Instruction ID: 818924ce90d4ef8d7744fd9720dff22a9944943740af361a097a9264f20d3809
                                                                            • Opcode Fuzzy Hash: 54827bcce84db49b524b020d75e9ecd868b077052b94f5951d95eb693f9d37b9
                                                                            • Instruction Fuzzy Hash: 0841D175A00610AFDB11BF68DC86F7E73A89B69710F04855DF90AAB3C2DB709D108BA1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                            • String ID:
                                                                            • API String ID: 292994002-0
                                                                            • Opcode ID: e5b3095c0637a4d3fc1dda66a7fe167f3017a17c8c18c4a9950dc4e4f8ed3be1
                                                                            • Instruction ID: 397318dc2a1524230ede4704c41e5112c78e68d175284175939f57ae1c874487
                                                                            • Opcode Fuzzy Hash: e5b3095c0637a4d3fc1dda66a7fe167f3017a17c8c18c4a9950dc4e4f8ed3be1
                                                                            • Instruction Fuzzy Hash: A711C172700D51AFE7225F679C84A7EBB9AEF98764B014129F846D7242CB70E941CAA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LocalTime__swprintf
                                                                            • String ID: %.3d$WIN_XPe
                                                                            • API String ID: 2070861257-2409531811
                                                                            • Opcode ID: e08429cafb78a290604075a224bfe5b5750bc03df64f127421a46d0082e54eea
                                                                            • Instruction ID: 0b098f6ed40cd5f362a93f1d803cca75e8ca44331a5a4bb27df77196f1d76aff
                                                                            • Opcode Fuzzy Hash: e08429cafb78a290604075a224bfe5b5750bc03df64f127421a46d0082e54eea
                                                                            • Instruction Fuzzy Hash: D8D01276814108EAC70E9A90CE45DF9777CAB0E344F154052F506E2040D3359798DB22
                                                                            APIs
                                                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,001D1ED6,00000000), ref: 001D2AAD
                                                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 001D2AE4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$AvailableDataFileQueryRead
                                                                            • String ID:
                                                                            • API String ID: 599397726-0
                                                                            • Opcode ID: e1a59fe94ff5e44c240c1f0ac85ede1580898601cda864f75e19dc5ab2c7939e
                                                                            • Instruction ID: 46980ea87af493d86125b378c18a4966a525a74c1b927d08d1f9fd08d948cd95
                                                                            • Opcode Fuzzy Hash: e1a59fe94ff5e44c240c1f0ac85ede1580898601cda864f75e19dc5ab2c7939e
                                                                            • Instruction Fuzzy Hash: AD41F671600709BFEB21DE94CC81EBBB7BCEB60714F10405BF615A7641EBB1AE419B60
                                                                            APIs
                                                                              • Part of subcall function 00180FE6: std::exception::exception.LIBCMT ref: 0018101C
                                                                              • Part of subcall function 00180FE6: __CxxThrowException@8.LIBCMT ref: 00181031
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B93E3
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B9410
                                                                            • GetLastError.KERNEL32 ref: 001B941D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 1922334811-0
                                                                            • Opcode ID: 0f79ac7ccf22746ce7e0e2c55ce3e4753bd76f38485a51c2a2781aa6bdc48b6c
                                                                            • Instruction ID: 3347923336954e25bb81c18d1f6576d0139abe04bfad178788de69def0721fc3
                                                                            • Opcode Fuzzy Hash: 0f79ac7ccf22746ce7e0e2c55ce3e4753bd76f38485a51c2a2781aa6bdc48b6c
                                                                            • Instruction Fuzzy Hash: BD119DB2414208AFD728AF64DC85D6BB7BCFB48710B20812EF44996651EB70AC42CB60
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001C4271
                                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 001C42B2
                                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001C42BD
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                                            • String ID:
                                                                            • API String ID: 33631002-0
                                                                            • Opcode ID: 41656b44aa0d4f709bdf912110ed32bda4efdd09a389257eccb4ddcd568e9533
                                                                            • Instruction ID: 32fe42e0fddad5314c4b211078569763c5a23259e9bdd97fbd4bbc54830b2f6d
                                                                            • Opcode Fuzzy Hash: 41656b44aa0d4f709bdf912110ed32bda4efdd09a389257eccb4ddcd568e9533
                                                                            • Instruction Fuzzy Hash: CD113075E05228BFEB108F95AC45FBFBBBCEB49B60F104155FD04E7290C6715A418BA1
                                                                            APIs
                                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 001C4F45
                                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001C4F5C
                                                                            • FreeSid.ADVAPI32(?), ref: 001C4F6C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 3429775523-0
                                                                            • Opcode ID: afa16697c42b5991eb6f80cb22f7aecac9f69d9c51111cc47ed7a8618a3468c1
                                                                            • Instruction ID: df3015d8ca970d5b1f660dd72c90f1aed86e1e6cb9c50f259862238f39008a10
                                                                            • Opcode Fuzzy Hash: afa16697c42b5991eb6f80cb22f7aecac9f69d9c51111cc47ed7a8618a3468c1
                                                                            • Instruction Fuzzy Hash: 34F0E775A5120DBFDB04DFE49D89EBEBBB8EB08211F5044A9A901E2581E7356A44CB50
                                                                            APIs
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 001C1B01
                                                                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 001C1B14
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InputSendkeybd_event
                                                                            • String ID:
                                                                            • API String ID: 3536248340-0
                                                                            • Opcode ID: 0af03ca96088ba70d2373fe7f24b80741876f855a0566692a9d527e1207b7a04
                                                                            • Instruction ID: a312a5af5ee266355a1bc3f36db1fcf3da47bb4367a12e8d0f2ac9b63f00d699
                                                                            • Opcode Fuzzy Hash: 0af03ca96088ba70d2373fe7f24b80741876f855a0566692a9d527e1207b7a04
                                                                            • Instruction Fuzzy Hash: C7F0497194020DABDB05CF94C805BFE7BB4FF18315F10804AF955962A2D379DA15DF94
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,001D9B52,?,001F098C,?), ref: 001CA6DA
                                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,001D9B52,?,001F098C,?), ref: 001CA6EC
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: 1bd7b1952bc04afb37a8874cc44dcc5e926b1f65af5b253ad76d99a64a0d2de7
                                                                            • Instruction ID: 37481dfd04110049da29989149a983debd0b2be441baa50138a4a30db85bbb64
                                                                            • Opcode Fuzzy Hash: 1bd7b1952bc04afb37a8874cc44dcc5e926b1f65af5b253ad76d99a64a0d2de7
                                                                            • Instruction Fuzzy Hash: EEF0823550422EBBDB21AFA4CC48FEA77ADBF19361F008156B90997281D7709A80CBA1
                                                                            APIs
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001B8F27), ref: 001B8DFE
                                                                            • CloseHandle.KERNEL32(?,?,001B8F27), ref: 001B8E10
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                                            • String ID:
                                                                            • API String ID: 81990902-0
                                                                            • Opcode ID: 7e14042512ddd6f13a41b75b3f1b011e183f88109d161dacf92f5fc19adf8ad1
                                                                            • Instruction ID: 1104a30399a76a7732706ba8f6ba8e6a40385cd8aa5f8af24a5b07fbab3e90fa
                                                                            • Opcode Fuzzy Hash: 7e14042512ddd6f13a41b75b3f1b011e183f88109d161dacf92f5fc19adf8ad1
                                                                            • Instruction Fuzzy Hash: 18E0EC76010611FFE7262B60EC09EB77BADEF08350B14892DF49A90871DB62ACD1DB50
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00188F87,?,?,?,00000001), ref: 0018A38A
                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0018A393
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: b4b349639c3e8d7557c64b32ad9db560eb566f9bfe1701d3b02201ccafca44d7
                                                                            • Instruction ID: 5d1188444387a6d5bc0e38fe5d2bce24efbcf9009b0e1df70ef11fd3df5f8072
                                                                            • Opcode Fuzzy Hash: b4b349639c3e8d7557c64b32ad9db560eb566f9bfe1701d3b02201ccafca44d7
                                                                            • Instruction Fuzzy Hash: 0BB09231064208AFCA422B91EC09BA83F6AFB48A62F404010F60E44862CB625490CA91
                                                                            APIs
                                                                            • BlockInput.USER32(00000001), ref: 001D45F0
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BlockInput
                                                                            • String ID:
                                                                            • API String ID: 3456056419-0
                                                                            • Opcode ID: 8836822466fc585c2a54a33242247672bf2c084c50889c24b711460ede8047cf
                                                                            • Instruction ID: b439f91b3df161bbe45532a392889a182c342c9cbbe0d1d6b8325bf3dd5c7b89
                                                                            • Opcode Fuzzy Hash: 8836822466fc585c2a54a33242247672bf2c084c50889c24b711460ede8047cf
                                                                            • Instruction Fuzzy Hash: B1E04F762102159FD710AF99E804A9AF7EDAFA87A0F00C426FC49D7351DB70E9518B91
                                                                            APIs
                                                                            • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 001C5205
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: mouse_event
                                                                            • String ID:
                                                                            • API String ID: 2434400541-0
                                                                            • Opcode ID: b1774a92e00a20e71e74aa4646fe325da6e34fdeb05cbe71d4131dd033ffe4c3
                                                                            • Instruction ID: bec3fbd428a00292b4e9ddf16741b223a55e53de6d00f69f382fba1a485f8c92
                                                                            • Opcode Fuzzy Hash: b1774a92e00a20e71e74aa4646fe325da6e34fdeb05cbe71d4131dd033ffe4c3
                                                                            • Instruction Fuzzy Hash: 5ED06CA5160A0A69EA5807249E1FF7A160AA3357C1F9D474D7142890C2EAE4F8C5A421
                                                                            APIs
                                                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,001B8FA7), ref: 001B9389
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LogonUser
                                                                            • String ID:
                                                                            • API String ID: 1244722697-0
                                                                            • Opcode ID: 7f1a78e0229ab08a486d4a2a309f99b81edb452a4a6aeed2a7a21913bc86c6ab
                                                                            • Instruction ID: 7bd3671bb801545ee12155bb0eacb8452125b84fac812292741356a579b8f1aa
                                                                            • Opcode Fuzzy Hash: 7f1a78e0229ab08a486d4a2a309f99b81edb452a4a6aeed2a7a21913bc86c6ab
                                                                            • Instruction Fuzzy Hash: 58D05E3226050EABEF018EA4DC01EBE3B69EB04B01F408111FE15C50A1C776D835EB60
                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(?,?), ref: 001A0734
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: e94e4eb12eaa8fc3eb3985fdeb5f648bda8810a0488fdcacc309300e9036247f
                                                                            • Instruction ID: 79103fd4cd87f3de2d1231516c62cfbf315e096c9626b1f8192b48f6e5cfa124
                                                                            • Opcode Fuzzy Hash: e94e4eb12eaa8fc3eb3985fdeb5f648bda8810a0488fdcacc309300e9036247f
                                                                            • Instruction Fuzzy Hash: 2CC04CF5800109DBCB06DBA0DA88EFE7BBCAB08344F100055B105F2100D7749B44CA71
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0018A35A
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: dbe45780236189db9a76a23bc5ee8f57b6d34c2eafa16c62e21d71221a1142b7
                                                                            • Instruction ID: 2a1f8c51bc4567aa6e66b3c39b41ed14ab555bea725f372536f8854bf50364e0
                                                                            • Opcode Fuzzy Hash: dbe45780236189db9a76a23bc5ee8f57b6d34c2eafa16c62e21d71221a1142b7
                                                                            • Instruction Fuzzy Hash: 39A0023105410CAB8A011B55EC054557F6DE7455557404051F50D45522D77255519595
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,001F0980), ref: 001E3C65
                                                                            • IsWindowVisible.USER32(?), ref: 001E3C89
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpperVisibleWindow
                                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                            • API String ID: 4105515805-45149045
                                                                            • Opcode ID: cc8aebaf11d4edb1ed963148933a96da79402883292eef00d78f33b74993c939
                                                                            • Instruction ID: a0553909fe5a593bd6fb171d5805ebcfa28f114e1498c08d5f2716f0f425718d
                                                                            • Opcode Fuzzy Hash: cc8aebaf11d4edb1ed963148933a96da79402883292eef00d78f33b74993c939
                                                                            • Instruction Fuzzy Hash: 2CD1D430204A44DBCB15FF51C855AAEB7E5EFA4354F204468F9565B3E2CB31EE4ACB82
                                                                            APIs
                                                                            • SetTextColor.GDI32(?,00000000), ref: 001EAC55
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 001EAC86
                                                                            • GetSysColor.USER32(0000000F), ref: 001EAC92
                                                                            • SetBkColor.GDI32(?,000000FF), ref: 001EACAC
                                                                            • SelectObject.GDI32(?,?), ref: 001EACBB
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 001EACE6
                                                                            • GetSysColor.USER32(00000010), ref: 001EACEE
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 001EACF5
                                                                            • FrameRect.USER32(?,?,00000000), ref: 001EAD04
                                                                            • DeleteObject.GDI32(00000000), ref: 001EAD0B
                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 001EAD56
                                                                            • FillRect.USER32(?,?,?), ref: 001EAD88
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001EADB3
                                                                              • Part of subcall function 001EAF18: GetSysColor.USER32(00000012), ref: 001EAF51
                                                                              • Part of subcall function 001EAF18: SetTextColor.GDI32(?,?), ref: 001EAF55
                                                                              • Part of subcall function 001EAF18: GetSysColorBrush.USER32(0000000F), ref: 001EAF6B
                                                                              • Part of subcall function 001EAF18: GetSysColor.USER32(0000000F), ref: 001EAF76
                                                                              • Part of subcall function 001EAF18: GetSysColor.USER32(00000011), ref: 001EAF93
                                                                              • Part of subcall function 001EAF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 001EAFA1
                                                                              • Part of subcall function 001EAF18: SelectObject.GDI32(?,00000000), ref: 001EAFB2
                                                                              • Part of subcall function 001EAF18: SetBkColor.GDI32(?,00000000), ref: 001EAFBB
                                                                              • Part of subcall function 001EAF18: SelectObject.GDI32(?,?), ref: 001EAFC8
                                                                              • Part of subcall function 001EAF18: InflateRect.USER32(?,000000FF,000000FF), ref: 001EAFE7
                                                                              • Part of subcall function 001EAF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001EAFFE
                                                                              • Part of subcall function 001EAF18: GetWindowLongW.USER32(00000000,000000F0), ref: 001EB013
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                            • String ID:
                                                                            • API String ID: 4124339563-0
                                                                            • Opcode ID: 18166e5f72eeb957b27514a40e54040ac8b85bb27a93fa963d59f3c3f568a706
                                                                            • Instruction ID: abf7c1702066910cdf82b37cb2f34f6449f3f176fe2dd1e0bb299bf44ba02951
                                                                            • Opcode Fuzzy Hash: 18166e5f72eeb957b27514a40e54040ac8b85bb27a93fa963d59f3c3f568a706
                                                                            • Instruction Fuzzy Hash: 51A1AC72008701AFD7129F65DC08E6FBBA9FF88321F504A19F962965E2C771E984CF52
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?,?), ref: 00163072
                                                                            • DeleteObject.GDI32(00000000), ref: 001630B8
                                                                            • DeleteObject.GDI32(00000000), ref: 001630C3
                                                                            • DestroyIcon.USER32(00000000,?,?,?), ref: 001630CE
                                                                            • DestroyWindow.USER32(00000000,?,?,?), ref: 001630D9
                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0019C77C
                                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0019C7B5
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0019CBDE
                                                                              • Part of subcall function 00161F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00162412,?,00000000,?,?,?,?,00161AA7,00000000,?), ref: 00161F76
                                                                            • SendMessageW.USER32(?,00001053), ref: 0019CC1B
                                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0019CC32
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0019CC48
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0019CC53
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                            • String ID: 0
                                                                            • API String ID: 464785882-4108050209
                                                                            • Opcode ID: 2991ebdb259da9202ea09826a9237a71033349a33893a659518ed9db59834945
                                                                            • Instruction ID: bc836b2726dbe107e0de829dd2d53a826344c99080510011fc6cbbd8726900e7
                                                                            • Opcode Fuzzy Hash: 2991ebdb259da9202ea09826a9237a71033349a33893a659518ed9db59834945
                                                                            • Instruction Fuzzy Hash: 1E129B30604601EFDB25CF24C885BAABBF5BF08310F144569F99ACB662C731ED96CB91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                            • API String ID: 2660009612-1645009161
                                                                            • Opcode ID: de02bb197b30baebdb362588271f69f432321855cc4ad055b33b3941d843fbcb
                                                                            • Instruction ID: 9a512daf611f8180b70d6a82cf5a58f48454223868f4b108b5378e46befdebcd
                                                                            • Opcode Fuzzy Hash: de02bb197b30baebdb362588271f69f432321855cc4ad055b33b3941d843fbcb
                                                                            • Instruction Fuzzy Hash: 57A1D531A00209BBCB15BF61CC42EBE37B4AF55740F14802DF919AB292DB719F52DB51
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000), ref: 001D7BC8
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 001D7C87
                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 001D7CC5
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 001D7CD7
                                                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 001D7D1D
                                                                            • GetClientRect.USER32(00000000,?), ref: 001D7D29
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 001D7D6D
                                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 001D7D7C
                                                                            • GetStockObject.GDI32(00000011), ref: 001D7D8C
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 001D7D90
                                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 001D7DA0
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001D7DA9
                                                                            • DeleteDC.GDI32(00000000), ref: 001D7DB2
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001D7DDE
                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 001D7DF5
                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 001D7E30
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 001D7E44
                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 001D7E55
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 001D7E85
                                                                            • GetStockObject.GDI32(00000011), ref: 001D7E90
                                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 001D7E9B
                                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 001D7EA5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 2910397461-517079104
                                                                            • Opcode ID: a03aaad70dc0ca91785cf8428fc556b7e852d063a4ba7495b764165cee25a1a1
                                                                            • Instruction ID: e90c0f36f89700fc8284f694a279f40df96e3bcebec14c3aad13b3d75cd9d519
                                                                            • Opcode Fuzzy Hash: a03aaad70dc0ca91785cf8428fc556b7e852d063a4ba7495b764165cee25a1a1
                                                                            • Instruction Fuzzy Hash: 82A17271A00615BFEB25DBA4DC4AFBE77B9EB08710F108215FA15A72E1D770AD41CB60
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 001CB361
                                                                            • GetDriveTypeW.KERNEL32(?,001F2C4C,?,\\.\,001F0980), ref: 001CB43E
                                                                            • SetErrorMode.KERNEL32(00000000,001F2C4C,?,\\.\,001F0980), ref: 001CB59C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DriveType
                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                            • API String ID: 2907320926-4222207086
                                                                            • Opcode ID: 27bb88803672f45069d482134e5d3c1b66332589f240c5f3a6471bb74338b050
                                                                            • Instruction ID: 33ca2a1d7301d09a0996d0704eaa3813a1b0310aabef7b55a70eb94786a30dfc
                                                                            • Opcode Fuzzy Hash: 27bb88803672f45069d482134e5d3c1b66332589f240c5f3a6471bb74338b050
                                                                            • Instruction Fuzzy Hash: 8E51A131B68209EB8709DB60C9C3FB9B7F4AB79340F248019E406F7291D731EE91CA51
                                                                            APIs
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 001EA0F7
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 001EA1B0
                                                                            • SendMessageW.USER32(?,00001102,00000002,?), ref: 001EA1CC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: 0
                                                                            • API String ID: 2326795674-4108050209
                                                                            • Opcode ID: 1124e2dcbaaa37b46b222de98b02d95a790beaf2aa8225c7a565dcf70489c1e5
                                                                            • Instruction ID: 8a009efbc11d4b6fb664cc594c5bc7b022fe42cd99826a3c524a7830d0281d26
                                                                            • Opcode Fuzzy Hash: 1124e2dcbaaa37b46b222de98b02d95a790beaf2aa8225c7a565dcf70489c1e5
                                                                            • Instruction Fuzzy Hash: 55021F70108B81AFDB25CF16C848BBEBBE4FF89314F48851CF995962A1C774E954CB92
                                                                            APIs
                                                                            • GetSysColor.USER32(00000012), ref: 001EAF51
                                                                            • SetTextColor.GDI32(?,?), ref: 001EAF55
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 001EAF6B
                                                                            • GetSysColor.USER32(0000000F), ref: 001EAF76
                                                                            • CreateSolidBrush.GDI32(?), ref: 001EAF7B
                                                                            • GetSysColor.USER32(00000011), ref: 001EAF93
                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 001EAFA1
                                                                            • SelectObject.GDI32(?,00000000), ref: 001EAFB2
                                                                            • SetBkColor.GDI32(?,00000000), ref: 001EAFBB
                                                                            • SelectObject.GDI32(?,?), ref: 001EAFC8
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 001EAFE7
                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001EAFFE
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 001EB013
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001EB05F
                                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 001EB086
                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 001EB0A4
                                                                            • DrawFocusRect.USER32(?,?), ref: 001EB0AF
                                                                            • GetSysColor.USER32(00000011), ref: 001EB0BD
                                                                            • SetTextColor.GDI32(?,00000000), ref: 001EB0C5
                                                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 001EB0D9
                                                                            • SelectObject.GDI32(?,001EAC1F), ref: 001EB0F0
                                                                            • DeleteObject.GDI32(?), ref: 001EB0FB
                                                                            • SelectObject.GDI32(?,?), ref: 001EB101
                                                                            • DeleteObject.GDI32(?), ref: 001EB106
                                                                            • SetTextColor.GDI32(?,?), ref: 001EB10C
                                                                            • SetBkColor.GDI32(?,?), ref: 001EB116
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 1996641542-0
                                                                            • Opcode ID: 40d95292f7517e68c89b0792bfe6363d3cb8258d024f54b94f61d03a7d564332
                                                                            • Instruction ID: 7bae4d9ffffb185777ab9f175e6b6c87750273a9afe7dccdd11e9de371993ae9
                                                                            • Opcode Fuzzy Hash: 40d95292f7517e68c89b0792bfe6363d3cb8258d024f54b94f61d03a7d564332
                                                                            • Instruction Fuzzy Hash: EE615DB1904618BFDF129FA5DC48EAE7B79EF08320F114115F915AB2A2D775AD80CF90
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 001E90EA
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E90FB
                                                                            • CharNextW.USER32(0000014E), ref: 001E912A
                                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 001E916B
                                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 001E9181
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E9192
                                                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 001E91AF
                                                                            • SetWindowTextW.USER32(?,0000014E), ref: 001E91FB
                                                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 001E9211
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 001E9242
                                                                            • _memset.LIBCMT ref: 001E9267
                                                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 001E92B0
                                                                            • _memset.LIBCMT ref: 001E930F
                                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 001E9339
                                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 001E9391
                                                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 001E943E
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 001E9460
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 001E94AA
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 001E94D7
                                                                            • DrawMenuBar.USER32(?), ref: 001E94E6
                                                                            • SetWindowTextW.USER32(?,0000014E), ref: 001E950E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                            • String ID: 0
                                                                            • API String ID: 1073566785-4108050209
                                                                            • Opcode ID: 087e610a293fb0f87ab2f13c7076f7180aec41d3945b9cac7f58a1f9d8703dd3
                                                                            • Instruction ID: f3f04099058688974a29ad73550e31ac997219e257116259acda5f38ce521032
                                                                            • Opcode Fuzzy Hash: 087e610a293fb0f87ab2f13c7076f7180aec41d3945b9cac7f58a1f9d8703dd3
                                                                            • Instruction Fuzzy Hash: BFE18E70904659AFDF21DF92CC88EFE7BB8EF09720F108156FA15AA191D7708A81DF61
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 001E5007
                                                                            • GetDesktopWindow.USER32 ref: 001E501C
                                                                            • GetWindowRect.USER32(00000000), ref: 001E5023
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001E5085
                                                                            • DestroyWindow.USER32(?), ref: 001E50B1
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001E50DA
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001E50F8
                                                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 001E511E
                                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 001E5133
                                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 001E5146
                                                                            • IsWindowVisible.USER32(?), ref: 001E5166
                                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 001E5181
                                                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 001E5195
                                                                            • GetWindowRect.USER32(?,?), ref: 001E51AD
                                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 001E51D3
                                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 001E51ED
                                                                            • CopyRect.USER32(?,?), ref: 001E5204
                                                                            • SendMessageW.USER32(?,00000412,00000000), ref: 001E526F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                            • String ID: ($0$tooltips_class32
                                                                            • API String ID: 698492251-4156429822
                                                                            • Opcode ID: 5fc73e0f55892c693e53c43aaf018da3be2931ffa284523e502aff336568d155
                                                                            • Instruction ID: 33b26b19c813e826c712ed0e95816597bf2b3d409e643ed3e1df7c140fe6622c
                                                                            • Opcode Fuzzy Hash: 5fc73e0f55892c693e53c43aaf018da3be2931ffa284523e502aff336568d155
                                                                            • Instruction Fuzzy Hash: 2CB19B70604B81AFD704DF65C844B6EBBE6BF88714F008A1CF5999B292D771EC45CB92
                                                                            APIs
                                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 001C499C
                                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 001C49C2
                                                                            • _wcscpy.LIBCMT ref: 001C49F0
                                                                            • _wcscmp.LIBCMT ref: 001C49FB
                                                                            • _wcscat.LIBCMT ref: 001C4A11
                                                                            • _wcsstr.LIBCMT ref: 001C4A1C
                                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 001C4A38
                                                                            • _wcscat.LIBCMT ref: 001C4A81
                                                                            • _wcscat.LIBCMT ref: 001C4A88
                                                                            • _wcsncpy.LIBCMT ref: 001C4AB3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                            • API String ID: 699586101-1459072770
                                                                            • Opcode ID: 43aedbca437871218f647389075b8f0fcd03cde19d91151b93f14948ad3497ce
                                                                            • Instruction ID: c2f741532495830d2562a3d6065f1558efaca127880a8557dd7389a66ff30f21
                                                                            • Opcode Fuzzy Hash: 43aedbca437871218f647389075b8f0fcd03cde19d91151b93f14948ad3497ce
                                                                            • Instruction Fuzzy Hash: F841F372A042047BDB16B7648C43FBF7BBCDF65710F00005AFA05A6192EB74DB119BA5
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00162C8C
                                                                            • GetSystemMetrics.USER32(00000007), ref: 00162C94
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00162CBF
                                                                            • GetSystemMetrics.USER32(00000008), ref: 00162CC7
                                                                            • GetSystemMetrics.USER32(00000004), ref: 00162CEC
                                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00162D09
                                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00162D19
                                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00162D4C
                                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00162D60
                                                                            • GetClientRect.USER32(00000000,000000FF), ref: 00162D7E
                                                                            • GetStockObject.GDI32(00000011), ref: 00162D9A
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00162DA5
                                                                              • Part of subcall function 00162714: GetCursorPos.USER32(?), ref: 00162727
                                                                              • Part of subcall function 00162714: ScreenToClient.USER32(002277B0,?), ref: 00162744
                                                                              • Part of subcall function 00162714: GetAsyncKeyState.USER32(00000001), ref: 00162769
                                                                              • Part of subcall function 00162714: GetAsyncKeyState.USER32(00000002), ref: 00162777
                                                                            • SetTimer.USER32(00000000,00000000,00000028,001613C7), ref: 00162DCC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                            • String ID: AutoIt v3 GUI
                                                                            • API String ID: 1458621304-248962490
                                                                            • Opcode ID: f97b8f5cc99d936b2a215588ab1cc851ce85e58712284806093e3c58e82bf1f0
                                                                            • Instruction ID: 02c0a0d10fce9699d5d5ea9fa2296abdeded867712745400f4eaa0794ae7761d
                                                                            • Opcode Fuzzy Hash: f97b8f5cc99d936b2a215588ab1cc851ce85e58712284806093e3c58e82bf1f0
                                                                            • Instruction Fuzzy Hash: 2FB17F7160420AAFDB15DFA8DC49BBD7BB4FB48314F104229FA55E72A0DB70A861CF90
                                                                            APIs
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • GetForegroundWindow.USER32(001F0980,?,?,?,?,?), ref: 001804E3
                                                                            • IsWindow.USER32(?), ref: 001B66BB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Foreground_memmove
                                                                            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                                            • API String ID: 3828923867-1919597938
                                                                            • Opcode ID: 8cda255de5b6bd5c8a3f7473e76a2c576162314cc57885ac950616b36922e691
                                                                            • Instruction ID: 6f982f566cdcc2adaff87a19fa6d6fe957ce9e6f0323ec55989c10e41b00107c
                                                                            • Opcode Fuzzy Hash: 8cda255de5b6bd5c8a3f7473e76a2c576162314cc57885ac950616b36922e691
                                                                            • Instruction Fuzzy Hash: BDD1A630104606EBCB09EF64C4419EAFBB5BF78344F104A19F499575A2DF34EAA9CF91
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 001E44AC
                                                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 001E456C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharMessageSendUpper
                                                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                            • API String ID: 3974292440-719923060
                                                                            • Opcode ID: af5e9fe7c2329504c021a6b7b2413345aa1e931514f1b943fe145e3c411197be
                                                                            • Instruction ID: 53a2d7dfcc437d8a40184ee8a70767f305a7aba595d7203a8dd897b8cf26ffda
                                                                            • Opcode Fuzzy Hash: af5e9fe7c2329504c021a6b7b2413345aa1e931514f1b943fe145e3c411197be
                                                                            • Instruction Fuzzy Hash: 86A1B170614A419FCB18FF65C851A6EB3E6BFA9310F108928F8569B3D2DB30ED05CB91
                                                                            APIs
                                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 001D56E1
                                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 001D56EC
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 001D56F7
                                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 001D5702
                                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 001D570D
                                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 001D5718
                                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 001D5723
                                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 001D572E
                                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 001D5739
                                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 001D5744
                                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 001D574F
                                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 001D575A
                                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 001D5765
                                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 001D5770
                                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 001D577B
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 001D5786
                                                                            • GetCursorInfo.USER32(?), ref: 001D5796
                                                                            • GetLastError.KERNEL32(00000001,00000000), ref: 001D57C1
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load$ErrorInfoLast
                                                                            • String ID:
                                                                            • API String ID: 3215588206-0
                                                                            • Opcode ID: f0f2612c2f03ac3bfd8fcc7b2c6be95a3fd03c11f9f8e084b39cfbc4ea070d5d
                                                                            • Instruction ID: 30ed7fd18d653316ee2d8be629c9a626bc84e67a1f46c8793e69afc5411a1c4c
                                                                            • Opcode Fuzzy Hash: f0f2612c2f03ac3bfd8fcc7b2c6be95a3fd03c11f9f8e084b39cfbc4ea070d5d
                                                                            • Instruction Fuzzy Hash: 34417370E04319AADB109FBA8C49D6EFFF8EF51B50B10452FE109E7291DBB8A401CE61
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 001BB17B
                                                                            • __swprintf.LIBCMT ref: 001BB21C
                                                                            • _wcscmp.LIBCMT ref: 001BB22F
                                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 001BB284
                                                                            • _wcscmp.LIBCMT ref: 001BB2C0
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 001BB2F7
                                                                            • GetDlgCtrlID.USER32(?), ref: 001BB349
                                                                            • GetWindowRect.USER32(?,?), ref: 001BB37F
                                                                            • GetParent.USER32(?), ref: 001BB39D
                                                                            • ScreenToClient.USER32(00000000), ref: 001BB3A4
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 001BB41E
                                                                            • _wcscmp.LIBCMT ref: 001BB432
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 001BB458
                                                                            • _wcscmp.LIBCMT ref: 001BB46C
                                                                              • Part of subcall function 0018385C: _iswctype.LIBCMT ref: 00183864
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                            • String ID: %s%u
                                                                            • API String ID: 3744389584-679674701
                                                                            • Opcode ID: d45de96f776a3245cd29b185073e73b0a550a73fb3dded3cb44f217fb5939a86
                                                                            • Instruction ID: bff540675edf93407aac18868ad30139df4d75baa75fd5d842dd59375e944bfb
                                                                            • Opcode Fuzzy Hash: d45de96f776a3245cd29b185073e73b0a550a73fb3dded3cb44f217fb5939a86
                                                                            • Instruction Fuzzy Hash: F3A1EF71208306AFD715DF64C8C4BEAB7E8FF58310F008629F99AC2591DB70EA55CB91
                                                                            APIs
                                                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 001BBAB1
                                                                            • _wcscmp.LIBCMT ref: 001BBAC2
                                                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 001BBAEA
                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 001BBB07
                                                                            • _wcscmp.LIBCMT ref: 001BBB25
                                                                            • _wcsstr.LIBCMT ref: 001BBB36
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 001BBB6E
                                                                            • _wcscmp.LIBCMT ref: 001BBB7E
                                                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 001BBBA5
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 001BBBEE
                                                                            • _wcscmp.LIBCMT ref: 001BBBFE
                                                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 001BBC26
                                                                            • GetWindowRect.USER32(00000004,?), ref: 001BBC8F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                            • String ID: @$ThumbnailClass
                                                                            • API String ID: 1788623398-1539354611
                                                                            • Opcode ID: cc3e5e20c4c1f66f9102bdecc601e7376b0cbf0730eb67f0903c486a9fa45b37
                                                                            • Instruction ID: f845a59dffddbd149b6a9b59d628f224e680c65eaf599dfa48376865c9c48ab3
                                                                            • Opcode Fuzzy Hash: cc3e5e20c4c1f66f9102bdecc601e7376b0cbf0730eb67f0903c486a9fa45b37
                                                                            • Instruction Fuzzy Hash: 3381BC710082099BDB01DF24C9C5FEABBE8EF58314F048569FD898A496DBB4DE49CB61
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp
                                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                            • API String ID: 1038674560-1810252412
                                                                            • Opcode ID: 96b80d8086478973cc5752a3b5795ebd95c6ac4cf7a4150763f361dd104ba884
                                                                            • Instruction ID: d3fba784d660efd114855d0a8267f2dc16f9fb5db5cf7d5fbfa58b50c76eec67
                                                                            • Opcode Fuzzy Hash: 96b80d8086478973cc5752a3b5795ebd95c6ac4cf7a4150763f361dd104ba884
                                                                            • Instruction Fuzzy Hash: BF31EFB0A49205A6CF15FBA4CC83EED73F8AF317A4F200125F551B10D2EF966F148A52
                                                                            APIs
                                                                            • LoadIconW.USER32(00000063), ref: 001BCBAA
                                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001BCBBC
                                                                            • SetWindowTextW.USER32(?,?), ref: 001BCBD3
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 001BCBE8
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 001BCBEE
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 001BCBFE
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 001BCC04
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 001BCC25
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 001BCC3F
                                                                            • GetWindowRect.USER32(?,?), ref: 001BCC48
                                                                            • SetWindowTextW.USER32(?,?), ref: 001BCCB3
                                                                            • GetDesktopWindow.USER32 ref: 001BCCB9
                                                                            • GetWindowRect.USER32(00000000), ref: 001BCCC0
                                                                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 001BCD0C
                                                                            • GetClientRect.USER32(?,?), ref: 001BCD19
                                                                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 001BCD3E
                                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 001BCD69
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                            • String ID:
                                                                            • API String ID: 3869813825-0
                                                                            • Opcode ID: 38472d4cccf5edc94762de7e179f5389a25581713ca24ad7ff63971d3f2e9f8e
                                                                            • Instruction ID: 5cddf1e7573213d8f46f0948bdf8b1d539a031f2f4db9da30ad488559dd13f3f
                                                                            • Opcode Fuzzy Hash: 38472d4cccf5edc94762de7e179f5389a25581713ca24ad7ff63971d3f2e9f8e
                                                                            • Instruction Fuzzy Hash: EE515E70900709EFDB21DFA8CE89BAEBBF5FF08705F004518E586A29A1C774A954CF50
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001EA87E
                                                                            • DestroyWindow.USER32(00000000,?), ref: 001EA8F8
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 001EA972
                                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 001EA994
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001EA9A7
                                                                            • DestroyWindow.USER32(00000000), ref: 001EA9C9
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00160000,00000000), ref: 001EAA00
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001EAA19
                                                                            • GetDesktopWindow.USER32 ref: 001EAA32
                                                                            • GetWindowRect.USER32(00000000), ref: 001EAA39
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001EAA51
                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 001EAA69
                                                                              • Part of subcall function 001629AB: GetWindowLongW.USER32(?,000000EB), ref: 001629BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                            • String ID: 0$tooltips_class32
                                                                            • API String ID: 1297703922-3619404913
                                                                            • Opcode ID: ab4f77a90bc363f3ee715ad8e79590d99aad902ac0df71c6633eea6d0e44952c
                                                                            • Instruction ID: f8d8147a811bd143424f12a3ae045ee30e125d54e774ce26cabe767a3a5921eb
                                                                            • Opcode Fuzzy Hash: ab4f77a90bc363f3ee715ad8e79590d99aad902ac0df71c6633eea6d0e44952c
                                                                            • Instruction Fuzzy Hash: 4A719871144784AFD721CF28CC48FAA7BE5FF88304F45462DF986872A2D770A952DB62
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • DragQueryPoint.SHELL32(?,?), ref: 001ECCCF
                                                                              • Part of subcall function 001EB1A9: ClientToScreen.USER32(?,?), ref: 001EB1D2
                                                                              • Part of subcall function 001EB1A9: GetWindowRect.USER32(?,?), ref: 001EB248
                                                                              • Part of subcall function 001EB1A9: PtInRect.USER32(?,?,001EC6BC), ref: 001EB258
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 001ECD38
                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001ECD43
                                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001ECD66
                                                                            • _wcscat.LIBCMT ref: 001ECD96
                                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 001ECDAD
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 001ECDC6
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 001ECDDD
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 001ECDFF
                                                                            • DragFinish.SHELL32(?), ref: 001ECE06
                                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 001ECEF9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                            • API String ID: 169749273-3440237614
                                                                            • Opcode ID: 35c28833bc7b43a9c6a1d16597388648c4fe3c1ae15749cbfb73155082e44dc0
                                                                            • Instruction ID: 4342f392046406d7c73dfd17f522c5bc96276194f5e46bcd8bff486bdc5894ad
                                                                            • Opcode Fuzzy Hash: 35c28833bc7b43a9c6a1d16597388648c4fe3c1ae15749cbfb73155082e44dc0
                                                                            • Instruction Fuzzy Hash: 86619971508340AFC701DF94DC85DAFBBE8FFA9350F000A2DF595921A1DB709A59CB92
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(00000000), ref: 001C831A
                                                                            • VariantCopy.OLEAUT32(00000000,?), ref: 001C8323
                                                                            • VariantClear.OLEAUT32(00000000), ref: 001C832F
                                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001C841D
                                                                            • __swprintf.LIBCMT ref: 001C844D
                                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 001C8479
                                                                            • VariantInit.OLEAUT32(?), ref: 001C852A
                                                                            • SysFreeString.OLEAUT32(?), ref: 001C85BE
                                                                            • VariantClear.OLEAUT32(?), ref: 001C8618
                                                                            • VariantClear.OLEAUT32(?), ref: 001C8627
                                                                            • VariantInit.OLEAUT32(00000000), ref: 001C8665
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                            • API String ID: 3730832054-3931177956
                                                                            • Opcode ID: 923838b6e65c71848c51ea05d6270f5e904612cd7fd90ae5463482cbeac5f332
                                                                            • Instruction ID: 03f8f3bce5bcc6505af160dce5e90e6e3066ae7315abc322835461fea95178ad
                                                                            • Opcode Fuzzy Hash: 923838b6e65c71848c51ea05d6270f5e904612cd7fd90ae5463482cbeac5f332
                                                                            • Instruction Fuzzy Hash: 01D1EF31604119EBCB249FA9C8C4F7EBBB4BF69B00F259159E405AB281DF74ED40DBA1
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 001E4A61
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001E4AAC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharMessageSendUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 3974292440-4258414348
                                                                            • Opcode ID: 9cd4fca675ca9d8044fe6b29ae23345c499f17462727eb4bd2a5fe2b2a60231f
                                                                            • Instruction ID: 86717679ead3f8e7e55b52018091c340a0f6fbebb406003455a5f8c9b437dc6a
                                                                            • Opcode Fuzzy Hash: 9cd4fca675ca9d8044fe6b29ae23345c499f17462727eb4bd2a5fe2b2a60231f
                                                                            • Instruction Fuzzy Hash: 6E919F74204B019FCB15EF61C851AADB7E1BFA8354F10896CF8965B3A2CB31ED59CB81
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(?), ref: 001CE31F
                                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 001CE32F
                                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001CE33B
                                                                            • __wsplitpath.LIBCMT ref: 001CE399
                                                                            • _wcscat.LIBCMT ref: 001CE3B1
                                                                            • _wcscat.LIBCMT ref: 001CE3C3
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001CE3D8
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001CE3EC
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001CE41E
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 001CE43F
                                                                            • _wcscpy.LIBCMT ref: 001CE44B
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001CE48A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                            • String ID: *.*
                                                                            • API String ID: 3566783562-438819550
                                                                            • Opcode ID: e0fe06cd181d00e44a7d8bca0b9a783ca1eaffd34f5adf7aa195347dabdad8e6
                                                                            • Instruction ID: abb7bb91436e5941793b580b0007f471516a54443eb552a05030d28a225faf75
                                                                            • Opcode Fuzzy Hash: e0fe06cd181d00e44a7d8bca0b9a783ca1eaffd34f5adf7aa195347dabdad8e6
                                                                            • Instruction Fuzzy Hash: BE615872504245AFC710EF60C844EAEB3E9FFA9310F04891EF989C7251DB35EA45CB92
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001CA2C2
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001CA2E3
                                                                            • __swprintf.LIBCMT ref: 001CA33C
                                                                            • __swprintf.LIBCMT ref: 001CA355
                                                                            • _wprintf.LIBCMT ref: 001CA3FC
                                                                            • _wprintf.LIBCMT ref: 001CA41A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString__swprintf_wprintf$_memmove
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 311963372-3080491070
                                                                            • Opcode ID: ba1de3f0eb63d23ff727acf5ff17ab5f5d860f359c1cc73c2a30c940a14e44ec
                                                                            • Instruction ID: 67eb7b833103afac8297dcc989e7b4db42f4d05c8d7f4299c4a3cd6213ef967c
                                                                            • Opcode Fuzzy Hash: ba1de3f0eb63d23ff727acf5ff17ab5f5d860f359c1cc73c2a30c940a14e44ec
                                                                            • Instruction Fuzzy Hash: EB51F271800109BACF2AEBE4CD46EEEB779AF34340F504265F509B2052EB346F99DB61
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,001AF8B8,00000001,0000138C,00000001,00000000,00000001,?,001D3FF9,00000000), ref: 001C009A
                                                                            • LoadStringW.USER32(00000000,?,001AF8B8,00000001), ref: 001C00A3
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • GetModuleHandleW.KERNEL32(00000000,00227310,?,00000FFF,?,?,001AF8B8,00000001,0000138C,00000001,00000000,00000001,?,001D3FF9,00000000,00000001), ref: 001C00C5
                                                                            • LoadStringW.USER32(00000000,?,001AF8B8,00000001), ref: 001C00C8
                                                                            • __swprintf.LIBCMT ref: 001C0118
                                                                            • __swprintf.LIBCMT ref: 001C0129
                                                                            • _wprintf.LIBCMT ref: 001C01D2
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001C01E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 984253442-2268648507
                                                                            • Opcode ID: da376a1f06cf834a8234166d4bcb266d1fec68f8636b356cd1433ea63ae3d2f8
                                                                            • Instruction ID: ffb777fed6ed5a528c0ced430483f919bf35c0a106e0275faebf37ebe1c25cce
                                                                            • Opcode Fuzzy Hash: da376a1f06cf834a8234166d4bcb266d1fec68f8636b356cd1433ea63ae3d2f8
                                                                            • Instruction Fuzzy Hash: 4C414D72800119BACB15EBE4CD96EEEB779AF28340F104165F609B2092DB34AF59CB61
                                                                            APIs
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • CharLowerBuffW.USER32(?,?), ref: 001CAA0E
                                                                            • GetDriveTypeW.KERNEL32 ref: 001CAA5B
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001CAAA3
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001CAADA
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001CAB08
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 2698844021-4113822522
                                                                            • Opcode ID: 75f18e11809d9a5567545f443ed4d9b0cc2c83ac64db488a57fac040283b6c37
                                                                            • Instruction ID: 7c9ea0121c11d8d86783b4333d1f3456b08b17a6b5ceaf64168297b9765d45e6
                                                                            • Opcode Fuzzy Hash: 75f18e11809d9a5567545f443ed4d9b0cc2c83ac64db488a57fac040283b6c37
                                                                            • Instruction Fuzzy Hash: CE515A71504209AFC701EF54C88196AB3F8FFA8758F50896DF89997261DB31EE09CB52
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 001CA852
                                                                            • __swprintf.LIBCMT ref: 001CA874
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 001CA8B1
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 001CA8D6
                                                                            • _memset.LIBCMT ref: 001CA8F5
                                                                            • _wcsncpy.LIBCMT ref: 001CA931
                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 001CA966
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001CA971
                                                                            • RemoveDirectoryW.KERNEL32(?), ref: 001CA97A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001CA984
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 2733774712-3457252023
                                                                            • Opcode ID: 9d69e9285e1dfe1068152a6ec26961fcc7cad1cee88323f971015ce49743f6b8
                                                                            • Instruction ID: dfa9fbec2ffdd02e3fb95b3df034470b1d3e14501cb37d1fa9088bd9dfe2c5c9
                                                                            • Opcode Fuzzy Hash: 9d69e9285e1dfe1068152a6ec26961fcc7cad1cee88323f971015ce49743f6b8
                                                                            • Instruction Fuzzy Hash: B931B07150010AABDB229FA0DC49FFB73BCEF99704F5041AAF509D2061EB749785CB25
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,001E982C,?,?), ref: 001EC0C8
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC0DF
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC0EA
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC0F7
                                                                            • GlobalLock.KERNEL32(00000000), ref: 001EC100
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC10F
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 001EC118
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC11F
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,001E982C,?,?,00000000,?), ref: 001EC130
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,001F3C7C,?), ref: 001EC149
                                                                            • GlobalFree.KERNEL32(00000000), ref: 001EC159
                                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 001EC17D
                                                                            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 001EC1A8
                                                                            • DeleteObject.GDI32(00000000), ref: 001EC1D0
                                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001EC1E6
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3840717409-0
                                                                            • Opcode ID: f6b1c0972e79ecfb81ce12bc9f7d0594a4d4ed1cec063db4a665a839d185c6f7
                                                                            • Instruction ID: 0c5607295fcc9124d82850bece3375da29a79888a7b47db43abc8ec9d43b68f0
                                                                            • Opcode Fuzzy Hash: f6b1c0972e79ecfb81ce12bc9f7d0594a4d4ed1cec063db4a665a839d185c6f7
                                                                            • Instruction Fuzzy Hash: B1414A75600249EFCB229F65DC88EBE7BB8EF89711F104058F906E7261DB309D81DB60
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001EC8A4
                                                                            • GetFocus.USER32 ref: 001EC8B4
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 001EC8BF
                                                                            • _memset.LIBCMT ref: 001EC9EA
                                                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 001ECA15
                                                                            • GetMenuItemCount.USER32(?), ref: 001ECA35
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 001ECA48
                                                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 001ECA7C
                                                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 001ECAC4
                                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001ECAFC
                                                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 001ECB31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                            • String ID: 0
                                                                            • API String ID: 1296962147-4108050209
                                                                            • Opcode ID: d3902347001bc676555586db1267fb7d7adbc467b4d260a3ed8df61acf8ecf5a
                                                                            • Instruction ID: 19c2e79261cab5838c16172de1fc1da2197a4c57708b41ce73205e79a03e2f35
                                                                            • Opcode Fuzzy Hash: d3902347001bc676555586db1267fb7d7adbc467b4d260a3ed8df61acf8ecf5a
                                                                            • Instruction Fuzzy Hash: A6819A70208781AFD720DF15DC85AAFBBE8FB88354F00492DF99597292D770D906CBA2
                                                                            APIs
                                                                              • Part of subcall function 001B8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B8E3C
                                                                              • Part of subcall function 001B8E20: GetLastError.KERNEL32(?,001B8900,?,?,?), ref: 001B8E46
                                                                              • Part of subcall function 001B8E20: GetProcessHeap.KERNEL32(00000008,?,?,001B8900,?,?,?), ref: 001B8E55
                                                                              • Part of subcall function 001B8E20: HeapAlloc.KERNEL32(00000000,?,001B8900,?,?,?), ref: 001B8E5C
                                                                              • Part of subcall function 001B8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B8E73
                                                                              • Part of subcall function 001B8EBD: GetProcessHeap.KERNEL32(00000008,001B8916,00000000,00000000,?,001B8916,?), ref: 001B8EC9
                                                                              • Part of subcall function 001B8EBD: HeapAlloc.KERNEL32(00000000,?,001B8916,?), ref: 001B8ED0
                                                                              • Part of subcall function 001B8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,001B8916,?), ref: 001B8EE1
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001B8B2E
                                                                            • _memset.LIBCMT ref: 001B8B43
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001B8B62
                                                                            • GetLengthSid.ADVAPI32(?), ref: 001B8B73
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 001B8BB0
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001B8BCC
                                                                            • GetLengthSid.ADVAPI32(?), ref: 001B8BE9
                                                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 001B8BF8
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 001B8BFF
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001B8C20
                                                                            • CopySid.ADVAPI32(00000000), ref: 001B8C27
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001B8C58
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001B8C7E
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001B8C92
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                            • String ID:
                                                                            • API String ID: 3996160137-0
                                                                            • Opcode ID: f9bfe09d163a0ff925f069706e7399bd6e9d71c1667219da5baad2dcf03a9644
                                                                            • Instruction ID: 64ac0fe23943126b101f35f4861ddb8f316ecdd7383f239acfb1d31d3616fa83
                                                                            • Opcode Fuzzy Hash: f9bfe09d163a0ff925f069706e7399bd6e9d71c1667219da5baad2dcf03a9644
                                                                            • Instruction Fuzzy Hash: 886167B5900209AFDF12DFA0DC44EFEBBB9FF18700F04816AF915A6291DB319A05CB60
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 001D7A79
                                                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 001D7A85
                                                                            • CreateCompatibleDC.GDI32(?), ref: 001D7A91
                                                                            • SelectObject.GDI32(00000000,?), ref: 001D7A9E
                                                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 001D7AF2
                                                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 001D7B2E
                                                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 001D7B52
                                                                            • SelectObject.GDI32(00000006,?), ref: 001D7B5A
                                                                            • DeleteObject.GDI32(?), ref: 001D7B63
                                                                            • DeleteDC.GDI32(00000006), ref: 001D7B6A
                                                                            • ReleaseDC.USER32(00000000,?), ref: 001D7B75
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                            • String ID: (
                                                                            • API String ID: 2598888154-3887548279
                                                                            • Opcode ID: 07ac5f2e43062691a058e8cf4329b0409ac2bfe07906582ee36507ecde93a250
                                                                            • Instruction ID: 491497e42968c6c889bb53186ba9d39a79809b0257cbf145e1fc197cf96612a4
                                                                            • Opcode Fuzzy Hash: 07ac5f2e43062691a058e8cf4329b0409ac2bfe07906582ee36507ecde93a250
                                                                            • Instruction Fuzzy Hash: 6C513675A04209EFCB15CFA8CC85EAEBBB9EF48350F14841EF95AA7351D731A941CB60
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001CA4D4
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • LoadStringW.USER32(?,?,00000FFF,?), ref: 001CA4F6
                                                                            • __swprintf.LIBCMT ref: 001CA54F
                                                                            • __swprintf.LIBCMT ref: 001CA568
                                                                            • _wprintf.LIBCMT ref: 001CA61E
                                                                            • _wprintf.LIBCMT ref: 001CA63C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString__swprintf_wprintf$_memmove
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 311963372-2391861430
                                                                            • Opcode ID: 0a3ddd8f7ead123db14545457f56fa92792e0edeea8f6e81127ba2f0efeb38ba
                                                                            • Instruction ID: 259e60895b030504cac68335a46dc939f018ae09a7a6cc9e28dbcd2ae6ed464d
                                                                            • Opcode Fuzzy Hash: 0a3ddd8f7ead123db14545457f56fa92792e0edeea8f6e81127ba2f0efeb38ba
                                                                            • Instruction Fuzzy Hash: 0A51C371800119BACF26EBE4CD46EEEB779AF24344F508225F509B2092DB316F59DB61
                                                                            APIs
                                                                              • Part of subcall function 001C951A: __time64.LIBCMT ref: 001C9524
                                                                              • Part of subcall function 00174A8C: _fseek.LIBCMT ref: 00174AA4
                                                                            • __wsplitpath.LIBCMT ref: 001C97EF
                                                                              • Part of subcall function 0018431E: __wsplitpath_helper.LIBCMT ref: 0018435E
                                                                            • _wcscpy.LIBCMT ref: 001C9802
                                                                            • _wcscat.LIBCMT ref: 001C9815
                                                                            • __wsplitpath.LIBCMT ref: 001C983A
                                                                            • _wcscat.LIBCMT ref: 001C9850
                                                                            • _wcscat.LIBCMT ref: 001C9863
                                                                              • Part of subcall function 001C9560: _memmove.LIBCMT ref: 001C9599
                                                                              • Part of subcall function 001C9560: _memmove.LIBCMT ref: 001C95A8
                                                                            • _wcscmp.LIBCMT ref: 001C97AA
                                                                              • Part of subcall function 001C9CF1: _wcscmp.LIBCMT ref: 001C9DE1
                                                                              • Part of subcall function 001C9CF1: _wcscmp.LIBCMT ref: 001C9DF4
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 001C9A0D
                                                                            • _wcsncpy.LIBCMT ref: 001C9A80
                                                                            • DeleteFileW.KERNEL32(?,?), ref: 001C9AB6
                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001C9ACC
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001C9ADD
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001C9AEF
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                            • String ID:
                                                                            • API String ID: 1500180987-0
                                                                            • Opcode ID: c9a44d0385516c6eaba6baddcb6744f2cd087dd740dc530d5cba702ab97856d8
                                                                            • Instruction ID: 18dc8859f2b893d57620c145f51e8f7330fbddc7256f2c000c7d2e02ae505f8c
                                                                            • Opcode Fuzzy Hash: c9a44d0385516c6eaba6baddcb6744f2cd087dd740dc530d5cba702ab97856d8
                                                                            • Instruction Fuzzy Hash: 79C11AB1900219ABDF25DF95CC85EDEB7BDAF69310F0040AAF609E7151EB309A84CF65
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00175BF1
                                                                            • GetMenuItemCount.USER32(00227890), ref: 001B0E7B
                                                                            • GetMenuItemCount.USER32(00227890), ref: 001B0F2B
                                                                            • GetCursorPos.USER32(?), ref: 001B0F6F
                                                                            • SetForegroundWindow.USER32(00000000), ref: 001B0F78
                                                                            • TrackPopupMenuEx.USER32(00227890,00000000,?,00000000,00000000,00000000), ref: 001B0F8B
                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001B0F97
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                            • String ID:
                                                                            • API String ID: 2751501086-0
                                                                            • Opcode ID: bc5c446ea7b4228e4810637c769de9b359dbeb593a27b086ca4fa8b8f785c70c
                                                                            • Instruction ID: 347ce1f930a2604c1ab7f7b3d904bafa340ed04b3de9bcaccb993bb2cd34d4be
                                                                            • Opcode Fuzzy Hash: bc5c446ea7b4228e4810637c769de9b359dbeb593a27b086ca4fa8b8f785c70c
                                                                            • Instruction Fuzzy Hash: 5E710570644709BFEB268B54DC85FEABF69FF08364F104216F5186A1E1C7B1AC50DB90
                                                                            APIs
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • _memset.LIBCMT ref: 001B8489
                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001B84BE
                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001B84DA
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001B84F6
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 001B8520
                                                                            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 001B8548
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001B8553
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001B8558
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 1411258926-22481851
                                                                            • Opcode ID: 8ffbb4a013152b56b8b4596137b4307cee21a154657a9c890233505ed4250955
                                                                            • Instruction ID: d32a47fc1a49d2a31d3bd96f0e0fcbae1a53f6b589ff3957df8ac6759bbaac47
                                                                            • Opcode Fuzzy Hash: 8ffbb4a013152b56b8b4596137b4307cee21a154657a9c890233505ed4250955
                                                                            • Instruction Fuzzy Hash: 4341FA72C1022DABCF22EBA8DC55EEDB7B9FF18740F048169F915A2161DB305D55CB90
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,001E040D,?,?), ref: 001E1491
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 3964851224-909552448
                                                                            • Opcode ID: dfd0471003ef8b6f7bc8dd5d34a4e0bb82cda4990d63eaab277dbea3d10e0e3a
                                                                            • Instruction ID: 4d5ba0b809cf478289da2c99fd1d7e8043c51a7f5e515a1055d48abd71876dad
                                                                            • Opcode Fuzzy Hash: dfd0471003ef8b6f7bc8dd5d34a4e0bb82cda4990d63eaab277dbea3d10e0e3a
                                                                            • Instruction Fuzzy Hash: A4417C3465069EEBCF05EF95D840AEE3364BF6A300F608514FC565B292DB30EE69CB60
                                                                            APIs
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                              • Part of subcall function 0017153B: _memmove.LIBCMT ref: 001715C4
                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 001C58EB
                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 001C5901
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001C5912
                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 001C5924
                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 001C5935
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$_memmove
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 2279737902-1007645807
                                                                            • Opcode ID: f8527bdbdb3b48c518e9c55912bdf39e584be5e959c3dcafc653ef03f5970f57
                                                                            • Instruction ID: db3376d3bcc655450230ca0de20468516eeb315a0fe0a58751546d6e6c783c51
                                                                            • Opcode Fuzzy Hash: f8527bdbdb3b48c518e9c55912bdf39e584be5e959c3dcafc653ef03f5970f57
                                                                            • Instruction Fuzzy Hash: 24110430950129B9D720A7A5CC4AEFF7BBCEBF2F50F4004A9B415A20D1DF706E90C5A0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                            • String ID: 0.0.0.0
                                                                            • API String ID: 208665112-3771769585
                                                                            • Opcode ID: c7a094c3734133321f458eb26b99c400aa5c7f903f72f0fb8d96c1e927b20a6b
                                                                            • Instruction ID: e93c7f6078c790b139f91f348d76e474a7f009d6ccb7ec054002ed0870731e3e
                                                                            • Opcode Fuzzy Hash: c7a094c3734133321f458eb26b99c400aa5c7f903f72f0fb8d96c1e927b20a6b
                                                                            • Instruction Fuzzy Hash: 67110A31909108ABCB16BB609C4AFEA77BCDF65710F0401A9F544960A2EF70DAC1CB55
                                                                            APIs
                                                                            • timeGetTime.WINMM ref: 001C5535
                                                                              • Part of subcall function 0018083E: timeGetTime.WINMM(?,00000002,0016C22C), ref: 00180842
                                                                            • Sleep.KERNEL32(0000000A), ref: 001C5561
                                                                            • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 001C5585
                                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 001C55A7
                                                                            • SetActiveWindow.USER32 ref: 001C55C6
                                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 001C55D4
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 001C55F3
                                                                            • Sleep.KERNEL32(000000FA), ref: 001C55FE
                                                                            • IsWindow.USER32 ref: 001C560A
                                                                            • EndDialog.USER32(00000000), ref: 001C561B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                            • String ID: BUTTON
                                                                            • API String ID: 1194449130-3405671355
                                                                            • Opcode ID: 16a0850a6aae9686a42772e04cefc7bfe590f44968d8e4447b47652978fc7009
                                                                            • Instruction ID: c274a7e8ebbe8621815b83a0dd819c76ebcdf6725bd7dea2f0368f0ef67dadcb
                                                                            • Opcode Fuzzy Hash: 16a0850a6aae9686a42772e04cefc7bfe590f44968d8e4447b47652978fc7009
                                                                            • Instruction Fuzzy Hash: AE217CB0209604BFE7625BA0FC89F353B6BEB68785F816018F401815B2DB71EDE1DA21
                                                                            APIs
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • CoInitialize.OLE32(00000000), ref: 001CDC2D
                                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 001CDCC0
                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 001CDCD4
                                                                            • CoCreateInstance.OLE32(001F3D4C,00000000,00000001,0021B86C,?), ref: 001CDD20
                                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 001CDD8F
                                                                            • CoTaskMemFree.OLE32(?,?), ref: 001CDDE7
                                                                            • _memset.LIBCMT ref: 001CDE24
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 001CDE60
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 001CDE83
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 001CDE8A
                                                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 001CDEC1
                                                                            • CoUninitialize.OLE32(00000001,00000000), ref: 001CDEC3
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                            • String ID:
                                                                            • API String ID: 1246142700-0
                                                                            • Opcode ID: 68c36e005861becd2dfed210b24a286695f6c05b955eb4a4da0930cb992cd696
                                                                            • Instruction ID: 5bccf6dfd9a17435ee03d9dfcd791a935ca5fe9f5117ffb4d44cecbf67851b59
                                                                            • Opcode Fuzzy Hash: 68c36e005861becd2dfed210b24a286695f6c05b955eb4a4da0930cb992cd696
                                                                            • Instruction Fuzzy Hash: 76B1EB75A00109AFDB05DFA4CC84EAEBBB9FF58304B158469F909EB251DB30EE45CB50
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 001C0896
                                                                            • SetKeyboardState.USER32(?), ref: 001C0901
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 001C0921
                                                                            • GetKeyState.USER32(000000A0), ref: 001C0938
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 001C0967
                                                                            • GetKeyState.USER32(000000A1), ref: 001C0978
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 001C09A4
                                                                            • GetKeyState.USER32(00000011), ref: 001C09B2
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 001C09DB
                                                                            • GetKeyState.USER32(00000012), ref: 001C09E9
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 001C0A12
                                                                            • GetKeyState.USER32(0000005B), ref: 001C0A20
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 663037d3271b16e2eafb97e4d65453ecf0d6b1cd4bbe00706b8ee222fcfe8447
                                                                            • Instruction ID: 7412053454e80f32e3c662b523c453efb52afe3b445bc2657d37497fed66e60f
                                                                            • Opcode Fuzzy Hash: 663037d3271b16e2eafb97e4d65453ecf0d6b1cd4bbe00706b8ee222fcfe8447
                                                                            • Instruction Fuzzy Hash: 9D51BA20E04784A9FB36DBA04811FAABFB49F25384F08859D95C65B5C3DB64DA4CCB91
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000001), ref: 001BCE1C
                                                                            • GetWindowRect.USER32(00000000,?), ref: 001BCE2E
                                                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 001BCE8C
                                                                            • GetDlgItem.USER32(?,00000002), ref: 001BCE97
                                                                            • GetWindowRect.USER32(00000000,?), ref: 001BCEA9
                                                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 001BCEFD
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 001BCF0B
                                                                            • GetWindowRect.USER32(00000000,?), ref: 001BCF1C
                                                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 001BCF5F
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 001BCF6D
                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 001BCF8A
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 001BCF97
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: d72ad78cab068238071ff96b301afe83be5e624b60cc351638851d74c08d30d4
                                                                            • Instruction ID: a538fd0208aa2e1e89adede9d7b15d317b78996e3ee3573e235fb8262c783108
                                                                            • Opcode Fuzzy Hash: d72ad78cab068238071ff96b301afe83be5e624b60cc351638851d74c08d30d4
                                                                            • Instruction Fuzzy Hash: 56515F71B00205AFDB18CF69CD89ABEBBBAEB88710F14816DF516D7291D770AD40CB50
                                                                            APIs
                                                                              • Part of subcall function 00161F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00162412,?,00000000,?,?,?,?,00161AA7,00000000,?), ref: 00161F76
                                                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 001624AF
                                                                            • KillTimer.USER32(-00000001,?,?,?,?,00161AA7,00000000,?,?,00161EBE,?,?), ref: 0016254A
                                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0019BFE7
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00161AA7,00000000,?,?,00161EBE,?,?), ref: 0019C018
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00161AA7,00000000,?,?,00161EBE,?,?), ref: 0019C02F
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00161AA7,00000000,?,?,00161EBE,?,?), ref: 0019C04B
                                                                            • DeleteObject.GDI32(00000000), ref: 0019C05D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 641708696-0
                                                                            • Opcode ID: ece627ab4d3da59c1dd031bf6fb3d01600ae01b741d916a9754c2468e3731746
                                                                            • Instruction ID: 8d37686994853f3a62783719c1323febbfc56a6414b5c8c764e84cb0bbde0a24
                                                                            • Opcode Fuzzy Hash: ece627ab4d3da59c1dd031bf6fb3d01600ae01b741d916a9754c2468e3731746
                                                                            • Instruction Fuzzy Hash: B8619B30109A00EFDB369F54ED4CB3AB7F1FB44312F149528E08256A70CB74A8A1EF91
                                                                            APIs
                                                                              • Part of subcall function 001629AB: GetWindowLongW.USER32(?,000000EB), ref: 001629BC
                                                                            • GetSysColor.USER32(0000000F), ref: 001625AF
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ColorLongWindow
                                                                            • String ID:
                                                                            • API String ID: 259745315-0
                                                                            • Opcode ID: 1a9f722ed716688826e4572b1ffb27bd507fab0e184d67df1a0188cb400e683b
                                                                            • Instruction ID: 4aab6cafa5f7bdede36c96700ec442438de95315e92c7f497d7fa1664df45860
                                                                            • Opcode Fuzzy Hash: 1a9f722ed716688826e4572b1ffb27bd507fab0e184d67df1a0188cb400e683b
                                                                            • Instruction Fuzzy Hash: EF41D431104940AFDF255F68DC88BB93B76FB0A335F194265FDA68A1E2C7308C92DB61
                                                                            APIs
                                                                              • Part of subcall function 00180B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00172A3E,?,00008000), ref: 00180BA7
                                                                              • Part of subcall function 00180284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00172A58,?,00008000), ref: 001802A4
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00172ADF
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00172C2C
                                                                              • Part of subcall function 00173EBE: _wcscpy.LIBCMT ref: 00173EF6
                                                                              • Part of subcall function 0018386D: _iswctype.LIBCMT ref: 00183875
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                            • API String ID: 537147316-3738523708
                                                                            • Opcode ID: faa011e0625b3b2c753794b08015bd6ab329e0a6f6fadf33b553d04ba12a54ca
                                                                            • Instruction ID: fc9ea98026d87fca1fc1be5300044b44ae7ca08930ff015dbb2cd0b285490328
                                                                            • Opcode Fuzzy Hash: faa011e0625b3b2c753794b08015bd6ab329e0a6f6fadf33b553d04ba12a54ca
                                                                            • Instruction Fuzzy Hash: 0202B0711083419FC725EF64C841AAFBBF5BFA9354F10891DF499972A2DB30DA4ACB42
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?,001F0980), ref: 001CAF4E
                                                                            • GetDriveTypeW.KERNEL32(00000061,0021B5F0,00000061), ref: 001CB018
                                                                            • _wcscpy.LIBCMT ref: 001CB042
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharDriveLowerType_wcscpy
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 2820617543-1000479233
                                                                            • Opcode ID: d77612189b49ebdb835b9b894750a7d1adf435935a7c4e6981631b5f0dc3a3d8
                                                                            • Instruction ID: 4a0992b1e59b62beb1296c41e591a5e62e37df3cf4422b99f6e8efc9f8aaa039
                                                                            • Opcode Fuzzy Hash: d77612189b49ebdb835b9b894750a7d1adf435935a7c4e6981631b5f0dc3a3d8
                                                                            • Instruction Fuzzy Hash: 4A51BD70218308ABC316EF14C892EAEB7B5FFB4304F90481DF495872A2DB30DD19CA82
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __i64tow__itow__swprintf
                                                                            • String ID: %.15g$0x%p$False$True
                                                                            • API String ID: 421087845-2263619337
                                                                            • Opcode ID: 56fa3d7c5d78829861e4281bd57c72ae46ca2ca450afb85088522343e9ed343c
                                                                            • Instruction ID: efa3fd834fead1a22ae5c00d46fef9ef27f9971e691b8616186cbc51f84c3720
                                                                            • Opcode Fuzzy Hash: 56fa3d7c5d78829861e4281bd57c72ae46ca2ca450afb85088522343e9ed343c
                                                                            • Instruction Fuzzy Hash: FC41D471A04209AFDF28EF78DC42E7A73F8EB65300F24446EE549D7291EB719A51CB11
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001E778F
                                                                            • CreateMenu.USER32 ref: 001E77AA
                                                                            • SetMenu.USER32(?,00000000), ref: 001E77B9
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001E7846
                                                                            • IsMenu.USER32(?), ref: 001E785C
                                                                            • CreatePopupMenu.USER32 ref: 001E7866
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001E7893
                                                                            • DrawMenuBar.USER32 ref: 001E789B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                            • String ID: 0$F
                                                                            • API String ID: 176399719-3044882817
                                                                            • Opcode ID: bd8ac5bf2704a5ec7d43883f4047ea56ebbbace23c97eb5c933b1975b1f7620b
                                                                            • Instruction ID: 6c74b910430d7c42fed0c9c9ab55cb4b2a93b2832aeef260544cc919a9300a5d
                                                                            • Opcode Fuzzy Hash: bd8ac5bf2704a5ec7d43883f4047ea56ebbbace23c97eb5c933b1975b1f7620b
                                                                            • Instruction Fuzzy Hash: 414166B4A04609EFEB20EF65D888EAABBB5FF58340F140029F945A73A1C770A910DF50
                                                                            APIs
                                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 001E7B83
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 001E7B8A
                                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 001E7B9D
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 001E7BA5
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 001E7BB0
                                                                            • DeleteDC.GDI32(00000000), ref: 001E7BB9
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 001E7BC3
                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 001E7BD7
                                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 001E7BE3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                            • String ID: static
                                                                            • API String ID: 2559357485-2160076837
                                                                            • Opcode ID: 3f056755f10b2d2ba13b29c7de689b28caed2cfca851489f03607054605eab62
                                                                            • Instruction ID: c8def9a662c70d4f3a7d3cbfbd9c22e4abfb27ebff718c3a07870b6acade9f1a
                                                                            • Opcode Fuzzy Hash: 3f056755f10b2d2ba13b29c7de689b28caed2cfca851489f03607054605eab62
                                                                            • Instruction Fuzzy Hash: 54316732108618ABEF129F65DC49FEF3B69FF0D320F100215FA59A21A1C731E861DBA0
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0018706B
                                                                              • Part of subcall function 00188D58: __getptd_noexit.LIBCMT ref: 00188D58
                                                                            • __gmtime64_s.LIBCMT ref: 00187104
                                                                            • __gmtime64_s.LIBCMT ref: 0018713A
                                                                            • __gmtime64_s.LIBCMT ref: 00187157
                                                                            • __allrem.LIBCMT ref: 001871AD
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001871C9
                                                                            • __allrem.LIBCMT ref: 001871E0
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001871FE
                                                                            • __allrem.LIBCMT ref: 00187215
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00187233
                                                                            • __invoke_watson.LIBCMT ref: 001872A4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                            • String ID:
                                                                            • API String ID: 384356119-0
                                                                            • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                            • Instruction ID: 0a351b023e0a1d83726557d04e2d6eacffdba0daabfcb798775dbd4414d71fee
                                                                            • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                            • Instruction Fuzzy Hash: 7771EA71A04717ABDB14FE79CC81B5AB3A9AF61364F24422AF524E76C1E770DB408F90
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001C2CE9
                                                                            • GetMenuItemInfoW.USER32(00227890,000000FF,00000000,00000030), ref: 001C2D4A
                                                                            • SetMenuItemInfoW.USER32(00227890,00000004,00000000,00000030), ref: 001C2D80
                                                                            • Sleep.KERNEL32(000001F4), ref: 001C2D92
                                                                            • GetMenuItemCount.USER32(?), ref: 001C2DD6
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 001C2DF2
                                                                            • GetMenuItemID.USER32(?,-00000001), ref: 001C2E1C
                                                                            • GetMenuItemID.USER32(?,?), ref: 001C2E61
                                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001C2EA7
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001C2EBB
                                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001C2EDC
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                            • String ID:
                                                                            • API String ID: 4176008265-0
                                                                            • Opcode ID: 9597cdac00347aa5b9b31f95621d227e4ac44fc4236ae5c31c29954ab96be178
                                                                            • Instruction ID: aa291a590f4aef5634108cfa616977de56ce0b969a0d1418031d56b81f640919
                                                                            • Opcode Fuzzy Hash: 9597cdac00347aa5b9b31f95621d227e4ac44fc4236ae5c31c29954ab96be178
                                                                            • Instruction Fuzzy Hash: 596199B0900249AFDB21DFA4DC88EBEBBB9EB25304F14415DF841A7261D771EE46DB20
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001E75CA
                                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 001E75CD
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001E75F1
                                                                            • _memset.LIBCMT ref: 001E7602
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001E7614
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 001E768C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LongWindow_memset
                                                                            • String ID:
                                                                            • API String ID: 830647256-0
                                                                            • Opcode ID: dbed883141b75cbfb3c2810e8945a7b2f9e1dad0e38902f2c65c53fa4b7ee679
                                                                            • Instruction ID: d84aec2ac8f6da01fbcddc3f3307b25fafa897a77be321d7ccb3dec0f3a95b90
                                                                            • Opcode Fuzzy Hash: dbed883141b75cbfb3c2810e8945a7b2f9e1dad0e38902f2c65c53fa4b7ee679
                                                                            • Instruction Fuzzy Hash: 86617A75904688AFEB21DFA4CC85EEE77F8EF09710F140199FA14A72A1D770AE41DB60
                                                                            APIs
                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 001B77DD
                                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 001B7836
                                                                            • VariantInit.OLEAUT32(?), ref: 001B7848
                                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 001B7868
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 001B78BB
                                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 001B78CF
                                                                            • VariantClear.OLEAUT32(?), ref: 001B78E4
                                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 001B78F1
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001B78FA
                                                                            • VariantClear.OLEAUT32(?), ref: 001B790C
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001B7917
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                            • String ID:
                                                                            • API String ID: 2706829360-0
                                                                            • Opcode ID: 7834df47c7710b3f9cac9ce4f2b10dace44a741ed4cb6fbf601764530da0a4a3
                                                                            • Instruction ID: 728d9d86226b1f864d733f9fc899e7d204c83d6a75c0541e661aa4146b10adf2
                                                                            • Opcode Fuzzy Hash: 7834df47c7710b3f9cac9ce4f2b10dace44a741ed4cb6fbf601764530da0a4a3
                                                                            • Instruction Fuzzy Hash: 36415335A00119EFCB05DFA5DC489EDBBB9FF58354F008069E955A7661CB30A985CF90
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 001C0530
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 001C05B1
                                                                            • GetKeyState.USER32(000000A0), ref: 001C05CC
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 001C05E6
                                                                            • GetKeyState.USER32(000000A1), ref: 001C05FB
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 001C0613
                                                                            • GetKeyState.USER32(00000011), ref: 001C0625
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 001C063D
                                                                            • GetKeyState.USER32(00000012), ref: 001C064F
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 001C0667
                                                                            • GetKeyState.USER32(0000005B), ref: 001C0679
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 1caa20ff639000d55f7f688b69a001ee1fa6d229eda9ecd2e9488fa2d83e0397
                                                                            • Instruction ID: dd7b47dc9546ac89cb891e0d705e71e75d484cb1ad6d30df9a77ca379c1e9f94
                                                                            • Opcode Fuzzy Hash: 1caa20ff639000d55f7f688b69a001ee1fa6d229eda9ecd2e9488fa2d83e0397
                                                                            • Instruction Fuzzy Hash: D341B8705047D9AEFF338B648804BB5BEA06B79304F08415DD5C6465C2EBE5D9D8CF92
                                                                            APIs
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • CoInitialize.OLE32 ref: 001D8AED
                                                                            • CoUninitialize.OLE32 ref: 001D8AF8
                                                                            • CoCreateInstance.OLE32(?,00000000,00000017,001F3BBC,?), ref: 001D8B58
                                                                            • IIDFromString.OLE32(?,?), ref: 001D8BCB
                                                                            • VariantInit.OLEAUT32(?), ref: 001D8C65
                                                                            • VariantClear.OLEAUT32(?), ref: 001D8CC6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                            • API String ID: 834269672-1287834457
                                                                            • Opcode ID: d9346901ceaf3a1ba0a70543aaed6e95c4c3ebc92227a1d6522e2ba214040abb
                                                                            • Instruction ID: 00399d925633033d79256b7044aa5f72387fa045029a03b1997c1b402f7d95e6
                                                                            • Opcode Fuzzy Hash: d9346901ceaf3a1ba0a70543aaed6e95c4c3ebc92227a1d6522e2ba214040abb
                                                                            • Instruction Fuzzy Hash: 9D618D70618711EFC711DF54C889FAAB7E8AF59714F11084AF9859B391CB70ED48CBA2
                                                                            APIs
                                                                              • Part of subcall function 0017436A: _wcscpy.LIBCMT ref: 0017438D
                                                                            • _memset.LIBCMT ref: 001C332E
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001C335D
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001C3410
                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 001C343E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                            • String ID: 0$0$0$HS$HS
                                                                            • API String ID: 4152858687-3960795418
                                                                            • Opcode ID: b943ed5809507739e9d02543e3d80a71af297037f3a9090a4b2d6583d9b78493
                                                                            • Instruction ID: 5010057493822a1ce30e917360be4f2d9beb8da243f940a6422042761f8e07a9
                                                                            • Opcode Fuzzy Hash: b943ed5809507739e9d02543e3d80a71af297037f3a9090a4b2d6583d9b78493
                                                                            • Instruction Fuzzy Hash: 1251B131608311ABD71AAF28D845F6BB7E8AF65720F04862DF8A5D31A1DB70DE44CB53
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 001CBB13
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 001CBB89
                                                                            • GetLastError.KERNEL32 ref: 001CBB93
                                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 001CBC00
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 4194297153-14809454
                                                                            • Opcode ID: 52e4b88abb5d781c54051e3a1d2d4ae377052e0577d1aeeb299e318475d35f36
                                                                            • Instruction ID: 645081ad99ef98aae06f55d2c5770e0fc48d08dd18add0cbdbd2ca3f45e37d0a
                                                                            • Opcode Fuzzy Hash: 52e4b88abb5d781c54051e3a1d2d4ae377052e0577d1aeeb299e318475d35f36
                                                                            • Instruction Fuzzy Hash: FB318035A04209AFCB11DF68C886FA9B7B8EF65310F14816AE805D7295DB71DD41CB51
                                                                            APIs
                                                                            • LoadIconW.USER32(00000000,00007F03), ref: 001C357C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoad
                                                                            • String ID: ,z"0z"$,z"0z"$blank$info$question$stop$warning
                                                                            • API String ID: 2457776203-2161303208
                                                                            • Opcode ID: f88e8cdd46ecd02dcea7d23208937e3ae79f85b5c494e86c2aaccd030f94a65f
                                                                            • Instruction ID: a7ff3b5bbeebbad95e59476f7461a9a4d4909e313f85eda4406ada3c0bf4a7b7
                                                                            • Opcode Fuzzy Hash: f88e8cdd46ecd02dcea7d23208937e3ae79f85b5c494e86c2aaccd030f94a65f
                                                                            • Instruction Fuzzy Hash: 4F113D71648346BEE7069A14DC82EBA77ECDF36B60B20401EF92456181E7E4EF405AA0
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 001B9BCC
                                                                            • GetDlgCtrlID.USER32 ref: 001B9BD7
                                                                            • GetParent.USER32 ref: 001B9BF3
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 001B9BF6
                                                                            • GetDlgCtrlID.USER32(?), ref: 001B9BFF
                                                                            • GetParent.USER32(?), ref: 001B9C1B
                                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 001B9C1E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 1536045017-1403004172
                                                                            • Opcode ID: 5ac475528cb697c3f841ad0bc50e20f3dec35b2b621b13c2a97d31189eb49b18
                                                                            • Instruction ID: 25bdcaa110781389679989491110d8c1f06f897cd74e4a04edebeb3d60213b70
                                                                            • Opcode Fuzzy Hash: 5ac475528cb697c3f841ad0bc50e20f3dec35b2b621b13c2a97d31189eb49b18
                                                                            • Instruction Fuzzy Hash: 7B21CFB4A00104BFCF05EBA4CC85EFEBBB9EFA9310F104155F965972E2DB748965DA20
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 001B9CB5
                                                                            • GetDlgCtrlID.USER32 ref: 001B9CC0
                                                                            • GetParent.USER32 ref: 001B9CDC
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 001B9CDF
                                                                            • GetDlgCtrlID.USER32(?), ref: 001B9CE8
                                                                            • GetParent.USER32(?), ref: 001B9D04
                                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 001B9D07
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 1536045017-1403004172
                                                                            • Opcode ID: ac8c52ed66999f1bcdd8d52deaf007c672892ee770c7560c1e059275fcc04153
                                                                            • Instruction ID: 55751f494dbaf699be1bc48e4440d7ced5279efff306d4442b91e1d2fef47b2c
                                                                            • Opcode Fuzzy Hash: ac8c52ed66999f1bcdd8d52deaf007c672892ee770c7560c1e059275fcc04153
                                                                            • Instruction Fuzzy Hash: 9C21D0B5E00104BBDF11EBA5CC85EFEBBB9EFA9310F104111F951932A2DB758965DA20
                                                                            APIs
                                                                            • GetParent.USER32 ref: 001B9D27
                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 001B9D3C
                                                                            • _wcscmp.LIBCMT ref: 001B9D4E
                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 001B9DC9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameParentSend_wcscmp
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 1704125052-3381328864
                                                                            • Opcode ID: 3d72a8668ac777fbd3b6c9248b2f5b1c8a3ee6a3acab078df1441444443a534d
                                                                            • Instruction ID: 9957c1c9d3507830f0e61866bb1ff6f1cb883fab58cf03bc18841b7ba63cfc49
                                                                            • Opcode Fuzzy Hash: 3d72a8668ac777fbd3b6c9248b2f5b1c8a3ee6a3acab078df1441444443a534d
                                                                            • Instruction Fuzzy Hash: 4A112CB664C306BAF6057661EC06DE673DCDF25B70B200016FB10A40D1FFD56BA25A51
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 001D8FC1
                                                                            • CoInitialize.OLE32(00000000), ref: 001D8FEE
                                                                            • CoUninitialize.OLE32 ref: 001D8FF8
                                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 001D90F8
                                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 001D9225
                                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,001F3BDC), ref: 001D9259
                                                                            • CoGetObject.OLE32(?,00000000,001F3BDC,?), ref: 001D927C
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 001D928F
                                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 001D930F
                                                                            • VariantClear.OLEAUT32(?), ref: 001D931F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2395222682-0
                                                                            • Opcode ID: 4e85b1151b4b6140ccd893849ff6b3153a2b42ccf8cb0947db0579bd77cd40ac
                                                                            • Instruction ID: c568a71caaed43fb426fe9652be8a837eb67b52fd8b73dc3805a3289241c6c75
                                                                            • Opcode Fuzzy Hash: 4e85b1151b4b6140ccd893849ff6b3153a2b42ccf8cb0947db0579bd77cd40ac
                                                                            • Instruction Fuzzy Hash: FBC124B1608305AFC700DF68C88496AB7E9FF89748F00495DF98A9B351DB71ED05CB92
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 001C19EF
                                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1A03
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 001C1A0A
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1A19
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 001C1A2B
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1A44
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1A56
                                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1A9B
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1AB0
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,001C0A67,?,00000001), ref: 001C1ABB
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: 734b7a8367beb78a51423896bcdaac62b5592d1bf210d4d79a5b7c62889facdf
                                                                            • Instruction ID: 081b1c8ef7843ea2fc37539f9eabe27f3c4cc5527eabb7c619039a09de429bd6
                                                                            • Opcode Fuzzy Hash: 734b7a8367beb78a51423896bcdaac62b5592d1bf210d4d79a5b7c62889facdf
                                                                            • Instruction Fuzzy Hash: 5231BD71642244BFEB219F94ED48FB977AABB7A315F108159F800C7992DBB4DD80CB60
                                                                            APIs
                                                                            • GetSysColor.USER32(00000008), ref: 0016260D
                                                                            • SetTextColor.GDI32(?,000000FF), ref: 00162617
                                                                            • SetBkMode.GDI32(?,00000001), ref: 0016262C
                                                                            • GetStockObject.GDI32(00000005), ref: 00162634
                                                                            • GetClientRect.USER32(?), ref: 0019C0FC
                                                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0019C113
                                                                            • GetWindowDC.USER32(?), ref: 0019C11F
                                                                            • GetPixel.GDI32(00000000,?,?), ref: 0019C12E
                                                                            • ReleaseDC.USER32(?,00000000), ref: 0019C140
                                                                            • GetSysColor.USER32(00000005), ref: 0019C15E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                                            • String ID:
                                                                            • API String ID: 3430376129-0
                                                                            • Opcode ID: cb8a359a7bb0ba23ae68340b583e5b997c87af93817e747a777eac5052abaa39
                                                                            • Instruction ID: 0b12be373e8ffcad3635ff2e711220c50c22b7e899bdbe67ab9afd3d7f6f5fb3
                                                                            • Opcode Fuzzy Hash: cb8a359a7bb0ba23ae68340b583e5b997c87af93817e747a777eac5052abaa39
                                                                            • Instruction Fuzzy Hash: A6116731504204BFDB625FA4EC08BF97BA2EB08321F104221FA6A950E2CB7249A1EF51
                                                                            APIs
                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0016ADE1
                                                                            • OleUninitialize.OLE32(?,00000000), ref: 0016AE80
                                                                            • UnregisterHotKey.USER32(?), ref: 0016AFD7
                                                                            • DestroyWindow.USER32(?), ref: 001A2F64
                                                                            • FreeLibrary.KERNEL32(?), ref: 001A2FC9
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 001A2FF6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                            • String ID: close all
                                                                            • API String ID: 469580280-3243417748
                                                                            • Opcode ID: 0e78bf9da138a461a6b7870fe3d53832ce93bd43d4beb5dde22a8f89af28dfe2
                                                                            • Instruction ID: 96e08d9c2dc01f0d3da13ac9d182e8153751cb9db05de88a89db9d26198f148e
                                                                            • Opcode Fuzzy Hash: 0e78bf9da138a461a6b7870fe3d53832ce93bd43d4beb5dde22a8f89af28dfe2
                                                                            • Instruction Fuzzy Hash: 03A17B747012128FCB2AEF54C994B29F774BF15700F5582ADF80AAB252CB31AD66CF91
                                                                            APIs
                                                                            • EnumChildWindows.USER32(?,001BB13A), ref: 001BB078
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ChildEnumWindows
                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                            • API String ID: 3555792229-1603158881
                                                                            • Opcode ID: 2552cfcfbf3b7e9b13255fa7ec408abbca4faaf0a2cad145f7690ffbb9d5e940
                                                                            • Instruction ID: 807178f232e90e2f375e5dcd7e133a8281fb2d8811e655a4fff460df04cf0854
                                                                            • Opcode Fuzzy Hash: 2552cfcfbf3b7e9b13255fa7ec408abbca4faaf0a2cad145f7690ffbb9d5e940
                                                                            • Instruction Fuzzy Hash: BC91A770600606EACB59FFA4C481BFEFB75BF14300F948119E96EA7151DF30AA99CB91
                                                                            APIs
                                                                            • SetWindowLongW.USER32(?,000000EB), ref: 0016327E
                                                                              • Part of subcall function 0016218F: GetClientRect.USER32(?,?), ref: 001621B8
                                                                              • Part of subcall function 0016218F: GetWindowRect.USER32(?,?), ref: 001621F9
                                                                              • Part of subcall function 0016218F: ScreenToClient.USER32(?,?), ref: 00162221
                                                                            • GetDC.USER32 ref: 0019D073
                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0019D086
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0019D094
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0019D0A9
                                                                            • ReleaseDC.USER32(?,00000000), ref: 0019D0B1
                                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0019D13C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                            • String ID: U
                                                                            • API String ID: 4009187628-3372436214
                                                                            • Opcode ID: 0af3adc9f424d9e4480df599c90e6d8888c02b44319f86c3d937efe7551052f1
                                                                            • Instruction ID: b159ab7c9771fc0aaaef1c05bac73725af1175c4b5a162d84d950541c024e234
                                                                            • Opcode Fuzzy Hash: 0af3adc9f424d9e4480df599c90e6d8888c02b44319f86c3d937efe7551052f1
                                                                            • Instruction Fuzzy Hash: 5B71FF31404205EFCF258FA4EC84ABA7BB5FF49360F184269FD659A1A6C7318892DF60
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                              • Part of subcall function 00162714: GetCursorPos.USER32(?), ref: 00162727
                                                                              • Part of subcall function 00162714: ScreenToClient.USER32(002277B0,?), ref: 00162744
                                                                              • Part of subcall function 00162714: GetAsyncKeyState.USER32(00000001), ref: 00162769
                                                                              • Part of subcall function 00162714: GetAsyncKeyState.USER32(00000002), ref: 00162777
                                                                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 001EC69C
                                                                            • ImageList_EndDrag.COMCTL32 ref: 001EC6A2
                                                                            • ReleaseCapture.USER32 ref: 001EC6A8
                                                                            • SetWindowTextW.USER32(?,00000000), ref: 001EC752
                                                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 001EC765
                                                                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 001EC847
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                            • API String ID: 1924731296-2107944366
                                                                            • Opcode ID: 384cc90291ff6121e682371d6ad7aea317fef31ff90642d96683b7ff3e52aaa3
                                                                            • Instruction ID: edf5c79f5e605b12265ab750565bcc031882875fcdab8c71fb0aed2392f504b8
                                                                            • Opcode Fuzzy Hash: 384cc90291ff6121e682371d6ad7aea317fef31ff90642d96683b7ff3e52aaa3
                                                                            • Instruction Fuzzy Hash: CD51B970608240AFD715EF64DC5AFAE7BE1FB98310F008519F995872E2CB70A956CB92
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001D211C
                                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 001D2148
                                                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 001D218A
                                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 001D219F
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001D21AC
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 001D21DC
                                                                            • InternetCloseHandle.WININET(00000000), ref: 001D2223
                                                                              • Part of subcall function 001D2B4F: GetLastError.KERNEL32(?,?,001D1EE3,00000000,00000000,00000001), ref: 001D2B64
                                                                              • Part of subcall function 001D2B4F: SetEvent.KERNEL32(?,?,001D1EE3,00000000,00000000,00000001), ref: 001D2B79
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                            • String ID:
                                                                            • API String ID: 2603140658-3916222277
                                                                            • Opcode ID: 1b8bb45435087f9078530f35c97f951da1342ecd11cdd725268e40b55a0261f7
                                                                            • Instruction ID: 69a630916568e21f85d1a8a76533dfd11549d4a32f4e3ce6fd106fe59c1bbf5b
                                                                            • Opcode Fuzzy Hash: 1b8bb45435087f9078530f35c97f951da1342ecd11cdd725268e40b55a0261f7
                                                                            • Instruction Fuzzy Hash: F2418FB1500218BFEB169F50CC89FBB7BACEF28354F104157FA259A241D7B4AE45CBA0
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,001F0980), ref: 001D9412
                                                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,001F0980), ref: 001D9446
                                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 001D95C0
                                                                            • SysFreeString.OLEAUT32(?), ref: 001D95EA
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                            • String ID:
                                                                            • API String ID: 560350794-0
                                                                            • Opcode ID: f2143bd452e67004c0ef50cad3fe8149fe221ed8faea3ea8ff00a4fec00aa2e2
                                                                            • Instruction ID: 5ca8075593d42d8f10a7770a31e00615924609bba8d976ddd0bb129a38f4d72f
                                                                            • Opcode Fuzzy Hash: f2143bd452e67004c0ef50cad3fe8149fe221ed8faea3ea8ff00a4fec00aa2e2
                                                                            • Instruction Fuzzy Hash: D1F12A75A00209EFCF15DFA4C884EAEB7B9FF49314F10809AF516AB251DB31AE45CB50
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001DFD9E
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001DFF31
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001DFF55
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001DFF95
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001DFFB7
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001E0133
                                                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 001E0165
                                                                            • CloseHandle.KERNEL32(?), ref: 001E0194
                                                                            • CloseHandle.KERNEL32(?), ref: 001E020B
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                            • String ID:
                                                                            • API String ID: 4090791747-0
                                                                            • Opcode ID: b7ac54660d795ec21869c27f94968b4380a1ec3ab66838b37be66a5bda98d1ae
                                                                            • Instruction ID: dee81cb580e3a71796bace3a3c79fb53bd674a035f8dfb31e5e8d11a77b5d011
                                                                            • Opcode Fuzzy Hash: b7ac54660d795ec21869c27f94968b4380a1ec3ab66838b37be66a5bda98d1ae
                                                                            • Instruction Fuzzy Hash: 2BE1BC312046419FC716EF24C891B6EBBE1EF99350F14846DF88A9B2A2CB71ED41CB52
                                                                            APIs
                                                                              • Part of subcall function 001C4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001C3B8A,?), ref: 001C4BE0
                                                                              • Part of subcall function 001C4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001C3B8A,?), ref: 001C4BF9
                                                                              • Part of subcall function 001C4FEC: GetFileAttributesW.KERNEL32(?,001C3BFE), ref: 001C4FED
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 001C52FB
                                                                            • _wcscmp.LIBCMT ref: 001C5315
                                                                            • MoveFileW.KERNEL32(?,?), ref: 001C5330
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 793581249-0
                                                                            • Opcode ID: 6a189df252d99dc9d9f4d262382ac7e7c5bae9fabaf037e90f1d222280cc1b3b
                                                                            • Instruction ID: 7375b0df2de59489c24c28db1af20d1d25e6883857fa593d7f2267ab05b82938
                                                                            • Opcode Fuzzy Hash: 6a189df252d99dc9d9f4d262382ac7e7c5bae9fabaf037e90f1d222280cc1b3b
                                                                            • Instruction Fuzzy Hash: 4D5152B10087859BC725EBA4D881EDBB7ECAFA4300F50491EF589C3152EF34E688C756
                                                                            APIs
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 001E8D24
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InvalidateRect
                                                                            • String ID:
                                                                            • API String ID: 634782764-0
                                                                            • Opcode ID: 93414ca10d20654732ad08f93c733a62ba8622ed85233d7c0852e1ab85bcdec4
                                                                            • Instruction ID: 4201715708160ed06bd7010cbb1d474f20af137b2253c9960ceef586dbc5deb4
                                                                            • Opcode Fuzzy Hash: 93414ca10d20654732ad08f93c733a62ba8622ed85233d7c0852e1ab85bcdec4
                                                                            • Instruction Fuzzy Hash: 9551C230640A84BFEF349F6ACC89BAD7BA4BB15320F244515F919E71E1CF71A990DB60
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0019C638
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0019C65A
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0019C672
                                                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0019C690
                                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0019C6B1
                                                                            • DestroyIcon.USER32(00000000), ref: 0019C6C0
                                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0019C6DD
                                                                            • DestroyIcon.USER32(?), ref: 0019C6EC
                                                                              • Part of subcall function 001EAAD4: DeleteObject.GDI32(00000000), ref: 001EAB0D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                            • String ID:
                                                                            • API String ID: 2819616528-0
                                                                            • Opcode ID: 5169b216cec3b001c1c1c434bd0992a907c71797283ebc23717ad65236ed3b03
                                                                            • Instruction ID: 3338755636c8b837d70b17789c883ff821462476f35d56fb5db4f2bc25424ffb
                                                                            • Opcode Fuzzy Hash: 5169b216cec3b001c1c1c434bd0992a907c71797283ebc23717ad65236ed3b03
                                                                            • Instruction Fuzzy Hash: 61516970A04609AFDB24DF24DC45BAA77B5EB58710F104568F982E76A0DB70EDA0DB90
                                                                            APIs
                                                                              • Part of subcall function 001BB52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001BB54D
                                                                              • Part of subcall function 001BB52D: GetCurrentThreadId.KERNEL32 ref: 001BB554
                                                                              • Part of subcall function 001BB52D: AttachThreadInput.USER32(00000000,?,001BA23B,?,00000001), ref: 001BB55B
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 001BA246
                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001BA263
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 001BA266
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 001BA26F
                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 001BA28D
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 001BA290
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 001BA299
                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 001BA2B0
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 001BA2B3
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                            • String ID:
                                                                            • API String ID: 2014098862-0
                                                                            • Opcode ID: 14d3c18c9c0d8bc8514c0077e5c215c6b799265ac7b632f1cb3a0f2f61cc9cb6
                                                                            • Instruction ID: af4f0e7502f03fa0aa0e76ae2e1a4e12b28f956bb10e2075cd3a16605da88aea
                                                                            • Opcode Fuzzy Hash: 14d3c18c9c0d8bc8514c0077e5c215c6b799265ac7b632f1cb3a0f2f61cc9cb6
                                                                            • Instruction Fuzzy Hash: 4F11C2B1550218BEF7116B609C89FBA3A1DDB4C760F510415F240AB491CBF29C90DAA0
                                                                            APIs
                                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,001B915A,00000B00,?,?), ref: 001B94E2
                                                                            • HeapAlloc.KERNEL32(00000000,?,001B915A,00000B00,?,?), ref: 001B94E9
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001B915A,00000B00,?,?), ref: 001B94FE
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,001B915A,00000B00,?,?), ref: 001B9506
                                                                            • DuplicateHandle.KERNEL32(00000000,?,001B915A,00000B00,?,?), ref: 001B9509
                                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,001B915A,00000B00,?,?), ref: 001B9519
                                                                            • GetCurrentProcess.KERNEL32(001B915A,00000000,?,001B915A,00000B00,?,?), ref: 001B9521
                                                                            • DuplicateHandle.KERNEL32(00000000,?,001B915A,00000B00,?,?), ref: 001B9524
                                                                            • CreateThread.KERNEL32(00000000,00000000,001B954A,00000000,00000000,00000000), ref: 001B953E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                            • String ID:
                                                                            • API String ID: 1957940570-0
                                                                            • Opcode ID: d46e4c68528c4772317bad60230b70cc252ad64e81be80fadf17499c09092dc1
                                                                            • Instruction ID: 9f4fce86c1357cf8aad894f14cb865bd6281946e953d74e1f5b119e71601c859
                                                                            • Opcode Fuzzy Hash: d46e4c68528c4772317bad60230b70cc252ad64e81be80fadf17499c09092dc1
                                                                            • Instruction Fuzzy Hash: 5F01B6B5244308BFE711ABA5DC4DF6B7BACEB89711F418411FA05DB6A2CA71D850CB20
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-572801152
                                                                            • Opcode ID: 6eba183e0027504bebb15cc8033479dd27e9eaf26ce49b84b1485fc9b3300ca2
                                                                            • Instruction ID: 62848eee883882654f6974a3c30aaea9424b50159954afa66618aad8c7ea8e68
                                                                            • Opcode Fuzzy Hash: 6eba183e0027504bebb15cc8033479dd27e9eaf26ce49b84b1485fc9b3300ca2
                                                                            • Instruction Fuzzy Hash: 4CC1A371A0021AAFDF14CFA8D884AAEB7B5FF58314F54846AE905A7380E770ED45CB51
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$_memset
                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                            • API String ID: 2862541840-625585964
                                                                            • Opcode ID: de8f1570af6bd0af80ede119badd3ed521e30e823d13cb960b1bd3f63caffa08
                                                                            • Instruction ID: 1070cd4e2d6cc0082b7d42975579f05077c8d1cd98ff24f4704abbc99013a924
                                                                            • Opcode Fuzzy Hash: de8f1570af6bd0af80ede119badd3ed521e30e823d13cb960b1bd3f63caffa08
                                                                            • Instruction Fuzzy Hash: AF919D71A00219ABDF28CFA5C898FEEBBB8EF45714F10855EF515AB281D7709944CFA0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 001E7449
                                                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 001E745D
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 001E7477
                                                                            • _wcscat.LIBCMT ref: 001E74D2
                                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 001E74E9
                                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001E7517
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window_wcscat
                                                                            • String ID: SysListView32
                                                                            • API String ID: 307300125-78025650
                                                                            • Opcode ID: f249dc3a3d8aa9afaade2c887bc1c5e5044e0e2d2d542c3d51063aeabfa65306
                                                                            • Instruction ID: a3f7074fb6ba4523303ad8459c2376fc9b5c539507355a280981471b20a9e2c9
                                                                            • Opcode Fuzzy Hash: f249dc3a3d8aa9afaade2c887bc1c5e5044e0e2d2d542c3d51063aeabfa65306
                                                                            • Instruction Fuzzy Hash: 37416F71A04348AFEB229F65CC85BEEB7E8EF08350F10442AF985A71D2D7719D94CB50
                                                                            APIs
                                                                              • Part of subcall function 001C4148: CreateToolhelp32Snapshot.KERNEL32 ref: 001C416D
                                                                              • Part of subcall function 001C4148: Process32FirstW.KERNEL32(00000000,?), ref: 001C417B
                                                                              • Part of subcall function 001C4148: CloseHandle.KERNEL32(00000000), ref: 001C4245
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001DF08D
                                                                            • GetLastError.KERNEL32 ref: 001DF0A0
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001DF0CF
                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 001DF14C
                                                                            • GetLastError.KERNEL32(00000000), ref: 001DF157
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001DF18C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 2533919879-2896544425
                                                                            • Opcode ID: 3cb2b40717d686a5a15829fd108ed4f87471589d3057d3aa776a2f564b215126
                                                                            • Instruction ID: 0f9284d064eaab05f83c9c50df3520c5c12758f7a469a0a1bd539bcc5c2802b2
                                                                            • Opcode Fuzzy Hash: 3cb2b40717d686a5a15829fd108ed4f87471589d3057d3aa776a2f564b215126
                                                                            • Instruction Fuzzy Hash: 5841C070200201AFD725EF64CC95F6EB7A5AFA4714F04801DF8064B3D2CB74AD56CB95
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 001C4802
                                                                            • LoadStringW.USER32(00000000), ref: 001C4809
                                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 001C481F
                                                                            • LoadStringW.USER32(00000000), ref: 001C4826
                                                                            • _wprintf.LIBCMT ref: 001C484C
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001C486A
                                                                            Strings
                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 001C4847
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message_wprintf
                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                            • API String ID: 3648134473-3128320259
                                                                            • Opcode ID: 958e4b1fa616c2af502038a1d5e76f6d6b2861145a4a0f3894a3a2df0af6ebb0
                                                                            • Instruction ID: ba800790664722690089727d177a65704ffa9840ef760a31cdb71731e1de72f9
                                                                            • Opcode Fuzzy Hash: 958e4b1fa616c2af502038a1d5e76f6d6b2861145a4a0f3894a3a2df0af6ebb0
                                                                            • Instruction Fuzzy Hash: FC014FF29042087FE712E7A09D89EF6776CE708310F4405A5B749E2042EB749E948B75
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • GetSystemMetrics.USER32(0000000F), ref: 001EDB42
                                                                            • GetSystemMetrics.USER32(0000000F), ref: 001EDB62
                                                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 001EDD9D
                                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 001EDDBB
                                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 001EDDDC
                                                                            • ShowWindow.USER32(00000003,00000000), ref: 001EDDFB
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 001EDE20
                                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 001EDE43
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                            • String ID:
                                                                            • API String ID: 1211466189-0
                                                                            • Opcode ID: 0e3a8c697c580f0cf7c27243bfee1d0568a6712f95543e911c132a82c0f6acdd
                                                                            • Instruction ID: 0da40641fc5e4425afee7b81a727ea1f8c1c169c90455b800ca5ea95ab28cabd
                                                                            • Opcode Fuzzy Hash: 0e3a8c697c580f0cf7c27243bfee1d0568a6712f95543e911c132a82c0f6acdd
                                                                            • Instruction Fuzzy Hash: 83B19830600655AFCF18CF6AD9897BD7BB1FF48710F088069EC489F295D771A990CB90
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001E147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001E040D,?,?), ref: 001E1491
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001E044E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharConnectRegistryUpper_memmove
                                                                            • String ID:
                                                                            • API String ID: 3479070676-0
                                                                            • Opcode ID: 69877fac3c38299d14382fed14bc85f640a43b2b1fe28fdc5a3c52c6a769be1d
                                                                            • Instruction ID: 1cdaa581c1cf9fb9480d62a47f5e7cdf02f00b882c232495b4fd0a11d80cef62
                                                                            • Opcode Fuzzy Hash: 69877fac3c38299d14382fed14bc85f640a43b2b1fe28fdc5a3c52c6a769be1d
                                                                            • Instruction Fuzzy Hash: 21A19C70204201AFC712EF65C881B6EB7F5BF98314F14891CF59A8B2A2DB71E995CF42
                                                                            APIs
                                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0019C508,00000004,00000000,00000000,00000000), ref: 00162E9F
                                                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0019C508,00000004,00000000,00000000,00000000,000000FF), ref: 00162EE7
                                                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0019C508,00000004,00000000,00000000,00000000), ref: 0019C55B
                                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0019C508,00000004,00000000,00000000,00000000), ref: 0019C5C7
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: 83f2d0c7d746a43a94a50b1adb16a5f417b18f02597853c08f55dff04dbdc896
                                                                            • Instruction ID: 58b117e5a950ca97da7d2054d484877a1740afe565779df7bfdfc7121262a7c0
                                                                            • Opcode Fuzzy Hash: 83f2d0c7d746a43a94a50b1adb16a5f417b18f02597853c08f55dff04dbdc896
                                                                            • Instruction Fuzzy Hash: 42412D30708F809ADB399B2CCDCC77A7B92AB95311F65842DE48746961C772B8A0D761
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 001C7698
                                                                              • Part of subcall function 00180FE6: std::exception::exception.LIBCMT ref: 0018101C
                                                                              • Part of subcall function 00180FE6: __CxxThrowException@8.LIBCMT ref: 00181031
                                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 001C76CF
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 001C76EB
                                                                            • _memmove.LIBCMT ref: 001C7739
                                                                            • _memmove.LIBCMT ref: 001C7756
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 001C7765
                                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 001C777A
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 001C7799
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 256516436-0
                                                                            • Opcode ID: e24ed0e3426aac5e63d3004e8f610358d9f14746efd2fa27c287c134bb53e230
                                                                            • Instruction ID: d1727f8c5b99b0eec9dc0edb3a8839893433470c9983b429c052394e68c380eb
                                                                            • Opcode Fuzzy Hash: e24ed0e3426aac5e63d3004e8f610358d9f14746efd2fa27c287c134bb53e230
                                                                            • Instruction Fuzzy Hash: 2E31B472904209EBCB11EF54DC89EBEB778EF59700B2480A9F904AB256DB70DE54CF60
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 001E6810
                                                                            • GetDC.USER32(00000000), ref: 001E6818
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001E6823
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 001E682F
                                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 001E686B
                                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001E687C
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,001E964F,?,?,000000FF,00000000,?,000000FF,?), ref: 001E68B6
                                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 001E68D6
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3864802216-0
                                                                            • Opcode ID: b13931a3db15fdf5cfc9307ba5cab43f6d7b8e964dc854277f372303048ec200
                                                                            • Instruction ID: 7c5690cc159c1bb91f198bed734200f1899a58d87c2dd00fb9c76211913842fd
                                                                            • Opcode Fuzzy Hash: b13931a3db15fdf5cfc9307ba5cab43f6d7b8e964dc854277f372303048ec200
                                                                            • Instruction Fuzzy Hash: 88315A72101654BFEB118F118C8AFBA3BADEF59761F044065FE089A292C7759C91CBB0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: cee5e90b8e5ef72d7d768a6d733020fde00bf5167a4f31cbee1f22e618812088
                                                                            • Instruction ID: 4edb9442eb5b00ac4ccd95c4330d17ab9dcb4847d1ec5d691eae8bce6af89982
                                                                            • Opcode Fuzzy Hash: cee5e90b8e5ef72d7d768a6d733020fde00bf5167a4f31cbee1f22e618812088
                                                                            • Instruction Fuzzy Hash: F621A1736012097AD60876219D86FFB376CBF25794B184025FE16A6242FB90DF128AE1
                                                                            APIs
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                              • Part of subcall function 0017436A: _wcscpy.LIBCMT ref: 0017438D
                                                                            • _wcstok.LIBCMT ref: 001CF2D7
                                                                            • _wcscpy.LIBCMT ref: 001CF366
                                                                            • _memset.LIBCMT ref: 001CF399
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                            • String ID: X
                                                                            • API String ID: 774024439-3081909835
                                                                            • Opcode ID: 6ce65cd66d9dae6443e92c2f820c5cc18b3f3bc264e77ec37c6dadc2128c1511
                                                                            • Instruction ID: 627a8fdf4e7aaff721ec86a05c35129960762dac7e0df179982e646d21be157f
                                                                            • Opcode Fuzzy Hash: 6ce65cd66d9dae6443e92c2f820c5cc18b3f3bc264e77ec37c6dadc2128c1511
                                                                            • Instruction Fuzzy Hash: A5C18F71504341AFC714EF68C881E6AB7F5BFA5350F10892DF999972A2DB30ED46CB82
                                                                            APIs
                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 001D72EB
                                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 001D730C
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D731F
                                                                            • htons.WSOCK32(?,?,?,00000000,?), ref: 001D73D5
                                                                            • inet_ntoa.WSOCK32(?), ref: 001D7392
                                                                              • Part of subcall function 001BB4EA: _strlen.LIBCMT ref: 001BB4F4
                                                                              • Part of subcall function 001BB4EA: _memmove.LIBCMT ref: 001BB516
                                                                            • _strlen.LIBCMT ref: 001D742F
                                                                            • _memmove.LIBCMT ref: 001D7498
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                            • String ID:
                                                                            • API String ID: 3619996494-0
                                                                            • Opcode ID: 34fc0a43678be510fbc7e23bba0650d9c1a2557036a27becb286884d07aa0040
                                                                            • Instruction ID: 405e2dddbd921cfc212c651b5807b80ff870d9a2e8abba0691066ee8f719471e
                                                                            • Opcode Fuzzy Hash: 34fc0a43678be510fbc7e23bba0650d9c1a2557036a27becb286884d07aa0040
                                                                            • Instruction Fuzzy Hash: A581DF71508200ABC315EB24DC92E6BB7A8EFA4714F10861DF9569B3D2EB70ED01CB91
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f9c8b5736db33de10620b4aaf758ebb5f7815f90d030f92395717f4efd6009d1
                                                                            • Instruction ID: 0202aff5128202ca7dbcc099645665771b7de100844b27a966fc28c270ccada7
                                                                            • Opcode Fuzzy Hash: f9c8b5736db33de10620b4aaf758ebb5f7815f90d030f92395717f4efd6009d1
                                                                            • Instruction Fuzzy Hash: 44715C74900109FFCB09CF58CC89ABEBB79FF85315F198159F915AB251C730AA61DBA0
                                                                            APIs
                                                                            • IsWindow.USER32(00EB52A8), ref: 001EBA5D
                                                                            • IsWindowEnabled.USER32(00EB52A8), ref: 001EBA69
                                                                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 001EBB4D
                                                                            • SendMessageW.USER32(00EB52A8,000000B0,?,?), ref: 001EBB84
                                                                            • IsDlgButtonChecked.USER32(?,?), ref: 001EBBC1
                                                                            • GetWindowLongW.USER32(00EB52A8,000000EC), ref: 001EBBE3
                                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 001EBBFB
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                            • String ID:
                                                                            • API String ID: 4072528602-0
                                                                            • Opcode ID: 57be4bcc4cf298492134794d9aec2dfcf329a2c5cf39a378e9453a603b888071
                                                                            • Instruction ID: abb091348872f584380c426c8cdc1451c80ee9d9c15512d1f5495801983df9b0
                                                                            • Opcode Fuzzy Hash: 57be4bcc4cf298492134794d9aec2dfcf329a2c5cf39a378e9453a603b888071
                                                                            • Instruction Fuzzy Hash: D371BC34608A84AFDF259F56C8D4FBFBBA9EF99310F140069E94597261C731AC50DB60
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001DFB31
                                                                            • _memset.LIBCMT ref: 001DFBFA
                                                                            • ShellExecuteExW.SHELL32(?), ref: 001DFC3F
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                              • Part of subcall function 0017436A: _wcscpy.LIBCMT ref: 0017438D
                                                                            • GetProcessId.KERNEL32(00000000), ref: 001DFCB6
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001DFCE5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                            • String ID: @
                                                                            • API String ID: 3522835683-2766056989
                                                                            • Opcode ID: ec342e14458ed8618bb2a28f1d01e46e461e15abe0280d9933bd264033f74975
                                                                            • Instruction ID: be18871f8d93c52f567b3f6da1e72b4bb0753767be90af8ad9db45e50fe18959
                                                                            • Opcode Fuzzy Hash: ec342e14458ed8618bb2a28f1d01e46e461e15abe0280d9933bd264033f74975
                                                                            • Instruction Fuzzy Hash: 4F61AD75A00619DFCB15EF94C8909AEB7F5FF59310F14846EE81AAB351CB30AE52CB90
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 001C178B
                                                                            • GetKeyboardState.USER32(?), ref: 001C17A0
                                                                            • SetKeyboardState.USER32(?), ref: 001C1801
                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 001C182F
                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 001C184E
                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 001C1894
                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 001C18B7
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 03fd43509142a1d47d2a61c699b82c3a302944f619638237a87a8a2476e0fde9
                                                                            • Instruction ID: 1e698c34c04e8703234cf56aa62546c8e60dde20bec73afaf37480b8ded35d22
                                                                            • Opcode Fuzzy Hash: 03fd43509142a1d47d2a61c699b82c3a302944f619638237a87a8a2476e0fde9
                                                                            • Instruction Fuzzy Hash: 6A51C0A0A887D53EFB3682248C15FBA7EE96B27704F08858DE0D5468D3C3A9E8D5D750
                                                                            APIs
                                                                            • GetParent.USER32(00000000), ref: 001C15A4
                                                                            • GetKeyboardState.USER32(?), ref: 001C15B9
                                                                            • SetKeyboardState.USER32(?), ref: 001C161A
                                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 001C1646
                                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 001C1663
                                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 001C16A7
                                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 001C16C8
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: c056e7eebd862f6f4d38ba64068b3443cd923c32c378b5796b63aed93eaacb72
                                                                            • Instruction ID: 41bd34d4200696232e2761ec48ee1472884747c81afc476f81b59170769ce19c
                                                                            • Opcode Fuzzy Hash: c056e7eebd862f6f4d38ba64068b3443cd923c32c378b5796b63aed93eaacb72
                                                                            • Instruction Fuzzy Hash: C851D2A09847E53DFB3287248C15FBABEA95B27300F0C848DE0D5468D3C795EC95E750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsncpy$LocalTime
                                                                            • String ID:
                                                                            • API String ID: 2945705084-0
                                                                            • Opcode ID: 901b7c74fbecac3a43bc71a79acf3f8cee535ef13c83c5e473e66e3dcad43fa2
                                                                            • Instruction ID: 15fb97072eb354357f7132e7207e31f6da50efd32e4beedfa7a4e38ef9ce1c1f
                                                                            • Opcode Fuzzy Hash: 901b7c74fbecac3a43bc71a79acf3f8cee535ef13c83c5e473e66e3dcad43fa2
                                                                            • Instruction Fuzzy Hash: EB41AE65C1061876CB11BBF48C46ADFB3B9EF25310F108856F919E3121EB34E7558BA9
                                                                            APIs
                                                                              • Part of subcall function 001C4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001C3B8A,?), ref: 001C4BE0
                                                                              • Part of subcall function 001C4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001C3B8A,?), ref: 001C4BF9
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 001C3BAA
                                                                            • _wcscmp.LIBCMT ref: 001C3BC6
                                                                            • MoveFileW.KERNEL32(?,?), ref: 001C3BDE
                                                                            • _wcscat.LIBCMT ref: 001C3C26
                                                                            • SHFileOperationW.SHELL32(?), ref: 001C3C92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 1377345388-1173974218
                                                                            • Opcode ID: 35d2be7f3d34bb50d612e158f2a8fc10660fb3aae836487edca5ccbff86ecaf7
                                                                            • Instruction ID: 141a96ac2a84c6865d6fdc90b54cab05022c6f670ed7a26625004de519b7c478
                                                                            • Opcode Fuzzy Hash: 35d2be7f3d34bb50d612e158f2a8fc10660fb3aae836487edca5ccbff86ecaf7
                                                                            • Instruction Fuzzy Hash: D9416C7150C344AAC752EB64C481FDFB7E8AFA9340F50492EF49AC3191EB34D688CB56
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001E78CF
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001E7976
                                                                            • IsMenu.USER32(?), ref: 001E798E
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001E79D6
                                                                            • DrawMenuBar.USER32 ref: 001E79E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                                                            • String ID: 0
                                                                            • API String ID: 3866635326-4108050209
                                                                            • Opcode ID: 246fc92e8555271161ffb455d02bbd82a3168a44781782e74467136b21a7fee5
                                                                            • Instruction ID: 8ee1accd558bc6da7c67de478696eb897ba5027e02b9741071abfeea274823fc
                                                                            • Opcode Fuzzy Hash: 246fc92e8555271161ffb455d02bbd82a3168a44781782e74467136b21a7fee5
                                                                            • Instruction Fuzzy Hash: 60416D71A08689EFEB20DF55D884EAEBBF5FF09324F044129E95597291C770AD90CF90
                                                                            APIs
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 001E1631
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001E165B
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 001E1712
                                                                              • Part of subcall function 001E1602: RegCloseKey.ADVAPI32(?), ref: 001E1678
                                                                              • Part of subcall function 001E1602: FreeLibrary.KERNEL32(?), ref: 001E16CA
                                                                              • Part of subcall function 001E1602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 001E16ED
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 001E16B5
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                            • String ID:
                                                                            • API String ID: 395352322-0
                                                                            • Opcode ID: 5678de6d3a3191dfa86b0f9a27480575aef28412fbb1ce3e571ec8a250530c50
                                                                            • Instruction ID: 4b03aa6cb33a89f66130a1cbea5434d93e6236186266f7ade528d6cf3fa60d35
                                                                            • Opcode Fuzzy Hash: 5678de6d3a3191dfa86b0f9a27480575aef28412fbb1ce3e571ec8a250530c50
                                                                            • Instruction Fuzzy Hash: 63313AB1900209BFDB15DF91DC89EFEB7BCEF08340F04016AF902A2151EB749E859BA4
                                                                            APIs
                                                                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 001E6911
                                                                            • GetWindowLongW.USER32(00EB52A8,000000F0), ref: 001E6944
                                                                            • GetWindowLongW.USER32(00EB52A8,000000F0), ref: 001E6979
                                                                            • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 001E69AB
                                                                            • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 001E69D5
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001E69E6
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001E6A00
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 2178440468-0
                                                                            • Opcode ID: 37c76d1c1f20636eb8c7a3462b376de92a93010ea97712b02f5c2c0a66679aff
                                                                            • Instruction ID: e2747116c36b9966e84b610dcb4282b35ae760929237a039e113d973bcb181b5
                                                                            • Opcode Fuzzy Hash: 37c76d1c1f20636eb8c7a3462b376de92a93010ea97712b02f5c2c0a66679aff
                                                                            • Instruction Fuzzy Hash: DA313831608590AFDB21CF59EC88F6837E1FB697A4F5911A4F5148B2B2CB72AC40DB51
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001BE2CA
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001BE2F0
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 001BE2F3
                                                                            • SysAllocString.OLEAUT32(?), ref: 001BE311
                                                                            • SysFreeString.OLEAUT32(?), ref: 001BE31A
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 001BE33F
                                                                            • SysAllocString.OLEAUT32(?), ref: 001BE34D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: 1a8207f4b2cc79c7a0f813be25dedbd55c42e135ad6270d21d112491922c8a73
                                                                            • Instruction ID: 00832fd9992fccc73b5ac43b62bb2bcffc604520252411908ffeed3316f41e98
                                                                            • Opcode Fuzzy Hash: 1a8207f4b2cc79c7a0f813be25dedbd55c42e135ad6270d21d112491922c8a73
                                                                            • Instruction Fuzzy Hash: 66214F76604219AF9B11DFA8DC88CFE77ECEB09360B448125FA14DB261D770AD858B60
                                                                            APIs
                                                                              • Part of subcall function 001D8475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 001D84A0
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 001D68B1
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D68C0
                                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 001D68F9
                                                                            • connect.WSOCK32(00000000,?,00000010), ref: 001D6902
                                                                            • WSAGetLastError.WSOCK32 ref: 001D690C
                                                                            • closesocket.WSOCK32(00000000), ref: 001D6935
                                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 001D694E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 910771015-0
                                                                            • Opcode ID: 86a7cbfe3e07f62298f8e755dd0e68996c26a71331347b507cbb7f6e76905bc4
                                                                            • Instruction ID: 618a8bd7cb7417cd0a1bd60bdb58fc00e9822eaf785900bb90486c4884384deb
                                                                            • Opcode Fuzzy Hash: 86a7cbfe3e07f62298f8e755dd0e68996c26a71331347b507cbb7f6e76905bc4
                                                                            • Instruction Fuzzy Hash: 8D31D471600218AFDB10AF64CC85FBE77ADEB58764F04802AFD05AB391CB74AC45DBA1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001BE3A5
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001BE3CB
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 001BE3CE
                                                                            • SysAllocString.OLEAUT32 ref: 001BE3EF
                                                                            • SysFreeString.OLEAUT32 ref: 001BE3F8
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 001BE412
                                                                            • SysAllocString.OLEAUT32(?), ref: 001BE420
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: 22430f57c91e24cb3e9370b1417c9b1f5e7b5e105ac90a24908ca1bcd1ba22d3
                                                                            • Instruction ID: 039b7b337bb399046aeee9fdfc7b9bcd1ba8a3c847f2537ffa92c9fcdfe6344b
                                                                            • Opcode Fuzzy Hash: 22430f57c91e24cb3e9370b1417c9b1f5e7b5e105ac90a24908ca1bcd1ba22d3
                                                                            • Instruction Fuzzy Hash: 89215635604204AFAB119FA8DC88DFE77ECEB0D360B018525FA15CB261D770ED81CB64
                                                                            APIs
                                                                              • Part of subcall function 00162111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0016214F
                                                                              • Part of subcall function 00162111: GetStockObject.GDI32(00000011), ref: 00162163
                                                                              • Part of subcall function 00162111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0016216D
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 001E7C57
                                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 001E7C64
                                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 001E7C6F
                                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 001E7C7E
                                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 001E7C8A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                            • String ID: Msctls_Progress32
                                                                            • API String ID: 1025951953-3636473452
                                                                            • Opcode ID: 7d5feb44a82cb40221c4b7df5b789d1f2772dbccbf86a7b7cfb28974a3131b7f
                                                                            • Instruction ID: 2071cba8ffe5da00c62955873399b0490d6dfa2dd0a25f9e0598e346e5cb090d
                                                                            • Opcode Fuzzy Hash: 7d5feb44a82cb40221c4b7df5b789d1f2772dbccbf86a7b7cfb28974a3131b7f
                                                                            • Instruction Fuzzy Hash: 7F11B6B1154219BEEF158F61CC85EEB7F5DEF08758F114114BA04A3090C7719C21DBA0
                                                                            APIs
                                                                            • __init_pointers.LIBCMT ref: 00189D16
                                                                              • Part of subcall function 001833B7: EncodePointer.KERNEL32(00000000), ref: 001833BA
                                                                              • Part of subcall function 001833B7: __initp_misc_winsig.LIBCMT ref: 001833D5
                                                                              • Part of subcall function 001833B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0018A0D0
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0018A0E4
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0018A0F7
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0018A10A
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0018A11D
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0018A130
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0018A143
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0018A156
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 0018A169
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0018A17C
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0018A18F
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0018A1A2
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0018A1B5
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0018A1C8
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0018A1DB
                                                                              • Part of subcall function 001833B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0018A1EE
                                                                            • __mtinitlocks.LIBCMT ref: 00189D1B
                                                                            • __mtterm.LIBCMT ref: 00189D24
                                                                              • Part of subcall function 00189D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00189D29,00187EFD,0021CD38,00000014), ref: 00189E86
                                                                              • Part of subcall function 00189D8C: _free.LIBCMT ref: 00189E8D
                                                                              • Part of subcall function 00189D8C: DeleteCriticalSection.KERNEL32(0R",?,?,00189D29,00187EFD,0021CD38,00000014), ref: 00189EAF
                                                                            • __calloc_crt.LIBCMT ref: 00189D49
                                                                            • __initptd.LIBCMT ref: 00189D6B
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00189D72
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                            • String ID:
                                                                            • API String ID: 3567560977-0
                                                                            • Opcode ID: 4a207980c8a08aa18576d5ea45c36084454924ecf51a4e877ccd38b8d3130c32
                                                                            • Instruction ID: f71359c705377adb5887e1453e9d5e558a2ece02c57624eeab4e1235ffd52a36
                                                                            • Opcode Fuzzy Hash: 4a207980c8a08aa18576d5ea45c36084454924ecf51a4e877ccd38b8d3130c32
                                                                            • Instruction Fuzzy Hash: ECF096325097116AE73977F47C0766A26D4DF51730F180719F455DA0D3EF119B424F94
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00184282,?), ref: 001841D3
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 001841DA
                                                                            • EncodePointer.KERNEL32(00000000), ref: 001841E6
                                                                            • DecodePointer.KERNEL32(00000001,00184282,?), ref: 00184203
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                            • String ID: RoInitialize$combase.dll
                                                                            • API String ID: 3489934621-340411864
                                                                            • Opcode ID: a1b44c8e37fcbecb53dd9889544fa00ab853ea7a0be621952b10523982505221
                                                                            • Instruction ID: 604f0b9943ee9aad35777add8666dea09b64ef966b5bed9001c6d3378cd60512
                                                                            • Opcode Fuzzy Hash: a1b44c8e37fcbecb53dd9889544fa00ab853ea7a0be621952b10523982505221
                                                                            • Instruction Fuzzy Hash: FAE012B0691722BFEB212BB0EC4DB283AA4BB28B06FA09424B515D50A1CBB551D6CF00
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,001841A8), ref: 001842A8
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 001842AF
                                                                            • EncodePointer.KERNEL32(00000000), ref: 001842BA
                                                                            • DecodePointer.KERNEL32(001841A8), ref: 001842D5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                            • String ID: RoUninitialize$combase.dll
                                                                            • API String ID: 3489934621-2819208100
                                                                            • Opcode ID: 341161c7914ba7513472af7b80837a1d30de6fac201fb7ba80fc5562b1df52b8
                                                                            • Instruction ID: 94a46d996e23ef52512792faf35512794c1b4e7b29d610770f9acc73a39d12da
                                                                            • Opcode Fuzzy Hash: 341161c7914ba7513472af7b80837a1d30de6fac201fb7ba80fc5562b1df52b8
                                                                            • Instruction Fuzzy Hash: B5E08C70540B11BFDB229FE0FC0DB203AA4B708B02F509114F104D54E0CBF04290CF10
                                                                            APIs
                                                                            • GetClientRect.USER32(?,?), ref: 001621B8
                                                                            • GetWindowRect.USER32(?,?), ref: 001621F9
                                                                            • ScreenToClient.USER32(?,?), ref: 00162221
                                                                            • GetClientRect.USER32(?,?), ref: 00162350
                                                                            • GetWindowRect.USER32(?,?), ref: 00162369
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$Client$Window$Screen
                                                                            • String ID:
                                                                            • API String ID: 1296646539-0
                                                                            • Opcode ID: a4c1012ea1ee1e362b9b0d183223e052a0fd08866e0aee61bc8784fab1e85349
                                                                            • Instruction ID: 80678de9d25067316cdbb61111e26713c8fed0962ace81699e22c3dfcfa857b0
                                                                            • Opcode Fuzzy Hash: a4c1012ea1ee1e362b9b0d183223e052a0fd08866e0aee61bc8784fab1e85349
                                                                            • Instruction Fuzzy Hash: 64B17C39900649DBDF14CFA8C9807EEB7B1FF08710F148529ED59EB255EB34AA60CB64
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 3253778849-0
                                                                            • Opcode ID: d64454222c26cb8bf762489de01ddacca6189937e32c11841e75ba2062f97503
                                                                            • Instruction ID: 5a3110c0429b7537bf6726b92a3daa0b9f35944f60d4b0a30306cc882fd94c6d
                                                                            • Opcode Fuzzy Hash: d64454222c26cb8bf762489de01ddacca6189937e32c11841e75ba2062f97503
                                                                            • Instruction Fuzzy Hash: 8B61BD3150029AABCB16FF64CC82FFE37A8AF25308F048559F8596B192DB35ED56CB50
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001E147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001E040D,?,?), ref: 001E1491
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001E091D
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001E095D
                                                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 001E0980
                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 001E09A9
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001E09EC
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 001E09F9
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                            • String ID:
                                                                            • API String ID: 4046560759-0
                                                                            • Opcode ID: a0881d9a12ef2724bda2183fd904cc3c2fd330dcfa01999239b0f7f8e5cde2ab
                                                                            • Instruction ID: eb153f883ee8b5f992ffc642f4c5213a0f9824a1a6c91173ab18952a673d48e3
                                                                            • Opcode Fuzzy Hash: a0881d9a12ef2724bda2183fd904cc3c2fd330dcfa01999239b0f7f8e5cde2ab
                                                                            • Instruction Fuzzy Hash: 59517831208240AFD715EF68C885E6EBBF9FF98314F04491DF489872A2DB71E945CB52
                                                                            APIs
                                                                            • GetMenu.USER32(?), ref: 001E5E38
                                                                            • GetMenuItemCount.USER32(00000000), ref: 001E5E6F
                                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001E5E97
                                                                            • GetMenuItemID.USER32(?,?), ref: 001E5F06
                                                                            • GetSubMenu.USER32(?,?), ref: 001E5F14
                                                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 001E5F65
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountMessagePostString
                                                                            • String ID:
                                                                            • API String ID: 650687236-0
                                                                            • Opcode ID: b7a9cef96e8107da94c34a2e81f1a7044d7c983528edc2ec974e1de7b0dac719
                                                                            • Instruction ID: 4615790faef4e5c0953343d53d8fba40e41f4f6881dee4f2fa07d9a26ef1b2f7
                                                                            • Opcode Fuzzy Hash: b7a9cef96e8107da94c34a2e81f1a7044d7c983528edc2ec974e1de7b0dac719
                                                                            • Instruction Fuzzy Hash: 3E51AC35A00A15AFCF11EFA5C845AAEBBB6EF58314F104059F811BB392CB30AE41CF90
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 001BF6A2
                                                                            • VariantClear.OLEAUT32(00000013), ref: 001BF714
                                                                            • VariantClear.OLEAUT32(00000000), ref: 001BF76F
                                                                            • _memmove.LIBCMT ref: 001BF799
                                                                            • VariantClear.OLEAUT32(?), ref: 001BF7E6
                                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 001BF814
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                                                            • String ID:
                                                                            • API String ID: 1101466143-0
                                                                            • Opcode ID: ecff92dac69ddd3e38121b6dd582d7badc1202c970dc60afd0fa8cf82b769ce2
                                                                            • Instruction ID: c6e1a8c641c91058d513a51db75cc6a79534273f4983f28bb859f9de69aae06e
                                                                            • Opcode Fuzzy Hash: ecff92dac69ddd3e38121b6dd582d7badc1202c970dc60afd0fa8cf82b769ce2
                                                                            • Instruction Fuzzy Hash: C75149B5A00209EFDB14CF58C884AAAB7B8FF4C354B15856EE959DB301D731E952CFA0
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001C29FF
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001C2A4A
                                                                            • IsMenu.USER32(00000000), ref: 001C2A6A
                                                                            • CreatePopupMenu.USER32 ref: 001C2A9E
                                                                            • GetMenuItemCount.USER32(000000FF), ref: 001C2AFC
                                                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 001C2B2D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                            • String ID:
                                                                            • API String ID: 3311875123-0
                                                                            • Opcode ID: 0ea2620f632fd22e6623ad8b945c83fa1cd28cd76add7c3e0d873fa6e022a6d3
                                                                            • Instruction ID: 7c1c30a822d5b138f0a91d22539dbda7804aebb05b64a4e40ff9590c062a65bc
                                                                            • Opcode Fuzzy Hash: 0ea2620f632fd22e6623ad8b945c83fa1cd28cd76add7c3e0d873fa6e022a6d3
                                                                            • Instruction Fuzzy Hash: C3518A7060020ADBDF25CF68D888FAEBBF5AF65314F14415DE8159B2A1D7B0DD44CB51
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 00161B76
                                                                            • GetWindowRect.USER32(?,?), ref: 00161BDA
                                                                            • ScreenToClient.USER32(?,?), ref: 00161BF7
                                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00161C08
                                                                            • EndPaint.USER32(?,?), ref: 00161C52
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                            • String ID:
                                                                            • API String ID: 1827037458-0
                                                                            • Opcode ID: 6ce27ce0f6b06ddc2057270f99ebf8fd9b66d77e5861a275bbc04eac865176a3
                                                                            • Instruction ID: 25739eecf78a7715fb846094619027ac6ac2aadc25e5c0a5590c9e31d678d2f1
                                                                            • Opcode Fuzzy Hash: 6ce27ce0f6b06ddc2057270f99ebf8fd9b66d77e5861a275bbc04eac865176a3
                                                                            • Instruction Fuzzy Hash: B241AE30108300BFDB21DF24DC88FBA7BF8EB59765F180669F995872A2C7309855DB62
                                                                            APIs
                                                                            • ShowWindow.USER32(002277B0,00000000,00EB52A8,?,?,002277B0,?,001EBC1A,?,?), ref: 001EBD84
                                                                            • EnableWindow.USER32(?,00000000), ref: 001EBDA8
                                                                            • ShowWindow.USER32(002277B0,00000000,00EB52A8,?,?,002277B0,?,001EBC1A,?,?), ref: 001EBE08
                                                                            • ShowWindow.USER32(?,00000004,?,001EBC1A,?,?), ref: 001EBE1A
                                                                            • EnableWindow.USER32(?,00000001), ref: 001EBE3E
                                                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 001EBE61
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 642888154-0
                                                                            • Opcode ID: 8bcbd7075546c2beb91a77f3694a274d8f71f8f52e0037cbe7cec24338206e12
                                                                            • Instruction ID: d1fa1c0cffd168bb722a819798ac5cb10dd049c4bf34bdb43dfeecea490ae2fc
                                                                            • Opcode Fuzzy Hash: 8bcbd7075546c2beb91a77f3694a274d8f71f8f52e0037cbe7cec24338206e12
                                                                            • Instruction Fuzzy Hash: 8C416534604584AFDB26CF55C8C9BEA7BF1FF05314F1841A9EA488F6A2C731AC45CB51
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,001D550C,?,?,00000000,00000001), ref: 001D7796
                                                                              • Part of subcall function 001D406C: GetWindowRect.USER32(?,?), ref: 001D407F
                                                                            • GetDesktopWindow.USER32 ref: 001D77C0
                                                                            • GetWindowRect.USER32(00000000), ref: 001D77C7
                                                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 001D77F9
                                                                              • Part of subcall function 001C57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 001C5877
                                                                            • GetCursorPos.USER32(?), ref: 001D7825
                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001D7883
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                            • String ID:
                                                                            • API String ID: 4137160315-0
                                                                            • Opcode ID: 6ea83a12f4519fe2c851a4f6586f5e6d6494cc030a2f9050b465f3844d79ceb2
                                                                            • Instruction ID: 9300fdf21d4907a1c56782d19e31747325b57d47b23a0e41318489fb1ea8c2c5
                                                                            • Opcode Fuzzy Hash: 6ea83a12f4519fe2c851a4f6586f5e6d6494cc030a2f9050b465f3844d79ceb2
                                                                            • Instruction Fuzzy Hash: B131C472508315ABD721DF14D849FABB7EAFF88314F00091AF58597192DB70E948CB92
                                                                            APIs
                                                                              • Part of subcall function 001B8CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001B8CDE
                                                                              • Part of subcall function 001B8CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001B8CE8
                                                                              • Part of subcall function 001B8CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001B8CF7
                                                                              • Part of subcall function 001B8CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001B8CFE
                                                                              • Part of subcall function 001B8CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001B8D14
                                                                            • GetLengthSid.ADVAPI32(?,00000000,001B904D), ref: 001B9482
                                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001B948E
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 001B9495
                                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 001B94AE
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,001B904D), ref: 001B94C2
                                                                            • HeapFree.KERNEL32(00000000), ref: 001B94C9
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                            • String ID:
                                                                            • API String ID: 3008561057-0
                                                                            • Opcode ID: 3524050e4485081ec8628856ad6199ce1138e4890ea0d6d54e1cc10d18d7e5db
                                                                            • Instruction ID: db75a8451caae5d45dfa68549f2926eb17ef60dbe5c9217d9e4701cf0fd7098c
                                                                            • Opcode Fuzzy Hash: 3524050e4485081ec8628856ad6199ce1138e4890ea0d6d54e1cc10d18d7e5db
                                                                            • Instruction Fuzzy Hash: 2B11A972601604FFDB119FA4CD09BFF7BA9EB49316F108058FA46D7210C73AA986CB60
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001B9200
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 001B9207
                                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 001B9216
                                                                            • CloseHandle.KERNEL32(00000004), ref: 001B9221
                                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001B9250
                                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 001B9264
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                            • String ID:
                                                                            • API String ID: 1413079979-0
                                                                            • Opcode ID: 92636ae499837c496188a9daab287bb92b90c585b5a89843c8e9afbadc5c4d72
                                                                            • Instruction ID: 68ddf4886ea8dc12b1852c6843dc0db57ad6cffb2f00426e01c8dd9cf03fa90a
                                                                            • Opcode Fuzzy Hash: 92636ae499837c496188a9daab287bb92b90c585b5a89843c8e9afbadc5c4d72
                                                                            • Instruction Fuzzy Hash: 2C11597250124EABDF029FA8ED49FEE7BA9EF48314F044054FE05A2160C7729DA1EB60
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 001BC34E
                                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 001BC35F
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001BC366
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 001BC36E
                                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 001BC385
                                                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 001BC397
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$Release
                                                                            • String ID:
                                                                            • API String ID: 1035833867-0
                                                                            • Opcode ID: 11753df5fd7fbd21597c77734f36aad3bfa226ebb7aeb33d46b88be656d38c38
                                                                            • Instruction ID: 90df54570223e0226a8c0e26f389e59b404f7439420903a45eeeaf3b0a3e3da6
                                                                            • Opcode Fuzzy Hash: 11753df5fd7fbd21597c77734f36aad3bfa226ebb7aeb33d46b88be656d38c38
                                                                            • Instruction Fuzzy Hash: 5C014475E00218BBEF119BA59C49A5EBFB8EB4C761F004065FA04E7291D7709D10CFA0
                                                                            APIs
                                                                              • Part of subcall function 001616CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00161729
                                                                              • Part of subcall function 001616CF: SelectObject.GDI32(?,00000000), ref: 00161738
                                                                              • Part of subcall function 001616CF: BeginPath.GDI32(?), ref: 0016174F
                                                                              • Part of subcall function 001616CF: SelectObject.GDI32(?,00000000), ref: 00161778
                                                                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 001EC57C
                                                                            • LineTo.GDI32(00000000,00000003,?), ref: 001EC590
                                                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 001EC59E
                                                                            • LineTo.GDI32(00000000,00000000,?), ref: 001EC5AE
                                                                            • EndPath.GDI32(00000000), ref: 001EC5BE
                                                                            • StrokePath.GDI32(00000000), ref: 001EC5CE
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                            • String ID:
                                                                            • API String ID: 43455801-0
                                                                            • Opcode ID: facbcd095604d4d56a79a07d6a55cde53fde6d67b4bf97f838c353b65bb9394c
                                                                            • Instruction ID: 888fb03bb33869b41f1403b7a41418a188439df7b9faaa07ecb8a59028f17006
                                                                            • Opcode Fuzzy Hash: facbcd095604d4d56a79a07d6a55cde53fde6d67b4bf97f838c353b65bb9394c
                                                                            • Instruction Fuzzy Hash: B0111B7600414CBFDF129F91DC88FAA7FADEF08394F048011BA185A161C771AE95DBA0
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 001807EC
                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 001807F4
                                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 001807FF
                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0018080A
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00180812
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0018081A
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual
                                                                            • String ID:
                                                                            • API String ID: 4278518827-0
                                                                            • Opcode ID: c568d846bda12a22b115aab7bb213c4f9a54f2f91c2e86d79fcfe826f720b7ab
                                                                            • Instruction ID: 4fd9304b2cf774a3ad058743f59745ebf1be5568bd2ef5e8d5f8053dced0040e
                                                                            • Opcode Fuzzy Hash: c568d846bda12a22b115aab7bb213c4f9a54f2f91c2e86d79fcfe826f720b7ab
                                                                            • Instruction Fuzzy Hash: DD016CB09017597DE3008F5A8C85B52FFE8FF59354F00411BA15C47942C7F5A864CBE5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 001C59B4
                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 001C59CA
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 001C59D9
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001C59E8
                                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001C59F2
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001C59F9
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: 1e8633af3b5dcb6d47f18a16f4658acb3349a477de7744d7b2dbf6caf41792cc
                                                                            • Instruction ID: e08c39709283fd91529979dd6c382cc081a08a1a2b6798a60c4c9fc65c2f00e8
                                                                            • Opcode Fuzzy Hash: 1e8633af3b5dcb6d47f18a16f4658acb3349a477de7744d7b2dbf6caf41792cc
                                                                            • Instruction Fuzzy Hash: 4EF06D32240158BBE3225B929C0DEFF7A3CEBCAB21F000159FA01D1451EBA05A91C6B5
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,?), ref: 001C77FE
                                                                            • EnterCriticalSection.KERNEL32(?,?,0016C2B6,?,?), ref: 001C780F
                                                                            • TerminateThread.KERNEL32(00000000,000001F6,?,0016C2B6,?,?), ref: 001C781C
                                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,0016C2B6,?,?), ref: 001C7829
                                                                              • Part of subcall function 001C71F0: CloseHandle.KERNEL32(00000000,?,001C7836,?,0016C2B6,?,?), ref: 001C71FA
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 001C783C
                                                                            • LeaveCriticalSection.KERNEL32(?,?,0016C2B6,?,?), ref: 001C7843
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3495660284-0
                                                                            • Opcode ID: c5b5730257d560ae7d796fe953eb1b59c0b5c08b3f0d7ac6525d8a5d0ccd5418
                                                                            • Instruction ID: ffdb48d8767f2abe7b5e9dfc6f7e363cb0447ae8f3fa3e7790f0109fc7627902
                                                                            • Opcode Fuzzy Hash: c5b5730257d560ae7d796fe953eb1b59c0b5c08b3f0d7ac6525d8a5d0ccd5418
                                                                            • Instruction Fuzzy Hash: 75F05E72145212AFD7122B64EC8CEBB7729FF59302B540429F202A54A2CBB59841CB60
                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 001B9555
                                                                            • UnloadUserProfile.USERENV(?,?), ref: 001B9561
                                                                            • CloseHandle.KERNEL32(?), ref: 001B956A
                                                                            • CloseHandle.KERNEL32(?), ref: 001B9572
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 001B957B
                                                                            • HeapFree.KERNEL32(00000000), ref: 001B9582
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                            • String ID:
                                                                            • API String ID: 146765662-0
                                                                            • Opcode ID: 574f8162d88093778407475f4422af17ca78aa74a1c7616633da7a244b702184
                                                                            • Instruction ID: 46d5b35685aed1254bbb6a0e105939c36030ffa83ccac3e6eacbc863f29dab7a
                                                                            • Opcode Fuzzy Hash: 574f8162d88093778407475f4422af17ca78aa74a1c7616633da7a244b702184
                                                                            • Instruction Fuzzy Hash: BFE07576108546BFDB422FE6EC0C97ABF79FF8D722B504621F21591871CB32A4A1DB50
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 001D8CFD
                                                                            • CharUpperBuffW.USER32(?,?), ref: 001D8E0C
                                                                            • VariantClear.OLEAUT32(?), ref: 001D8F84
                                                                              • Part of subcall function 001C7B1D: VariantInit.OLEAUT32(00000000), ref: 001C7B5D
                                                                              • Part of subcall function 001C7B1D: VariantCopy.OLEAUT32(00000000,?), ref: 001C7B66
                                                                              • Part of subcall function 001C7B1D: VariantClear.OLEAUT32(00000000), ref: 001C7B72
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                            • API String ID: 4237274167-1221869570
                                                                            • Opcode ID: 8aa4ed945a81bc789be5a04ca855eca1e20b84ca6a526842fbe711fd36df6917
                                                                            • Instruction ID: 8fd8d58c553a2dd8fc414aad2d0c1730e57c1a90289c7493c0fd45fde2dcc7ee
                                                                            • Opcode Fuzzy Hash: 8aa4ed945a81bc789be5a04ca855eca1e20b84ca6a526842fbe711fd36df6917
                                                                            • Instruction Fuzzy Hash: 50919F716043019FC714EF24C88095ABBF5EFA9714F14896EF88A8B3A1DB30E945CB52
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001C2F67
                                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 001C2F83
                                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 001C2FC9
                                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00227890,00000000), ref: 001C3012
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem_memset
                                                                            • String ID: 0
                                                                            • API String ID: 1173514356-4108050209
                                                                            • Opcode ID: 861964961e6e76d562c40f2a0bf1c6e89c250cef24c2490f376aa3c26fe67cae
                                                                            • Instruction ID: 57f36edf52977a8e30f50dc930f430ee7c51b6d35a6771e1ad2e1faa9f9bef3c
                                                                            • Opcode Fuzzy Hash: 861964961e6e76d562c40f2a0bf1c6e89c250cef24c2490f376aa3c26fe67cae
                                                                            • Instruction Fuzzy Hash: 2941B5322043419FD724DF24C885F5ABBE4AFA4710F14862DF965972D1D770EA15CB52
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 001B9ACC
                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 001B9ADF
                                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 001B9B0F
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_memmove$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 365058703-1403004172
                                                                            • Opcode ID: efa18fe0b1228271caf3882da55fb60083aab6d40c48e2e25d5fded2d0cd8048
                                                                            • Instruction ID: 06ae7a749eb037d0c7a6bf1cf5e72dcf078d1472837617b83002077669f70bf7
                                                                            • Opcode Fuzzy Hash: efa18fe0b1228271caf3882da55fb60083aab6d40c48e2e25d5fded2d0cd8048
                                                                            • Instruction Fuzzy Hash: 4F210571905104BFDB25EBB4DC86CFEBBB8DF65360F108119F925A72E1DB344D4A9620
                                                                            APIs
                                                                              • Part of subcall function 00162111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0016214F
                                                                              • Part of subcall function 00162111: GetStockObject.GDI32(00000011), ref: 00162163
                                                                              • Part of subcall function 00162111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0016216D
                                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 001E6A86
                                                                            • LoadLibraryW.KERNEL32(?), ref: 001E6A8D
                                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 001E6AA2
                                                                            • DestroyWindow.USER32(?), ref: 001E6AAA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                            • String ID: SysAnimate32
                                                                            • API String ID: 4146253029-1011021900
                                                                            • Opcode ID: 426ac41c045a3c174d34f5f059aa13276dd01b55f6ba01bf2927e55283e706eb
                                                                            • Instruction ID: eb023995fee1f7b0f95fc238dd7f603decd6cff3c9fcc641155e267c71742da3
                                                                            • Opcode Fuzzy Hash: 426ac41c045a3c174d34f5f059aa13276dd01b55f6ba01bf2927e55283e706eb
                                                                            • Instruction Fuzzy Hash: 1B21D471A00645AFEF208F65DC40EBF77ADEFA93A4F908628FA11A3190D371CC919760
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 001C7377
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001C73AA
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 001C73BC
                                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 001C73F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandle$FilePipe
                                                                            • String ID: nul
                                                                            • API String ID: 4209266947-2873401336
                                                                            • Opcode ID: 40c61ce75785bb271590439fd7478cb60d48cecf34027216db50414891deaac3
                                                                            • Instruction ID: cb4a121c31d202369bf96703bf3cd351e95f867c889295ff50575c5f2839fff6
                                                                            • Opcode Fuzzy Hash: 40c61ce75785bb271590439fd7478cb60d48cecf34027216db50414891deaac3
                                                                            • Instruction Fuzzy Hash: C3214F70508246ABDB209F69DC45FAA7BA8BF65720F204A1EFCA1D72D1D7B0D850DF60
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 001C7444
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001C7476
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 001C7487
                                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 001C74C1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandle$FilePipe
                                                                            • String ID: nul
                                                                            • API String ID: 4209266947-2873401336
                                                                            • Opcode ID: 8185275fdbbf4313e4fd4f5b203612cc84fe711041f3476d7e4650d6bb016ae4
                                                                            • Instruction ID: f28605b33cfdaa23a6d508efe8da3871dc1a9f7b1e4af92049522f23e2ebf414
                                                                            • Opcode Fuzzy Hash: 8185275fdbbf4313e4fd4f5b203612cc84fe711041f3476d7e4650d6bb016ae4
                                                                            • Instruction Fuzzy Hash: 8C2190716082069BDB249F689C45FAA7BA8AF65730F204A1DF9A0D72D1DBB0D850CF61
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 001CB297
                                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 001CB2EB
                                                                            • __swprintf.LIBCMT ref: 001CB304
                                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,001F0980), ref: 001CB342
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$InformationVolume__swprintf
                                                                            • String ID: %lu
                                                                            • API String ID: 3164766367-685833217
                                                                            • Opcode ID: 0ba0ec45f7ddf1383c1528d5368ceb3770f4c58b99c430c9f2f30c0a623bf9c6
                                                                            • Instruction ID: 2f3d66fb203623dfc73c66658047108a2404da8b67472f54c724570a564c3954
                                                                            • Opcode Fuzzy Hash: 0ba0ec45f7ddf1383c1528d5368ceb3770f4c58b99c430c9f2f30c0a623bf9c6
                                                                            • Instruction Fuzzy Hash: 4A214434A00109AFCB11DFA5CC85DAEB7B8EF59714B104069F505D7252DB71EA45CB61
                                                                            APIs
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                              • Part of subcall function 001BAA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 001BAA6F
                                                                              • Part of subcall function 001BAA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 001BAA82
                                                                              • Part of subcall function 001BAA52: GetCurrentThreadId.KERNEL32 ref: 001BAA89
                                                                              • Part of subcall function 001BAA52: AttachThreadInput.USER32(00000000), ref: 001BAA90
                                                                            • GetFocus.USER32 ref: 001BAC2A
                                                                              • Part of subcall function 001BAA9B: GetParent.USER32(?), ref: 001BAAA9
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 001BAC73
                                                                            • EnumChildWindows.USER32(?,001BACEB), ref: 001BAC9B
                                                                            • __swprintf.LIBCMT ref: 001BACB5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                            • String ID: %s%d
                                                                            • API String ID: 1941087503-1110647743
                                                                            • Opcode ID: 7803f358c1b91ab932af8c622864346cc9df4723e6a6fc2b65776c9d72289d0e
                                                                            • Instruction ID: b41347b976322b0c33a81afd30673d8f242ce3b39327eed26416e0867f974d6d
                                                                            • Opcode Fuzzy Hash: 7803f358c1b91ab932af8c622864346cc9df4723e6a6fc2b65776c9d72289d0e
                                                                            • Instruction Fuzzy Hash: C211AF75600205BBDF11BFA0CD85FEA37ACAF58710F008075FE48AA182DB709945DB72
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 001C2318
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                            • API String ID: 3964851224-769500911
                                                                            • Opcode ID: 76fed2d18b668414ee74feb35af55b6d5efaab5b371964fccee4b665af3b0b16
                                                                            • Instruction ID: f745e6f28a7f4ee896e690327dde7d70fce5e04f4ba5d58e372dcc113429d60b
                                                                            • Opcode Fuzzy Hash: 76fed2d18b668414ee74feb35af55b6d5efaab5b371964fccee4b665af3b0b16
                                                                            • Instruction Fuzzy Hash: 90113C30A1011CEBCF11EF94D9519EEB7B4FF39344B508569D814A7252EB369E1ACF50
                                                                            APIs
                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 001DF2F0
                                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 001DF320
                                                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 001DF453
                                                                            • CloseHandle.KERNEL32(?), ref: 001DF4D4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                            • String ID:
                                                                            • API String ID: 2364364464-0
                                                                            • Opcode ID: eed84870ab9e0762366a63b3757463a2bf1b09cf42ffabc64df09e619c575d95
                                                                            • Instruction ID: 29ce6926a44ec9a7cf747249facef8ef13b2222ced9b5d1e9df4515fbdbf5451
                                                                            • Opcode Fuzzy Hash: eed84870ab9e0762366a63b3757463a2bf1b09cf42ffabc64df09e619c575d95
                                                                            • Instruction Fuzzy Hash: 9E8191716003009FD721EF68DC82B2AB7E5AF68710F14881DF99A9B392D770ED418B51
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001E147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001E040D,?,?), ref: 001E1491
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001E075D
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001E079C
                                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 001E07E3
                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 001E080F
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 001E081C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                            • String ID:
                                                                            • API String ID: 3440857362-0
                                                                            • Opcode ID: 3756c00515ce229b5cf72b79f56a319b3e08841dfa0abdf64bb4523df2150bfa
                                                                            • Instruction ID: 9e20c16e5477a1363acb5e0f4a1d74072d0fd46c4303bcec37368c532692c825
                                                                            • Opcode Fuzzy Hash: 3756c00515ce229b5cf72b79f56a319b3e08841dfa0abdf64bb4523df2150bfa
                                                                            • Instruction Fuzzy Hash: C4515871608244AFD715EF68CC81E6EB7F9BF98304F04891DF599872A2DB70E944CB52
                                                                            APIs
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 001CEC62
                                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 001CEC8B
                                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 001CECCA
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 001CECEF
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 001CECF7
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 1389676194-0
                                                                            • Opcode ID: 7a25c6be0e03a9bef51282837bac6595964855e7bf43fffea6cff0b674cd6061
                                                                            • Instruction ID: ca1366d3083678fa9a3f80482501d2e4fa2dcffcb98b87486f7fae1dadb7db51
                                                                            • Opcode Fuzzy Hash: 7a25c6be0e03a9bef51282837bac6595964855e7bf43fffea6cff0b674cd6061
                                                                            • Instruction Fuzzy Hash: 1C51FA35A00505EFCB05EFA4C985EADBBF5EF19314B148099E809AB362CB31ED51DB61
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 85bb8286894c78d8b10019f2d15856424928bb59dcab0c18da1c8ddf5cc2d610
                                                                            • Instruction ID: 02d98c80e316246396b4ff8872548a3234772414aaef22d2bd2a0bf4d21471a8
                                                                            • Opcode Fuzzy Hash: 85bb8286894c78d8b10019f2d15856424928bb59dcab0c18da1c8ddf5cc2d610
                                                                            • Instruction Fuzzy Hash: 45411375D04584AFC724CB69CC88FAEBBB8EF09310F950165F816A32E2C771BD41DA51
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 00162727
                                                                            • ScreenToClient.USER32(002277B0,?), ref: 00162744
                                                                            • GetAsyncKeyState.USER32(00000001), ref: 00162769
                                                                            • GetAsyncKeyState.USER32(00000002), ref: 00162777
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 4210589936-0
                                                                            • Opcode ID: cf8549372f3a1475997ef21122f2864d389971cfed0b54784548b97acada3da1
                                                                            • Instruction ID: b0dd2a41afaeaad331e2729a0d40e7998e3e1c4707a425ff9746785f2d8ddae7
                                                                            • Opcode Fuzzy Hash: cf8549372f3a1475997ef21122f2864d389971cfed0b54784548b97acada3da1
                                                                            • Instruction Fuzzy Hash: C9415D75904519FFDF199F68CC44EE9FB74BB15364F10831AF86896290C730AEA0DB91
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 001B95E8
                                                                            • PostMessageW.USER32(?,00000201,00000001), ref: 001B9692
                                                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 001B969A
                                                                            • PostMessageW.USER32(?,00000202,00000000), ref: 001B96A8
                                                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 001B96B0
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: d85e0c231ba66309ddad1bc95c08ae99b5950bd52a57f8fb60ae4e9fda662a79
                                                                            • Instruction ID: 9ce816a15d8ea1feba9d0e34bb5d8d0b7663fde870b9e28ecf1ba1ceac497504
                                                                            • Opcode Fuzzy Hash: d85e0c231ba66309ddad1bc95c08ae99b5950bd52a57f8fb60ae4e9fda662a79
                                                                            • Instruction Fuzzy Hash: 8431BA71900219EBDB14CF68DD4CAEE3BB5EB48325F104229FA25EA2D1C3B0D964DB90
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 001BBD9D
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001BBDBA
                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001BBDF2
                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 001BBE18
                                                                            • _wcsstr.LIBCMT ref: 001BBE22
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                            • String ID:
                                                                            • API String ID: 3902887630-0
                                                                            • Opcode ID: d1624a44bc418266fbc914ede18c35ac683244bbfbb26c8882d9cc0beaa8642e
                                                                            • Instruction ID: 93d4425dd2da3a3b4040b36e71595f04015d08987401236cf5fdba9b37bc8e8d
                                                                            • Opcode Fuzzy Hash: d1624a44bc418266fbc914ede18c35ac683244bbfbb26c8882d9cc0beaa8642e
                                                                            • Instruction Fuzzy Hash: DD212972208204BBEB266B759C89EFF7B9CDF49760F104029F909DA1A1EBA5DD40D760
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 001EB804
                                                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 001EB829
                                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 001EB841
                                                                            • GetSystemMetrics.USER32(00000004), ref: 001EB86A
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,001D155C,00000000), ref: 001EB888
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$MetricsSystem
                                                                            • String ID:
                                                                            • API String ID: 2294984445-0
                                                                            • Opcode ID: 7f681c486b872512877cc56631bf38832aff31faf7cd0268c306122b3e7ffdb5
                                                                            • Instruction ID: 6ba421e281efd8c721b95c5471aa68c33c012ad8279fd86c40e43f01e8ff0641
                                                                            • Opcode Fuzzy Hash: 7f681c486b872512877cc56631bf38832aff31faf7cd0268c306122b3e7ffdb5
                                                                            • Instruction Fuzzy Hash: 9E2191319186A5AFCB249F3A9C48A6E37A8FB45725F154738F925D66E0D7308860DB80
                                                                            APIs
                                                                            • IsWindow.USER32(00000000), ref: 001D6159
                                                                            • GetForegroundWindow.USER32 ref: 001D6170
                                                                            • GetDC.USER32(00000000), ref: 001D61AC
                                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 001D61B8
                                                                            • ReleaseDC.USER32(00000000,00000003), ref: 001D61F3
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ForegroundPixelRelease
                                                                            • String ID:
                                                                            • API String ID: 4156661090-0
                                                                            • Opcode ID: cbeee831d3aa135c012ad5bc391e6b0ed82e7b032dcbc2b5d165095ad18688e8
                                                                            • Instruction ID: 42940ef3634abde7608754e8efae44f453a002b39b02b566f22aa12c74e13b3b
                                                                            • Opcode Fuzzy Hash: cbeee831d3aa135c012ad5bc391e6b0ed82e7b032dcbc2b5d165095ad18688e8
                                                                            • Instruction Fuzzy Hash: 0B216F75A00204AFDB14EF65DD84AAABBF9EF98350F048469F94AD7752CB30EC40CB90
                                                                            APIs
                                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00161729
                                                                            • SelectObject.GDI32(?,00000000), ref: 00161738
                                                                            • BeginPath.GDI32(?), ref: 0016174F
                                                                            • SelectObject.GDI32(?,00000000), ref: 00161778
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: 3abf76239143129548389331dba24909039f24056942e3252a5e41a4b4073553
                                                                            • Instruction ID: 6e0c0a5e33d80518f0187c6121a399118d0ecf3aeb95b443f6f94a2fd1877964
                                                                            • Opcode Fuzzy Hash: 3abf76239143129548389331dba24909039f24056942e3252a5e41a4b4073553
                                                                            • Instruction Fuzzy Hash: 3B21C53480C308FFDB219FA5FD4CBA97BA9F700351F184215F815961A0D77098A2DF92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: 84e185b6a2339d39c3aa4bdc7d670dbe464983fc588bb948035ed7d896c9f456
                                                                            • Instruction ID: e021b161b60856034bdaef7ec2b82880b6ac8a0023b540b5d46104d49969d3dd
                                                                            • Opcode Fuzzy Hash: 84e185b6a2339d39c3aa4bdc7d670dbe464983fc588bb948035ed7d896c9f456
                                                                            • Instruction Fuzzy Hash: 09019E73B001097BE21866119C96FFB736CBF70394B144026FF1696646F7A1DF1286E1
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 001C5075
                                                                            • __beginthreadex.LIBCMT ref: 001C5093
                                                                            • MessageBoxW.USER32(?,?,?,?), ref: 001C50A8
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001C50BE
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001C50C5
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                            • String ID:
                                                                            • API String ID: 3824534824-0
                                                                            • Opcode ID: 659577159e6f75ac3cec13068be182cab09056488845dce387bb1635d19e61c5
                                                                            • Instruction ID: 14b7705a1941f0b85c591ad18ba72ad778330b28e0024f1356625b6140cada1a
                                                                            • Opcode Fuzzy Hash: 659577159e6f75ac3cec13068be182cab09056488845dce387bb1635d19e61c5
                                                                            • Instruction Fuzzy Hash: 1D11E1B2908609BBC7119FA8AC08BAB7BADAB59320F14035AF814D3291D771D99087E1
                                                                            APIs
                                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B8E3C
                                                                            • GetLastError.KERNEL32(?,001B8900,?,?,?), ref: 001B8E46
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,001B8900,?,?,?), ref: 001B8E55
                                                                            • HeapAlloc.KERNEL32(00000000,?,001B8900,?,?,?), ref: 001B8E5C
                                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B8E73
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 842720411-0
                                                                            • Opcode ID: abd31b944c48bb2a361cdf5c6954d0857fcb1656dc4958ec36c3eb87c1320cfa
                                                                            • Instruction ID: 9bf0da01c40919eabe947ef31d3c68d84d5ac630888a43dec8bcd2d3a7adc4c7
                                                                            • Opcode Fuzzy Hash: abd31b944c48bb2a361cdf5c6954d0857fcb1656dc4958ec36c3eb87c1320cfa
                                                                            • Instruction Fuzzy Hash: 79013CB5611204BFDB215FA6DC88DBB7FADEF8A765B140569F849C2220DB31EC50CA60
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 001C581B
                                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 001C5829
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 001C5831
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 001C583B
                                                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 001C5877
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: 2b5dbb8dd8509e32627b8ce71f76371f01861bb28bef06f7d3e659b0f4f2ee2d
                                                                            • Instruction ID: 8e46ee153438804a6e510eb0a1a8ed4f9f9d43e8bb6dbcc4c8b17184b1480cea
                                                                            • Opcode Fuzzy Hash: 2b5dbb8dd8509e32627b8ce71f76371f01861bb28bef06f7d3e659b0f4f2ee2d
                                                                            • Instruction Fuzzy Hash: 1C015731C05A29DBDF04AFEAE848AEDBBB9BB1C711F41415AE401B2141CB30E5A0CBA1
                                                                            APIs
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,001B7C62,80070057,?,?,?,001B8073), ref: 001B7D45
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,001B7C62,80070057,?,?), ref: 001B7D60
                                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,001B7C62,80070057,?,?), ref: 001B7D6E
                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,001B7C62,80070057,?), ref: 001B7D7E
                                                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,001B7C62,80070057,?,?), ref: 001B7D8A
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3897988419-0
                                                                            • Opcode ID: eb28024dfcf4ccecd7ff956b3e89a034ea146e2a42c06d540f3762274ec362a8
                                                                            • Instruction ID: 67d5343c5d55c136df462c1cf8bd66255cf123eb556c617d678e265d1e755d94
                                                                            • Opcode Fuzzy Hash: eb28024dfcf4ccecd7ff956b3e89a034ea146e2a42c06d540f3762274ec362a8
                                                                            • Instruction Fuzzy Hash: BC012C76A05214ABDB124F94DC44BFA7BAEEF887D2F144024F909D6261D771EE40DBA0
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001B8CDE
                                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001B8CE8
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001B8CF7
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001B8CFE
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001B8D14
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: 3f40bd40f64f875367ccabb53a5838ef500e4b43583ae47c16b579646e961360
                                                                            • Instruction ID: 61214b834b2fb9d5a92d605b88dd0d056007d57cc922053ee3c97c22946e2088
                                                                            • Opcode Fuzzy Hash: 3f40bd40f64f875367ccabb53a5838ef500e4b43583ae47c16b579646e961360
                                                                            • Instruction Fuzzy Hash: 87F04F75200204AFEB121FE5DC89EB73BADEF4DB64B50452AF945C6191CB61DC81DB60
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001B8D3F
                                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D49
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D58
                                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D5F
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D75
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: 6ef6325643ec66616c9838a9b076601c30b5a08a7398df05632fc6562454b132
                                                                            • Instruction ID: 155bcc2ab8956f75e5a126eb1ee2a85b2bf75d970d51b65dff242689dfdfa3f2
                                                                            • Opcode Fuzzy Hash: 6ef6325643ec66616c9838a9b076601c30b5a08a7398df05632fc6562454b132
                                                                            • Instruction Fuzzy Hash: 78F0AF30210205AFEB120FA4EC88FB73BACEF49B54F140116F948C2190CB60DD80DB60
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 001BCD90
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 001BCDA7
                                                                            • MessageBeep.USER32(00000000), ref: 001BCDBF
                                                                            • KillTimer.USER32(?,0000040A), ref: 001BCDDB
                                                                            • EndDialog.USER32(?,00000001), ref: 001BCDF5
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 3741023627-0
                                                                            • Opcode ID: ed5f4473198b3213497a1b506813a9a2c56d69961f18d57bc4628a6d12eec359
                                                                            • Instruction ID: 7b9529ec87721957b9785e99a216cfb889e9ccb014b30402ce10b6c1fb9c7512
                                                                            • Opcode Fuzzy Hash: ed5f4473198b3213497a1b506813a9a2c56d69961f18d57bc4628a6d12eec359
                                                                            • Instruction Fuzzy Hash: 8A018674500704ABEB25AB64DD4EBE67B78FF04B15F000669F586A14E2DBF0A994CBC0
                                                                            APIs
                                                                            • EndPath.GDI32(?), ref: 0016179B
                                                                            • StrokeAndFillPath.GDI32(?,?,0019BBC9,00000000,?), ref: 001617B7
                                                                            • SelectObject.GDI32(?,00000000), ref: 001617CA
                                                                            • DeleteObject.GDI32 ref: 001617DD
                                                                            • StrokePath.GDI32(?), ref: 001617F8
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: f152620ead7edf80f918adec75aab53099801acc2af2b08c2c64efb4a9847ad3
                                                                            • Instruction ID: 045d299bf98ad46d64f576077681c472ae5e72fd2a56da50d444bd94448667ab
                                                                            • Opcode Fuzzy Hash: f152620ead7edf80f918adec75aab53099801acc2af2b08c2c64efb4a9847ad3
                                                                            • Instruction Fuzzy Hash: 2EF0EC3000D608FFDB265F69FC4CB693FA4A705366F189214F529555F1CB3189A6EF11
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 001CCA75
                                                                            • CoCreateInstance.OLE32(001F3D3C,00000000,00000001,001F3BAC,?), ref: 001CCA8D
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • CoUninitialize.OLE32 ref: 001CCCFA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                            • String ID: .lnk
                                                                            • API String ID: 2683427295-24824748
                                                                            • Opcode ID: 2757b4364697cbd9a1c87259f175032a422ab2e7bab79bc2b9ab9066d38e98ae
                                                                            • Instruction ID: 505be96606b3645cc0bdb589eeda5d539dbc9c37124dd188797496c31ca82e08
                                                                            • Opcode Fuzzy Hash: 2757b4364697cbd9a1c87259f175032a422ab2e7bab79bc2b9ab9066d38e98ae
                                                                            • Instruction Fuzzy Hash: 87A11AB1504205AFD300EF64CC91EABB7E8FFA5754F00491CF55997292EB70EA49CB92
                                                                            APIs
                                                                              • Part of subcall function 00180FE6: std::exception::exception.LIBCMT ref: 0018101C
                                                                              • Part of subcall function 00180FE6: __CxxThrowException@8.LIBCMT ref: 00181031
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 00171680: _memmove.LIBCMT ref: 001716DB
                                                                            • __swprintf.LIBCMT ref: 0016E598
                                                                            Strings
                                                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0016E431
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                            • API String ID: 1943609520-557222456
                                                                            • Opcode ID: 25c2bc364f80d8ba270cb736a8caaf4a043bab4a9ce5076773a8e5d1d928bf1f
                                                                            • Instruction ID: cae125d7a26a825dda0a5b997f6e9a886c015e564ad0230b51ab5a1096a7f354
                                                                            • Opcode Fuzzy Hash: 25c2bc364f80d8ba270cb736a8caaf4a043bab4a9ce5076773a8e5d1d928bf1f
                                                                            • Instruction Fuzzy Hash: 7F917175508301AFC714EF28C895C6EB7F9EFA5700F40491DF59A9B2A1EB20EE45CB52
                                                                            APIs
                                                                            • __startOneArgErrorHandling.LIBCMT ref: 001852CD
                                                                              • Part of subcall function 00190320: __87except.LIBCMT ref: 0019035B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorHandling__87except__start
                                                                            • String ID: pow
                                                                            • API String ID: 2905807303-2276729525
                                                                            • Opcode ID: b7a560a705e8c51d64658badab66de7f1dfa5ea77cf0d891fffda8c7be0fd467
                                                                            • Instruction ID: 0e2877d062a03396cf74c8663da924faa19869ab1cf6aa612c5dadd36ecebc0d
                                                                            • Opcode Fuzzy Hash: b7a560a705e8c51d64658badab66de7f1dfa5ea77cf0d891fffda8c7be0fd467
                                                                            • Instruction Fuzzy Hash: 92517961E09A01DFCF16B718C94137A3B92EB14750F208968F8C5876A9EF348EC4DF46
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #$+
                                                                            • API String ID: 0-2552117581
                                                                            • Opcode ID: 84bf11243978565e46748e4882ff301cb5cbbfeea6fa34ff71416b3637ac3c51
                                                                            • Instruction ID: dbee06428e28b9719f1d2b530e737acc54cfa2ef9630c9e40b488e61a390e605
                                                                            • Opcode Fuzzy Hash: 84bf11243978565e46748e4882ff301cb5cbbfeea6fa34ff71416b3637ac3c51
                                                                            • Instruction Fuzzy Hash: E6510175500359DFDB16EF68C880AFA7BB4EF6A310F144055F8919B2A0D738AD86CF60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$_memmove
                                                                            • String ID: ERCP
                                                                            • API String ID: 2532777613-1384759551
                                                                            • Opcode ID: 9446fc181a9ac10bf9191ecbed320353b956b0384fbea77a86c2e0f05ffaa40d
                                                                            • Instruction ID: 3b6efdac2833c41a182bcea3cc48fa8a7ac7a7dd1192a2c8b5a0800a07777f2a
                                                                            • Opcode Fuzzy Hash: 9446fc181a9ac10bf9191ecbed320353b956b0384fbea77a86c2e0f05ffaa40d
                                                                            • Instruction Fuzzy Hash: 5651C0B19007099FDB24CF64D8957EABBF8FF08310F24856EE84ADB251E7709685CB80
                                                                            APIs
                                                                              • Part of subcall function 001C1CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001B9E4E,?,?,00000034,00000800,?,00000034), ref: 001C1CE5
                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 001BA3F7
                                                                              • Part of subcall function 001C1C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001B9E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 001C1CB0
                                                                              • Part of subcall function 001C1BDD: GetWindowThreadProcessId.USER32(?,?), ref: 001C1C08
                                                                              • Part of subcall function 001C1BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001B9E12,00000034,?,?,00001004,00000000,00000000), ref: 001C1C18
                                                                              • Part of subcall function 001C1BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001B9E12,00000034,?,?,00001004,00000000,00000000), ref: 001C1C2E
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001BA464
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001BA4B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                            • String ID: @
                                                                            • API String ID: 4150878124-2766056989
                                                                            • Opcode ID: b50607339390f24fbcb3927c00e44a667b2b89c0bc8e0daacb5d24baf312b02d
                                                                            • Instruction ID: d4142400479052604d1eebcaaf79469420ca89aa3460ffdac911977d90452b97
                                                                            • Opcode Fuzzy Hash: b50607339390f24fbcb3927c00e44a667b2b89c0bc8e0daacb5d24baf312b02d
                                                                            • Instruction Fuzzy Hash: 5C412B7294021CBEDB10DBA4CD85FEEB7B8AF59310F044099FA55A7181DB70AE85CBA1
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 001E7A86
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 001E7A9A
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 001E7ABE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: SysMonthCal32
                                                                            • API String ID: 2326795674-1439706946
                                                                            • Opcode ID: f97c8dcc2ca384dcf6c7d8151e8dbe0bd539571513de0d6a11a832e3623e7ee3
                                                                            • Instruction ID: 2ce0e2d341030aea97b82e3f0c441df4c5b723454e9b31b015a7cca263d193fb
                                                                            • Opcode Fuzzy Hash: f97c8dcc2ca384dcf6c7d8151e8dbe0bd539571513de0d6a11a832e3623e7ee3
                                                                            • Instruction Fuzzy Hash: 2F21A032604258ABEF218E50CC46FEE3BA9EB98724F150114FE156B1D0D7B1A891CB90
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 001E826F
                                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 001E827D
                                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001E8284
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$DestroyWindow
                                                                            • String ID: msctls_updown32
                                                                            • API String ID: 4014797782-2298589950
                                                                            • Opcode ID: 8ef9996016930da45154fe37c9f98e6297d03b11c1372fc2b17762f3cf493702
                                                                            • Instruction ID: 04c6d0966ab1a02d91f41259c59c74c3bc41b918e761ac199210351497ff100b
                                                                            • Opcode Fuzzy Hash: 8ef9996016930da45154fe37c9f98e6297d03b11c1372fc2b17762f3cf493702
                                                                            • Instruction Fuzzy Hash: 9921B0B1604649AFDB10DF54DCC5DAB77EDEF6A3A4B040059FA049B261CB70EC11CBA0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 001E7360
                                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 001E7370
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 001E7395
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MoveWindow
                                                                            • String ID: Listbox
                                                                            • API String ID: 3315199576-2633736733
                                                                            • Opcode ID: 8b58267266787e6b1eff89c7d5d7d035c8362233ee05a9a532a2553c474733b6
                                                                            • Instruction ID: 3576ab3db17fc80dac35b4429ce59764d0cc1280c5f895cb20997967e382e313
                                                                            • Opcode Fuzzy Hash: 8b58267266787e6b1eff89c7d5d7d035c8362233ee05a9a532a2553c474733b6
                                                                            • Instruction Fuzzy Hash: ED21BE32614158BFEF128F55DC85EBF37AAEB89760F118124FA049B1E0C771AC519BA0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 001E7D97
                                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 001E7DAC
                                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 001E7DB9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: msctls_trackbar32
                                                                            • API String ID: 3850602802-1010561917
                                                                            • Opcode ID: 1a00a560d59e9935087caf13a79a3dc776d345932669d8a4a7edf47c037206ef
                                                                            • Instruction ID: 65b5713c4363b1871cb9fc00f27915b43e069741a81bf3675c6ccadc23e9b912
                                                                            • Opcode Fuzzy Hash: 1a00a560d59e9935087caf13a79a3dc776d345932669d8a4a7edf47c037206ef
                                                                            • Instruction Fuzzy Hash: C911E372244249BEEF249FA5CC45FEB77ADEF89B24F114118FA41A60D0D771A851CB20
                                                                            APIs
                                                                              • Part of subcall function 0019B544: _memset.LIBCMT ref: 0019B551
                                                                              • Part of subcall function 00180B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0019B520,?,?,?,0016100A), ref: 00180B79
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,0016100A), ref: 0019B524
                                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0016100A), ref: 0019B533
                                                                            Strings
                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0019B52E
                                                                            • = , xrefs: 0019B514
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$=
                                                                            • API String ID: 3158253471-3487347677
                                                                            • Opcode ID: dd8ddf5e22a0a21ecaefb05f851dcd383607ae2ac112ac68ac5ee60a306a757f
                                                                            • Instruction ID: 848ff6fd6fb7838cfe46d953014e4a277d644c1c9249651a9d74b32d3ab7e3ee
                                                                            • Opcode Fuzzy Hash: dd8ddf5e22a0a21ecaefb05f851dcd383607ae2ac112ac68ac5ee60a306a757f
                                                                            • Instruction Fuzzy Hash: 9AE092702083118FE731EF75F9487527BE4AF18704F01895DE446C2742DBB4D544CBA1
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,001A027A,?), ref: 001DC6E7
                                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 001DC6F9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                            • API String ID: 2574300362-1816364905
                                                                            • Opcode ID: 3c1284f0a7fc3a6340d4e02f3e950ec5b324baa9de337fad20b5ef2a4ed76cca
                                                                            • Instruction ID: a359661dc982b854ea63ce2f58c66ab0a806dd1952e1e1d4c750485c243dfddc
                                                                            • Opcode Fuzzy Hash: 3c1284f0a7fc3a6340d4e02f3e950ec5b324baa9de337fad20b5ef2a4ed76cca
                                                                            • Instruction Fuzzy Hash: E2E0C23C1143238FD7224B25CC48A6276F8FF08305B90882AE88AD2710E770D8C0CF50
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00174B44,?,001749D4,?,?,001727AF,?,00000001), ref: 00174B85
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00174B97
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 2574300362-3689287502
                                                                            • Opcode ID: 97f122986152f0ea0b01c41d162ce3a462562be92325dadb5e6b352a528c3fba
                                                                            • Instruction ID: 5e4d50a4a07a751da6bdf9cc84e1304bfe372aea41f9d37dd474064bed321ad3
                                                                            • Opcode Fuzzy Hash: 97f122986152f0ea0b01c41d162ce3a462562be92325dadb5e6b352a528c3fba
                                                                            • Instruction Fuzzy Hash: 50D01770614713CFD7219F31DC18B5676F4AF09392F51C82AD48AE2951E7B0E8C0CA10
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00174AF7,?), ref: 00174BB8
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00174BCA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 2574300362-1355242751
                                                                            • Opcode ID: dd64a8d62e52b24ec87312ada412a1a2ef21d1926672bec44d33faccbfc37997
                                                                            • Instruction ID: 768bc9abe185588158185d3728bbfd9dc91eb98b44e43d94b19b7adfeb9d1f97
                                                                            • Opcode Fuzzy Hash: dd64a8d62e52b24ec87312ada412a1a2ef21d1926672bec44d33faccbfc37997
                                                                            • Instruction Fuzzy Hash: B2D017715147138FD7219F31DC08B5776F5AF09351B11DC6AD4CAD2956EBB0D8D0CA11
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,001E1696), ref: 001E1455
                                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001E1467
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 2574300362-4033151799
                                                                            • Opcode ID: 46a3f59c5707695b392e7b76db3829324e10622ebcee2aafc694428ff08a4823
                                                                            • Instruction ID: f27ca97a52303ab145e52fca1601b0d34da90a9bf611d2d2c09a9af07df8b950
                                                                            • Opcode Fuzzy Hash: 46a3f59c5707695b392e7b76db3829324e10622ebcee2aafc694428ff08a4823
                                                                            • Instruction Fuzzy Hash: C0D012345507139FD7215F75C80865A76E4AF16395B11C82A98D6D2690D770D4D0C710
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00175E3D), ref: 001755FE
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00175610
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                                            • API String ID: 2574300362-192647395
                                                                            • Opcode ID: d98fa58e1b94b3a7c6e0782909cb4824c9b9e2edb0f4c6bb016841dc924090e5
                                                                            • Instruction ID: e37440af834db4944d53e8ce2063b8d8705554cab160aeff807c7a985c9eddab
                                                                            • Opcode Fuzzy Hash: d98fa58e1b94b3a7c6e0782909cb4824c9b9e2edb0f4c6bb016841dc924090e5
                                                                            • Instruction Fuzzy Hash: DDD01774920B138FE7229F31CC0862676F6AF08359B51C82AE48AD2592F7B0C8C0CA50
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,001D93DE,?,001F0980), ref: 001D97D8
                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 001D97EA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                                            • API String ID: 2574300362-199464113
                                                                            • Opcode ID: 6729804d020854c1005cc1a32b04cf1a51e54a0311806df8626a4ff5e82624c1
                                                                            • Instruction ID: 7834ff7e6ad307214c51d8ad28a4c3455d99df063d516218c1d135c2aa10429f
                                                                            • Opcode Fuzzy Hash: 6729804d020854c1005cc1a32b04cf1a51e54a0311806df8626a4ff5e82624c1
                                                                            • Instruction Fuzzy Hash: 4BD017719207138FD7229F31DC88666B6E4BF19791B11886AE486E2651EBB0C8C0CA51
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 581c859afa47fa7993bffe323045b7e44e0cf98b27037b1841b6115cd7339578
                                                                            • Instruction ID: d442eed562740b9b72d1e40079fb974e8591459c5501595874e38f8bd84ca9c9
                                                                            • Opcode Fuzzy Hash: 581c859afa47fa7993bffe323045b7e44e0cf98b27037b1841b6115cd7339578
                                                                            • Instruction Fuzzy Hash: D5C16075A04216EFCB14DF94C884EAEB7B9FF88714B118598F815EB291DB31ED81CB90
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?), ref: 001DE7A7
                                                                            • CharLowerBuffW.USER32(?,?), ref: 001DE7EA
                                                                              • Part of subcall function 001DDE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 001DDEAE
                                                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 001DE9EA
                                                                            • _memmove.LIBCMT ref: 001DE9FD
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                                                            • String ID:
                                                                            • API String ID: 3659485706-0
                                                                            • Opcode ID: 41392805f2d2defeceab806262d8d76c6d9d841375975f62b55ccaecd9a77285
                                                                            • Instruction ID: 46f55d46b17fe0e5d4b66174e26460909172fad1fd06c4890cc4c07841ac9f96
                                                                            • Opcode Fuzzy Hash: 41392805f2d2defeceab806262d8d76c6d9d841375975f62b55ccaecd9a77285
                                                                            • Instruction Fuzzy Hash: B3C17B71A083019FC755EF28C48096ABBE4FF99714F04896EF8999B351D731E945CF82
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 001D87AD
                                                                            • CoUninitialize.OLE32 ref: 001D87B8
                                                                              • Part of subcall function 001EDF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,001D8A0E,?,00000000), ref: 001EDF71
                                                                            • VariantInit.OLEAUT32(?), ref: 001D87C3
                                                                            • VariantClear.OLEAUT32(?), ref: 001D8A94
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                            • String ID:
                                                                            • API String ID: 780911581-0
                                                                            • Opcode ID: 598c40b48939b16bbdd743dec521fad19a9481bb59a15c797654e071541f9f1a
                                                                            • Instruction ID: 21e4c88d60156c3b82bee9fd43df68a46e6d16bfb2606b24c626cce85567d1f2
                                                                            • Opcode Fuzzy Hash: 598c40b48939b16bbdd743dec521fad19a9481bb59a15c797654e071541f9f1a
                                                                            • Instruction Fuzzy Hash: 99A16A75604B019FC705EF64C881B2AB7E5BF99354F14884AF9969B3A2CB30FD40CB92
                                                                            APIs
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,001F3C4C,?), ref: 001B8308
                                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,001F3C4C,?), ref: 001B8320
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,001F0988,000000FF,?,00000000,00000800,00000000,?,001F3C4C,?), ref: 001B8345
                                                                            • _memcmp.LIBCMT ref: 001B8366
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FromProg$FreeTask_memcmp
                                                                            • String ID:
                                                                            • API String ID: 314563124-0
                                                                            • Opcode ID: e30101dfaf3dbe94a12c4104ff44283af1d132c5d564285153d394cdde4c6f7a
                                                                            • Instruction ID: a35100f0f419aaabe15ce139e825c57c28f5995234c48cfa740550af1d25202d
                                                                            • Opcode Fuzzy Hash: e30101dfaf3dbe94a12c4104ff44283af1d132c5d564285153d394cdde4c6f7a
                                                                            • Instruction Fuzzy Hash: 86811B71A00109EFCB04DFD4C984EEEB7B9FF89715F244598E516AB260DB71AE06CB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$AllocClearCopyInitString
                                                                            • String ID:
                                                                            • API String ID: 2808897238-0
                                                                            • Opcode ID: c0a5387df1366df8cac9715b80460b66d2ceb7b2242e98e282b0f3ed01cc845d
                                                                            • Instruction ID: ee60bfde79d99d298cb5b88ffae1b55d62044b84d52a35ef8cf1a3d1ab893ff2
                                                                            • Opcode Fuzzy Hash: c0a5387df1366df8cac9715b80460b66d2ceb7b2242e98e282b0f3ed01cc845d
                                                                            • Instruction Fuzzy Hash: C751A9306087029BDB24AF79D895AADF3E5AF95310F20981FE546CB6E1EB7098808B15
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 001DF526
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 001DF534
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 001DF5F4
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 001DF603
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                            • String ID:
                                                                            • API String ID: 2576544623-0
                                                                            • Opcode ID: 55578c2222e269672e4d9cab52a5a02cd1dd217248c36adc0bfe5cd25252bac0
                                                                            • Instruction ID: 683915bcf16082ac71639b6c384600de4b1f71072e1ac060a52e430e03c8fa74
                                                                            • Opcode Fuzzy Hash: 55578c2222e269672e4d9cab52a5a02cd1dd217248c36adc0bfe5cd25252bac0
                                                                            • Instruction Fuzzy Hash: AE518F71504311AFD311EF24DC45E6BB7E8EFA9700F10492DF58697291EB70EA05CB92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                            • String ID:
                                                                            • API String ID: 2782032738-0
                                                                            • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                                            • Instruction ID: 255cfca36703948eea9fe62d3a43c0d241ea5575011476b8d4a5994a535dd10c
                                                                            • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                                            • Instruction Fuzzy Hash: 58419531A007079BDB2CEEA9C89096F77A5AF94364B24856DE4568B640DF71DF408F44
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 001BA68A
                                                                            • __itow.LIBCMT ref: 001BA6BB
                                                                              • Part of subcall function 001BA90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 001BA976
                                                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 001BA724
                                                                            • __itow.LIBCMT ref: 001BA77B
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$__itow
                                                                            • String ID:
                                                                            • API String ID: 3379773720-0
                                                                            • Opcode ID: 650c8717ebfe9cd2717fb8f4f2ed9ac6cab8e8eaecd2397062c3c5cd09d87c4f
                                                                            • Instruction ID: 1f2080ea7dc30180d95089f85c6e8e3440c33af432406faf96b708fb031e0d18
                                                                            • Opcode Fuzzy Hash: 650c8717ebfe9cd2717fb8f4f2ed9ac6cab8e8eaecd2397062c3c5cd09d87c4f
                                                                            • Instruction Fuzzy Hash: 0441A474A00209BFDF25EF58C846BEE7BB9EF58750F444029F905A3281DB719A45CBA2
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 001D70BC
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D70CC
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 001D7130
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D713C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$__itow__swprintfsocket
                                                                            • String ID:
                                                                            • API String ID: 2214342067-0
                                                                            • Opcode ID: 2f43de98234a45a6e0ac67724ebcaf7e365a4bdf39050f208d9670046d0fcb1d
                                                                            • Instruction ID: 950852635e81705216193386643eed7116544b155b93f2aaae6105d070133c12
                                                                            • Opcode Fuzzy Hash: 2f43de98234a45a6e0ac67724ebcaf7e365a4bdf39050f208d9670046d0fcb1d
                                                                            • Instruction Fuzzy Hash: DD41B071740210AFEB21AF68DC86F3A77E8DB29B10F148558FA599B3C2DB709C108B91
                                                                            APIs
                                                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,001F0980), ref: 001D6B92
                                                                            • _strlen.LIBCMT ref: 001D6BC4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _strlen
                                                                            • String ID:
                                                                            • API String ID: 4218353326-0
                                                                            • Opcode ID: fa7a13a4546ebb17f859a7c8ea307e47f5a9de40e1694eafbec34dfc386a4880
                                                                            • Instruction ID: 824a3c0d539518bc2f7bffb40193b16349364242fc27d97caf8b65e22ae53c83
                                                                            • Opcode Fuzzy Hash: fa7a13a4546ebb17f859a7c8ea307e47f5a9de40e1694eafbec34dfc386a4880
                                                                            • Instruction Fuzzy Hash: 4341A671600108ABCB14FBA4DCD5EBEB7B9EF68310F148156F81A97392DB30AE41CB50
                                                                            APIs
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001E8F03
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InvalidateRect
                                                                            • String ID:
                                                                            • API String ID: 634782764-0
                                                                            • Opcode ID: 0e8ea83cc77fc44e4b0850620b33fc6cb1ac8cf40415c98578d71ea724bf7624
                                                                            • Instruction ID: 9ead1be6f99609cecc62c40a9290039cd4b7ffbc441969f3ed1175567e66e02a
                                                                            • Opcode Fuzzy Hash: 0e8ea83cc77fc44e4b0850620b33fc6cb1ac8cf40415c98578d71ea724bf7624
                                                                            • Instruction Fuzzy Hash: 39310230654988FFEF249B5ACC48FAC77A6EB09320F144501FA19E61E1CF71E990CB91
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 001EB1D2
                                                                            • GetWindowRect.USER32(?,?), ref: 001EB248
                                                                            • PtInRect.USER32(?,?,001EC6BC), ref: 001EB258
                                                                            • MessageBeep.USER32(00000000), ref: 001EB2C9
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1352109105-0
                                                                            • Opcode ID: f2fd708980017a4efec3b7f5808272d52a6ca30c214da8fb10666f85ae8e4e5c
                                                                            • Instruction ID: 2c8ae20a8db1b58f9723758ee5d3918348fd3c5916813054963664234af878fb
                                                                            • Opcode Fuzzy Hash: f2fd708980017a4efec3b7f5808272d52a6ca30c214da8fb10666f85ae8e4e5c
                                                                            • Instruction Fuzzy Hash: ED419130A08596EFCF25CF9AD8C4AAE77F5FF49350F1880A5E6189B265D330A841DF51
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 001C1326
                                                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 001C1342
                                                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 001C13A8
                                                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 001C13FA
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: afa4bd9bd7c88b85b5383369919c9b0fbd0aad456cd327ce2ebc3c86f28a33bb
                                                                            • Instruction ID: e3e2df1564c16032cfe71ed774c7121114d05cd8df8bcc07b41013c5ec2ee5ba
                                                                            • Opcode Fuzzy Hash: afa4bd9bd7c88b85b5383369919c9b0fbd0aad456cd327ce2ebc3c86f28a33bb
                                                                            • Instruction Fuzzy Hash: 1C3148309C0288BAFF2586658805FF97BA6BB6A334F04920EE490529D2C374C9819B95
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 001C1465
                                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 001C1481
                                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 001C14E0
                                                                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 001C1532
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: 75e9bfbf2388f1265366c7249eacbb459d2c0880a08763bcfeb66dbd44dfd526
                                                                            • Instruction ID: badc0ab51a6314ccfcdd202f0b1b3996ae39ee31397b9c2ebcc831e1c7f9b39e
                                                                            • Opcode Fuzzy Hash: 75e9bfbf2388f1265366c7249eacbb459d2c0880a08763bcfeb66dbd44dfd526
                                                                            • Instruction Fuzzy Hash: B9313930980208BAFF398A658C04FFABB66ABAB310F48431EE481521D3C374C951DB62
                                                                            APIs
                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0019642B
                                                                            • __isleadbyte_l.LIBCMT ref: 00196459
                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00196487
                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 001964BD
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                            • String ID:
                                                                            • API String ID: 3058430110-0
                                                                            • Opcode ID: b9ea42139c2e52442fd9c4b9e692ad0bc3cc2765e08129bc4db38b4276e88c89
                                                                            • Instruction ID: c887cc72b0c7321937b6a952d6d963f3388056cdd39080f3862d4c0b407c99fc
                                                                            • Opcode Fuzzy Hash: b9ea42139c2e52442fd9c4b9e692ad0bc3cc2765e08129bc4db38b4276e88c89
                                                                            • Instruction Fuzzy Hash: 8A31B031604256AFDF258FA5CC44BBA7BE5FF40720F154129F86487191DB31E950DBA0
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 001E553F
                                                                              • Part of subcall function 001C3B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001C3B4E
                                                                              • Part of subcall function 001C3B34: GetCurrentThreadId.KERNEL32 ref: 001C3B55
                                                                              • Part of subcall function 001C3B34: AttachThreadInput.USER32(00000000,?,001C55C0), ref: 001C3B5C
                                                                            • GetCaretPos.USER32(?), ref: 001E5550
                                                                            • ClientToScreen.USER32(00000000,?), ref: 001E558B
                                                                            • GetForegroundWindow.USER32 ref: 001E5591
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                            • String ID:
                                                                            • API String ID: 2759813231-0
                                                                            • Opcode ID: 144eae979412de5d1ad4e44bd96cae13f5e6ceba35140fb31002740d60493711
                                                                            • Instruction ID: 58421d204749200dd1dcffdb7e326e48a397f2634e1d94c7158229882ec1c03f
                                                                            • Opcode Fuzzy Hash: 144eae979412de5d1ad4e44bd96cae13f5e6ceba35140fb31002740d60493711
                                                                            • Instruction Fuzzy Hash: 43310E71D00108AFDB00EFA5DD859EEB7FDEFA9704F10406AE515E7241DB71AE548BA0
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • GetCursorPos.USER32(?), ref: 001ECB7A
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0019BCEC,?,?,?,?,?), ref: 001ECB8F
                                                                            • GetCursorPos.USER32(?), ref: 001ECBDC
                                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0019BCEC,?,?,?), ref: 001ECC16
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                            • String ID:
                                                                            • API String ID: 2864067406-0
                                                                            • Opcode ID: 3d64d2a8c0dad6f7e16f753daba5b4419e1ed914d96845c30bbf14ef37862fe8
                                                                            • Instruction ID: 4c6b25b2cae7a1683c85054edcb0eba4ce7795111669b94c99f09c8ce90257a0
                                                                            • Opcode Fuzzy Hash: 3d64d2a8c0dad6f7e16f753daba5b4419e1ed914d96845c30bbf14ef37862fe8
                                                                            • Instruction Fuzzy Hash: 8A319135600498AFCB258F95CC59EFE7BB5EB49350F044099F9059B361C7315D92EFA0
                                                                            APIs
                                                                            • __setmode.LIBCMT ref: 00180BE2
                                                                              • Part of subcall function 0017402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,001C7E51,?,?,00000000), ref: 00174041
                                                                              • Part of subcall function 0017402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,001C7E51,?,?,00000000,?,?), ref: 00174065
                                                                            • _fprintf.LIBCMT ref: 00180C19
                                                                            • OutputDebugStringW.KERNEL32(?), ref: 001B694C
                                                                              • Part of subcall function 00184CCA: _flsall.LIBCMT ref: 00184CE3
                                                                            • __setmode.LIBCMT ref: 00180C4E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                            • String ID:
                                                                            • API String ID: 521402451-0
                                                                            • Opcode ID: dd2d2abcefc02a183457b9882bcc19178db3812b456a7e91209b5314d363bc74
                                                                            • Instruction ID: 70d143da33e7250dfaed2e79dd2176179a009bd401602da5151f29704167a394
                                                                            • Opcode Fuzzy Hash: dd2d2abcefc02a183457b9882bcc19178db3812b456a7e91209b5314d363bc74
                                                                            • Instruction Fuzzy Hash: EC113631904209BFD719BBA4AC43AFE7B6DDF65320F10015AF208571C2DF215E568BA1
                                                                            APIs
                                                                              • Part of subcall function 001B8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001B8D3F
                                                                              • Part of subcall function 001B8D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D49
                                                                              • Part of subcall function 001B8D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D58
                                                                              • Part of subcall function 001B8D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D5F
                                                                              • Part of subcall function 001B8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B8D75
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001B92C1
                                                                            • _memcmp.LIBCMT ref: 001B92E4
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B931A
                                                                            • HeapFree.KERNEL32(00000000), ref: 001B9321
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                            • String ID:
                                                                            • API String ID: 1592001646-0
                                                                            • Opcode ID: 5909dc8753a38e51b7500bf10c7b7ce1dc022c7aadc9ff4c7b5001b97f19d2c9
                                                                            • Instruction ID: bebce196f81a9d678e256b862510b9c972d0b08774ba1732889e732c2e2828e3
                                                                            • Opcode Fuzzy Hash: 5909dc8753a38e51b7500bf10c7b7ce1dc022c7aadc9ff4c7b5001b97f19d2c9
                                                                            • Instruction Fuzzy Hash: E8219D72E40118EFDB10DFA5C945BEEB7F8FF44301F144099E984A72A1D770AA46CBA0
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 001E63BD
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001E63D7
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001E63E5
                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 001E63F3
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$AttributesLayered
                                                                            • String ID:
                                                                            • API String ID: 2169480361-0
                                                                            • Opcode ID: 44c4b500e9de76beeaae38a92ec8cd1cd8bbba5cb4bfaab84eb53d7993bbbf7d
                                                                            • Instruction ID: f2e61baa4e4bc0f5ab32b5a0677e7cb705ad20b5c42550efcf4859cdb9672e12
                                                                            • Opcode Fuzzy Hash: 44c4b500e9de76beeaae38a92ec8cd1cd8bbba5cb4bfaab84eb53d7993bbbf7d
                                                                            • Instruction Fuzzy Hash: A911E231305914AFD705AB29CC45FBE77AAFFA5360F144118F91ACB2E2CBA0AD40CB94
                                                                            APIs
                                                                              • Part of subcall function 001BF858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,001BE46F,?,?,?,001BF262,00000000,000000EF,00000119,?,?), ref: 001BF867
                                                                              • Part of subcall function 001BF858: lstrcpyW.KERNEL32(00000000,?,?,001BE46F,?,?,?,001BF262,00000000,000000EF,00000119,?,?,00000000), ref: 001BF88D
                                                                              • Part of subcall function 001BF858: lstrcmpiW.KERNEL32(00000000,?,001BE46F,?,?,?,001BF262,00000000,000000EF,00000119,?,?), ref: 001BF8BE
                                                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,001BF262,00000000,000000EF,00000119,?,?,00000000), ref: 001BE488
                                                                            • lstrcpyW.KERNEL32(00000000,?,?,001BF262,00000000,000000EF,00000119,?,?,00000000), ref: 001BE4AE
                                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,001BF262,00000000,000000EF,00000119,?,?,00000000), ref: 001BE4E2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                            • String ID: cdecl
                                                                            • API String ID: 4031866154-3896280584
                                                                            • Opcode ID: 9112f26e79c14043470837a81b0dcec7055e7e8df11fbc65992e9dafb50e2d5c
                                                                            • Instruction ID: cae656815c7c223952a37a03dfc625909d03b184108281b5084a8a017e7c649a
                                                                            • Opcode Fuzzy Hash: 9112f26e79c14043470837a81b0dcec7055e7e8df11fbc65992e9dafb50e2d5c
                                                                            • Instruction Fuzzy Hash: 9511933A100345AFDB25AF24DC49DFA77E9FF49350B40402AF806CB2A1EB71E991C791
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00195331
                                                                              • Part of subcall function 0018593C: __FF_MSGBANNER.LIBCMT ref: 00185953
                                                                              • Part of subcall function 0018593C: __NMSG_WRITE.LIBCMT ref: 0018595A
                                                                              • Part of subcall function 0018593C: RtlAllocateHeap.NTDLL(00EA0000,00000000,00000001,?,00000004,?,?,00181003,?), ref: 0018597F
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap_free
                                                                            • String ID:
                                                                            • API String ID: 614378929-0
                                                                            • Opcode ID: a6c30470fa9f3edae443a1f66201f7b354343d17b3a12a679deb744f69f8ec03
                                                                            • Instruction ID: aa8b4971630b57272e07776721dfe043cc30165bdddd0eb7e0cc04dbe639c101
                                                                            • Opcode Fuzzy Hash: a6c30470fa9f3edae443a1f66201f7b354343d17b3a12a679deb744f69f8ec03
                                                                            • Instruction Fuzzy Hash: D911CA32505A15AFCF363FB0AC0566E3B95BF247E0B504A25F958AA191DF708B41CB90
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 001C4385
                                                                            • _memset.LIBCMT ref: 001C43A6
                                                                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 001C43F8
                                                                            • CloseHandle.KERNEL32(00000000), ref: 001C4401
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                            • String ID:
                                                                            • API String ID: 1157408455-0
                                                                            • Opcode ID: 78d16e0bc0351f0df446f071261057927ada97130b9ab517f5979c4264f31e48
                                                                            • Instruction ID: 48e6368e617e8323e2e869451e7f2d1eee87bc5ebdfb90e42306d059bfc4c30b
                                                                            • Opcode Fuzzy Hash: 78d16e0bc0351f0df446f071261057927ada97130b9ab517f5979c4264f31e48
                                                                            • Instruction Fuzzy Hash: AA11E7759012287AD7309BA5AC4DFFBBB7CEF84720F10459AF908E7180D2708E80CBA4
                                                                            APIs
                                                                              • Part of subcall function 0017402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,001C7E51,?,?,00000000), ref: 00174041
                                                                              • Part of subcall function 0017402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,001C7E51,?,?,00000000,?,?), ref: 00174065
                                                                            • gethostbyname.WSOCK32(?,?,?), ref: 001D6A84
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 001D6A8F
                                                                            • _memmove.LIBCMT ref: 001D6ABC
                                                                            • inet_ntoa.WSOCK32(?), ref: 001D6AC7
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                            • String ID:
                                                                            • API String ID: 1504782959-0
                                                                            • Opcode ID: 1396b38c16a8950f188040deb624f582389de2fa883f516bffbf561f7406deb6
                                                                            • Instruction ID: a82f8828e4e88ddbddd0e573bf13236c1979ec6268c87e7494c8439aad73640a
                                                                            • Opcode Fuzzy Hash: 1396b38c16a8950f188040deb624f582389de2fa883f516bffbf561f7406deb6
                                                                            • Instruction Fuzzy Hash: AF113376900109AFCB05FFA4CD46DEEB7B8EF28310B148165F506A72A2DF319E14DBA1
                                                                            APIs
                                                                              • Part of subcall function 001629E2: GetWindowLongW.USER32(?,000000EB), ref: 001629F3
                                                                            • DefDlgProcW.USER32(?,00000020,?), ref: 001616B4
                                                                            • GetClientRect.USER32(?,?), ref: 0019B93C
                                                                            • GetCursorPos.USER32(?), ref: 0019B946
                                                                            • ScreenToClient.USER32(?,?), ref: 0019B951
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 4127811313-0
                                                                            • Opcode ID: a716f1875413dcbb5f8c7ab68d7d28f66ebb81060aa98b6235cc70654771c34c
                                                                            • Instruction ID: b6e3ca4b1958d30f957a7264822c07a7623a8fa1c4c5a75c2c6c446d4963cc47
                                                                            • Opcode Fuzzy Hash: a716f1875413dcbb5f8c7ab68d7d28f66ebb81060aa98b6235cc70654771c34c
                                                                            • Instruction Fuzzy Hash: 15111679A0001ABBCB10EFA4DC859FE77B9FB09300F580855E942E7551D770BAA1CBA1
                                                                            APIs
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 001B9719
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B972B
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B9741
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B975C
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 8a2f7b67fe7b85e8c8f6d6af8d8b16a4e1159c931117b9fd48c52e43becad596
                                                                            • Instruction ID: 1168e24e2526f5475ff1cdcde514ca6957b67e287c1a8f11826a805fd315a3df
                                                                            • Opcode Fuzzy Hash: 8a2f7b67fe7b85e8c8f6d6af8d8b16a4e1159c931117b9fd48c52e43becad596
                                                                            • Instruction Fuzzy Hash: BC114879900218FFEB11DFA5C984EEDBBB8FB48710F204091EA00B7290DB716E11DB90
                                                                            APIs
                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0016214F
                                                                            • GetStockObject.GDI32(00000011), ref: 00162163
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0016216D
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CreateMessageObjectSendStockWindow
                                                                            • String ID:
                                                                            • API String ID: 3970641297-0
                                                                            • Opcode ID: b61f61d223ff491f603bd7cf352ab9e0d568c1b3dc8d644ae8582b2f9c364d58
                                                                            • Instruction ID: 5ef7bcec483f2e74f36bdd7d38916ad7d48055ed01798fffc6753a6b93177053
                                                                            • Opcode Fuzzy Hash: b61f61d223ff491f603bd7cf352ab9e0d568c1b3dc8d644ae8582b2f9c364d58
                                                                            • Instruction Fuzzy Hash: CD116D72509949BFDF169F909C84EFB7B6DEF5A3A4F050216FA1452110C731DCA1EBA0
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,001C04EC,?,001C153F,?,00008000), ref: 001C195E
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,001C04EC,?,001C153F,?,00008000), ref: 001C1983
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,001C04EC,?,001C153F,?,00008000), ref: 001C198D
                                                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,001C04EC,?,001C153F,?,00008000), ref: 001C19C0
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CounterPerformanceQuerySleep
                                                                            • String ID:
                                                                            • API String ID: 2875609808-0
                                                                            • Opcode ID: 89e26b55396087041753e8c073d692b624e8971c3d2f5df90315a0433f70ded7
                                                                            • Instruction ID: 3059994fd3ca3b1125d19086d28637adcc40d55c0a472c82dfbfe08cceed6ada
                                                                            • Opcode Fuzzy Hash: 89e26b55396087041753e8c073d692b624e8971c3d2f5df90315a0433f70ded7
                                                                            • Instruction Fuzzy Hash: EB115A31C4451CEBCF009FA4D958BEEBB78FF2A711F414149E981B2242CB30D6A0CB91
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 001EE1EA
                                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 001EE201
                                                                            • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 001EE216
                                                                            • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 001EE234
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                                            • String ID:
                                                                            • API String ID: 1352324309-0
                                                                            • Opcode ID: 0ec5e51847b80b9fafd95cd766576a4eb2924e1d3e94cde37b62effa431c14f2
                                                                            • Instruction ID: e0c384f08111e3334464ab2963ae1a4b67e038cfcf274468705845da0144eb96
                                                                            • Opcode Fuzzy Hash: 0ec5e51847b80b9fafd95cd766576a4eb2924e1d3e94cde37b62effa431c14f2
                                                                            • Instruction Fuzzy Hash: A6118EB4201706DBE3308F52DC08FA7BBFCEB44B00F108959A71ADA441D7B0E548DBA1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                            • String ID:
                                                                            • API String ID: 3016257755-0
                                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction ID: fce60f4df58a44fbc1fcf2a52c85b40cfaa6a73b44a4092729278d202fb84e67
                                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction Fuzzy Hash: B9019A3206824EBBCF166F84CC02CEE3F22BF29354B488516FA1858171C336C9B1AB81
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 001EB956
                                                                            • ScreenToClient.USER32(?,?), ref: 001EB96E
                                                                            • ScreenToClient.USER32(?,?), ref: 001EB992
                                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 001EB9AD
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 357397906-0
                                                                            • Opcode ID: 085464b7d2f812d3cc45db8fe6175ddec10faf3416442338f600a42d1099288a
                                                                            • Instruction ID: fb68921ec68db2dc1464ea3157bd69a77a829c2ad963a9d68a635ba7f1ed26bd
                                                                            • Opcode Fuzzy Hash: 085464b7d2f812d3cc45db8fe6175ddec10faf3416442338f600a42d1099288a
                                                                            • Instruction Fuzzy Hash: FA1163B9D04209EFDB41CF99C984AEEBBF9FB48310F104156E915E3611D731AA61CF50
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001EBCB6
                                                                            • _memset.LIBCMT ref: 001EBCC5
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00228F20,00228F64), ref: 001EBCF4
                                                                            • CloseHandle.KERNEL32 ref: 001EBD06
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3277943733-0
                                                                            • Opcode ID: 8c97cd8dc5e2416b2e86ed07c3161eb38f248bdcc047204bb6f8709ea700a033
                                                                            • Instruction ID: be17c6cdd84042fb4ed7a4d91edb9fabc135fe71aa2bfaf41ddce71aa5d875e2
                                                                            • Opcode Fuzzy Hash: 8c97cd8dc5e2416b2e86ed07c3161eb38f248bdcc047204bb6f8709ea700a033
                                                                            • Instruction Fuzzy Hash: 6AF0BEB25013107FE22027A1BC09FBB3B5DFB08750F400420BA08D58A6DB72881087A8
                                                                            APIs
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 001C71A1
                                                                              • Part of subcall function 001C7C7F: _memset.LIBCMT ref: 001C7CB4
                                                                            • _memmove.LIBCMT ref: 001C71C4
                                                                            • _memset.LIBCMT ref: 001C71D1
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 001C71E1
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                            • String ID:
                                                                            • API String ID: 48991266-0
                                                                            • Opcode ID: 2ee0258d3e8060dfe4f5afc118cdd847df83b121b59c20d2d90bc201914e8af7
                                                                            • Instruction ID: b1ffed3721e20ad5b04f3d931e9a9d678a28a413b1cd64603801a32394f2582d
                                                                            • Opcode Fuzzy Hash: 2ee0258d3e8060dfe4f5afc118cdd847df83b121b59c20d2d90bc201914e8af7
                                                                            • Instruction Fuzzy Hash: 1CF03A7A200100ABCB016F55DC85F9ABB29EF59320F088055FE085E22BCB32E951DBB4
                                                                            APIs
                                                                              • Part of subcall function 001616CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00161729
                                                                              • Part of subcall function 001616CF: SelectObject.GDI32(?,00000000), ref: 00161738
                                                                              • Part of subcall function 001616CF: BeginPath.GDI32(?), ref: 0016174F
                                                                              • Part of subcall function 001616CF: SelectObject.GDI32(?,00000000), ref: 00161778
                                                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 001EC3E8
                                                                            • LineTo.GDI32(00000000,?,?), ref: 001EC3F5
                                                                            • EndPath.GDI32(00000000), ref: 001EC405
                                                                            • StrokePath.GDI32(00000000), ref: 001EC413
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                            • String ID:
                                                                            • API String ID: 1539411459-0
                                                                            • Opcode ID: b5a034191623605ae76b7d9e19621ec28cc895f7d8e411a18de9e5f1e5ae1ceb
                                                                            • Instruction ID: a605550b75d433c1a7434cc853094bac367548d518ec1c525f415f40477ae8ad
                                                                            • Opcode Fuzzy Hash: b5a034191623605ae76b7d9e19621ec28cc895f7d8e411a18de9e5f1e5ae1ceb
                                                                            • Instruction Fuzzy Hash: 77F08931105659B7DB135F55AC0DFDE3F95AF09351F048000FA51611E2877455A2DFD5
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 001BAA6F
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 001BAA82
                                                                            • GetCurrentThreadId.KERNEL32 ref: 001BAA89
                                                                            • AttachThreadInput.USER32(00000000), ref: 001BAA90
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 2710830443-0
                                                                            • Opcode ID: 40359228608c31a2a5a92ecbee8d6484d469b4553f167f3d89dd851fd2981f6f
                                                                            • Instruction ID: b9e86e12c7cc09f60da2dc183070d0ce5dc94c535c11b30b30433415aafe0dda
                                                                            • Opcode Fuzzy Hash: 40359228608c31a2a5a92ecbee8d6484d469b4553f167f3d89dd851fd2981f6f
                                                                            • Instruction Fuzzy Hash: 37E03971545228BADB225FA2DD0CEE73F5CEF197A1F408011F509C9491C7718590CBB1
                                                                            APIs
                                                                            • GetSysColor.USER32(00000008), ref: 0016260D
                                                                            • SetTextColor.GDI32(?,000000FF), ref: 00162617
                                                                            • SetBkMode.GDI32(?,00000001), ref: 0016262C
                                                                            • GetStockObject.GDI32(00000005), ref: 00162634
                                                                            • GetWindowDC.USER32(?,00000000), ref: 0019C1C4
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0019C1D1
                                                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0019C1EA
                                                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0019C203
                                                                            • GetPixel.GDI32(00000000,?,?), ref: 0019C223
                                                                            • ReleaseDC.USER32(?,00000000), ref: 0019C22E
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                            • String ID:
                                                                            • API String ID: 1946975507-0
                                                                            • Opcode ID: 417fcd11e132178ddeedc916aa68ee1d4d8698161feecfc391312f6adf24dd10
                                                                            • Instruction ID: fa6e20bc0b84f40e0c7e39fea0a91d32c7f9aa3aa5b0011b1c37b2c1d300cca0
                                                                            • Opcode Fuzzy Hash: 417fcd11e132178ddeedc916aa68ee1d4d8698161feecfc391312f6adf24dd10
                                                                            • Instruction Fuzzy Hash: 75E06531504244BBDF225F64AC097E83B11EB09331F048366FA69480E2877145D0DB12
                                                                            APIs
                                                                            • GetCurrentThread.KERNEL32 ref: 001B9339
                                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,001B8F04), ref: 001B9340
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001B8F04), ref: 001B934D
                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,001B8F04), ref: 001B9354
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                            • String ID:
                                                                            • API String ID: 3974789173-0
                                                                            • Opcode ID: 74a7d3f976a85c96f7149b9d8f8fd63f8e21d79a027d803b4e08473abf8cc51d
                                                                            • Instruction ID: ff5f578e17ce116c308cbc4788098c8714fd42ed5aacc7a5b8b8722ebc5cd602
                                                                            • Opcode Fuzzy Hash: 74a7d3f976a85c96f7149b9d8f8fd63f8e21d79a027d803b4e08473abf8cc51d
                                                                            • Instruction Fuzzy Hash: BFE04F326012119FD7211FB15D0DBA73BACBF59791F114818F245C9091EB359485C760
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 001A0679
                                                                            • GetDC.USER32(00000000), ref: 001A0683
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001A06A3
                                                                            • ReleaseDC.USER32(?), ref: 001A06C4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: cc2b4a0136e264ae1c5cb147781526427c023381d0d12cbf3747d4889ff2c371
                                                                            • Instruction ID: fa09aecc3ee017cc99fd1490a79feffd677fd3b17d78f902928956918ab0e5ec
                                                                            • Opcode Fuzzy Hash: cc2b4a0136e264ae1c5cb147781526427c023381d0d12cbf3747d4889ff2c371
                                                                            • Instruction Fuzzy Hash: 90E01AB5800204EFCF029FA0DC08AAD7BF5EB9C360F128005F85AE7651DB3885A1DF50
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 001A068D
                                                                            • GetDC.USER32(00000000), ref: 001A0697
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001A06A3
                                                                            • ReleaseDC.USER32(?), ref: 001A06C4
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 14a3f0b341cc13b5c780f7048fef68d41e9c9e12d45c03d9fd148cd99c9e2d3b
                                                                            • Instruction ID: fef710c1a343f3a7ab06822c27cb5ca54c7068e4d606261d02a7fd2d69ecb0bf
                                                                            • Opcode Fuzzy Hash: 14a3f0b341cc13b5c780f7048fef68d41e9c9e12d45c03d9fd148cd99c9e2d3b
                                                                            • Instruction Fuzzy Hash: CDE012B5800204AFCF129FA0DC08AAD7BF6AB9C360F118008F95AE7651DB3895A1CF50
                                                                            APIs
                                                                              • Part of subcall function 0017436A: _wcscpy.LIBCMT ref: 0017438D
                                                                              • Part of subcall function 00164D37: __itow.LIBCMT ref: 00164D62
                                                                              • Part of subcall function 00164D37: __swprintf.LIBCMT ref: 00164DAC
                                                                            • __wcsnicmp.LIBCMT ref: 001CB670
                                                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 001CB739
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                            • String ID: LPT
                                                                            • API String ID: 3222508074-1350329615
                                                                            • Opcode ID: 0073b21ef27fc9c61b88015c6eb1fc4b36afba5c7c496d243350bc8476230a9d
                                                                            • Instruction ID: 8fe26ad512ca674a8ffc0fa8fe925e9592d964ca2749b289c67871f17b461e20
                                                                            • Opcode Fuzzy Hash: 0073b21ef27fc9c61b88015c6eb1fc4b36afba5c7c496d243350bc8476230a9d
                                                                            • Instruction Fuzzy Hash: 4F617075A04215AFCB18EF94C882FAEB7B8EB68710F01805DF906EB291D730EE41CB50
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000), ref: 0016E01E
                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0016E037
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: GlobalMemorySleepStatus
                                                                            • String ID: @
                                                                            • API String ID: 2783356886-2766056989
                                                                            • Opcode ID: 55357425deb56e9b42a63125fd5bd62bcb65a69b209ac883ddab65a1a9784c55
                                                                            • Instruction ID: 8823a092ab28851750a43ba4aed8d61e1fa65e636850851f83434e96a7b6ba30
                                                                            • Opcode Fuzzy Hash: 55357425deb56e9b42a63125fd5bd62bcb65a69b209ac883ddab65a1a9784c55
                                                                            • Instruction Fuzzy Hash: 095137724087449BE320AF50EC86BABBBE8FB95314F51884DF2D8411A5EB709539CB26
                                                                            APIs
                                                                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 001E8186
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001E819B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: '
                                                                            • API String ID: 3850602802-1997036262
                                                                            • Opcode ID: b642d8c1e1ddc7dd45db3a6631d7c714e59998b94a1a72e9acc2dc2584ac2a32
                                                                            • Instruction ID: c380d960da7e04bb82587273cd1da53be39ce1f42177339bdf227f6a60bec355
                                                                            • Opcode Fuzzy Hash: b642d8c1e1ddc7dd45db3a6631d7c714e59998b94a1a72e9acc2dc2584ac2a32
                                                                            • Instruction Fuzzy Hash: 83412874A006499FDB14CF65C881BDEBBF5FB08300F10016AE909EB351DB31A956CFA0
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001D2C6A
                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 001D2CA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: CrackInternet_memset
                                                                            • String ID: |
                                                                            • API String ID: 1413715105-2343686810
                                                                            • Opcode ID: 2cbb432207946477f89ac0c96b1a3d88017048ed4c868e68b2902b7f569e496d
                                                                            • Instruction ID: 53124931f8dcff3ed386b93dbb7054aa924a292d1a935718ae7cd6a8c29bb6dd
                                                                            • Opcode Fuzzy Hash: 2cbb432207946477f89ac0c96b1a3d88017048ed4c868e68b2902b7f569e496d
                                                                            • Instruction Fuzzy Hash: D1314F71C00119ABDF11EFA4CC85AEEBFB9FF15310F104056F819A6262DB315A56DFA0
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?,?,?), ref: 001E713C
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 001E7178
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$DestroyMove
                                                                            • String ID: static
                                                                            • API String ID: 2139405536-2160076837
                                                                            • Opcode ID: effbf33b780939f1f5e836431fcadc62ed9cc1b6e32eb974997de1905e9d4482
                                                                            • Instruction ID: f5130685becfebc8a390313d3d25e7d4de9f910a06d8671fb5b9669f8733f8e2
                                                                            • Opcode Fuzzy Hash: effbf33b780939f1f5e836431fcadc62ed9cc1b6e32eb974997de1905e9d4482
                                                                            • Instruction Fuzzy Hash: 6831AB71104A44AEEB11DF79CC80AFF73A9FF89720F109619F9A987191DB31AC91CB60
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001C30B8
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 001C30F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InfoItemMenu_memset
                                                                            • String ID: 0
                                                                            • API String ID: 2223754486-4108050209
                                                                            • Opcode ID: 5f0270e8a46a78ee8c9c3c16f1b94c27e9a819dea7c1ffffe5cb045fe877e142
                                                                            • Instruction ID: dbc4936c2580991dc46e0b1f7f9068f9ff6b842aec6c3da5f6c76a1c4aedd788
                                                                            • Opcode Fuzzy Hash: 5f0270e8a46a78ee8c9c3c16f1b94c27e9a819dea7c1ffffe5cb045fe877e142
                                                                            • Instruction Fuzzy Hash: 1E310431600209EFEB249F58C885FAEBBB8EF25750F18C01DF9A1A61A1D770DB44CB51
                                                                            APIs
                                                                            • __snwprintf.LIBCMT ref: 001D4132
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __snwprintf_memmove
                                                                            • String ID: , $$AUTOITCALLVARIABLE%d
                                                                            • API String ID: 3506404897-2584243854
                                                                            • Opcode ID: d8ba50f22123aee1a363a451613176c486ec00886252231259046f507a906da2
                                                                            • Instruction ID: 71e9738be11c0208404846d2c92f83d85dceea01576c131b3e898c9dc8fc391b
                                                                            • Opcode Fuzzy Hash: d8ba50f22123aee1a363a451613176c486ec00886252231259046f507a906da2
                                                                            • Instruction Fuzzy Hash: 6A219130A0021DABCF15EFA4C892EEE77B5AF65740F404455F909A7281DB70AA96CBA1
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001E6D86
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E6D91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Combobox
                                                                            • API String ID: 3850602802-2096851135
                                                                            • Opcode ID: 18f84871d9d6b82f272eaa8a0be3616f857d449451b9fae093f9a5d3bf91cba4
                                                                            • Instruction ID: 7e6fb870aaeed747ca85881ed95a7c1a451de4058bb0f1c5a3395f195eee9016
                                                                            • Opcode Fuzzy Hash: 18f84871d9d6b82f272eaa8a0be3616f857d449451b9fae093f9a5d3bf91cba4
                                                                            • Instruction Fuzzy Hash: 7D11E6713046487FEF118E95DC81EFF3B6AFBA43A4F900125F9549B290D7719C518760
                                                                            APIs
                                                                              • Part of subcall function 00162111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0016214F
                                                                              • Part of subcall function 00162111: GetStockObject.GDI32(00000011), ref: 00162163
                                                                              • Part of subcall function 00162111: SendMessageW.USER32(00000000,00000030,00000000), ref: 0016216D
                                                                            • GetWindowRect.USER32(00000000,?), ref: 001E7296
                                                                            • GetSysColor.USER32(00000012), ref: 001E72B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                            • String ID: static
                                                                            • API String ID: 1983116058-2160076837
                                                                            • Opcode ID: 0bc98708d8a7f016684f6ed9439d71c251a19e1c53bc93b2547349e240b1ee5d
                                                                            • Instruction ID: a8096836615bb5a75bea48efdcf228e721c81cc389c03db54c368b119bfdad24
                                                                            • Opcode Fuzzy Hash: 0bc98708d8a7f016684f6ed9439d71c251a19e1c53bc93b2547349e240b1ee5d
                                                                            • Instruction Fuzzy Hash: 4921477261420AAFEB04DFA8CC46AFE7BA8EB08314F004518FE55D3251E734A891DB50
                                                                            APIs
                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 001E6FC7
                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001E6FD6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: LengthMessageSendTextWindow
                                                                            • String ID: edit
                                                                            • API String ID: 2978978980-2167791130
                                                                            • Opcode ID: 29e4f0976f1bc1ef85330eda7b8679756c76265e863834e8933dfb96aac31872
                                                                            • Instruction ID: ba0ec8497c8da7f60c452c23a0f8488c7fd5ff9cac709d42c422aa99687f7924
                                                                            • Opcode Fuzzy Hash: 29e4f0976f1bc1ef85330eda7b8679756c76265e863834e8933dfb96aac31872
                                                                            • Instruction Fuzzy Hash: B1119D71104648ABEB108E65ACA4EBF3B69EB243B4F904314F920931E0C731DC909B60
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 001C31C9
                                                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 001C31E8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: InfoItemMenu_memset
                                                                            • String ID: 0
                                                                            • API String ID: 2223754486-4108050209
                                                                            • Opcode ID: 6b7235926ad2177b00926ca059bfed91773854e9bbc1f3716fcd780f5ffb2a68
                                                                            • Instruction ID: 8ed3efb9b31abc13fd38ef463e85a3d5ee7372140901a7cd5c6364b2befe78db
                                                                            • Opcode Fuzzy Hash: 6b7235926ad2177b00926ca059bfed91773854e9bbc1f3716fcd780f5ffb2a68
                                                                            • Instruction Fuzzy Hash: CE11E231905114AFDB24DA9CDC49FADB7F8AB29310F1D8129E825A72A0D770EF06CB91
                                                                            APIs
                                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 001D28F8
                                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 001D2921
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$OpenOption
                                                                            • String ID: <local>
                                                                            • API String ID: 942729171-4266983199
                                                                            • Opcode ID: 6d244e0ebadc3be47fce44bc6b7497ef2c5299c320b09e8ed5c70fb907e6cfe5
                                                                            • Instruction ID: 470324c64cef6b97cb83c0c22c7784ebd23c21c12fd39e0b74003407b265ad39
                                                                            • Opcode Fuzzy Hash: 6d244e0ebadc3be47fce44bc6b7497ef2c5299c320b09e8ed5c70fb907e6cfe5
                                                                            • Instruction Fuzzy Hash: 0A110270501225BAEB298F518C88EFBFBECFF26755F10822BF56542200E3706990E6F0
                                                                            APIs
                                                                              • Part of subcall function 001D86E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,001D849D,?,00000000,?,?), ref: 001D86F7
                                                                            • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 001D84A0
                                                                            • htons.WSOCK32(00000000,?,00000000), ref: 001D84DD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWidehtonsinet_addr
                                                                            • String ID: 255.255.255.255
                                                                            • API String ID: 2496851823-2422070025
                                                                            • Opcode ID: aaf808716770d1949334253c69948b053ea13256e58c6d8a58876f2ef773acd0
                                                                            • Instruction ID: 14318685a3823b3b58594071fa0b0d86a693d5257087a9e84e07e6af23a2b79c
                                                                            • Opcode Fuzzy Hash: aaf808716770d1949334253c69948b053ea13256e58c6d8a58876f2ef773acd0
                                                                            • Instruction Fuzzy Hash: 4B118E3520020AABDB21AF64CC46BEEB364FF54320F10865BF915973D2DB71A810CA95
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 001B9A2B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: fc54c6c966b851021c142e90238b359e1bcdeee971c497021cbd9a2c831cfb63
                                                                            • Instruction ID: 57d4d714d56a22bc1760a2168857785cb61c450a78024ef9802137ad11361c2b
                                                                            • Opcode Fuzzy Hash: fc54c6c966b851021c142e90238b359e1bcdeee971c497021cbd9a2c831cfb63
                                                                            • Instruction Fuzzy Hash: 0A01F571A46124BB8B14EBB8CC51CFE77B9AF66320B000609F865532C1DF305808D650
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0016BC07
                                                                              • Part of subcall function 00171821: _memmove.LIBCMT ref: 0017185B
                                                                            • _wcscat.LIBCMT ref: 001A3593
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: FullNamePath_memmove_wcscat
                                                                            • String ID: s"
                                                                            • API String ID: 257928180-893648717
                                                                            • Opcode ID: fd4a1ff5151742403be58b1b797c6845ffea74be90db3c7b7618338474fc614e
                                                                            • Instruction ID: 248977398b10cff3d2d4278afc23e02687fe78ad324ffe52de9b01dd6ce6fc22
                                                                            • Opcode Fuzzy Hash: fd4a1ff5151742403be58b1b797c6845ffea74be90db3c7b7618338474fc614e
                                                                            • Instruction Fuzzy Hash: F511843190C218ABCB05EBA49C82EDD77B8FF18350B1040A9BD89D7251EF70ABE49B51
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock_memmove
                                                                            • String ID: EA06
                                                                            • API String ID: 1988441806-3962188686
                                                                            • Opcode ID: f25840901a4ee163a8f238754e2253c1f811aa02cd15de46d0f947f62066ed2a
                                                                            • Instruction ID: 005afe681a609b8faffdb264ff000e5c0e9d879a92e054fa22d35ba30f5c71d9
                                                                            • Opcode Fuzzy Hash: f25840901a4ee163a8f238754e2253c1f811aa02cd15de46d0f947f62066ed2a
                                                                            • Instruction Fuzzy Hash: 4B01D6728042587EDB28D6A8C85AEAE7BF8DB12301F00419FF552D2181E675E7048B60
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 001B9923
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: a44ab87a9144ef055e06708a6052482dd13fe73a41e2b07a562311e9646e88bb
                                                                            • Instruction ID: 5a82df6b8c522372da3a9d8222328fa0650ae685c97fc4c3f472f18d434f8f4b
                                                                            • Opcode Fuzzy Hash: a44ab87a9144ef055e06708a6052482dd13fe73a41e2b07a562311e9646e88bb
                                                                            • Instruction Fuzzy Hash: 0801A2B6E461087BCB24EBA4C992EFF73B99F26340F500119F946A3282DF505E18D6B1
                                                                            APIs
                                                                              • Part of subcall function 00171A36: _memmove.LIBCMT ref: 00171A77
                                                                              • Part of subcall function 001BB79A: GetClassNameW.USER32(?,?,000000FF), ref: 001BB7BD
                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 001B99A6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: 20b8cdbd7b355eaf8f4e668d2e5d2208f6b72e9142f58c250426fe6c30d8bd23
                                                                            • Instruction ID: 14cde184e3d7b25c780e5a347b40a805bee87d1828cedf9763cde4a4c16732c3
                                                                            • Opcode Fuzzy Hash: 20b8cdbd7b355eaf8f4e668d2e5d2208f6b72e9142f58c250426fe6c30d8bd23
                                                                            • Instruction Fuzzy Hash: 2A01A2B2A4610877CB25EBA4C952EFE77AD9F21340F500119F945A3281DB644E1896B1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: __calloc_crt
                                                                            • String ID: @b"
                                                                            • API String ID: 3494438863-225451027
                                                                            • Opcode ID: 37a11e1a099a3cc8c210076411e486a5e237758c09085889ed42a10add4ce777
                                                                            • Instruction ID: c0fdfcc8e42f33fce82cea83486b97532331f6ff5b8b1cc3290e98149af7969f
                                                                            • Opcode Fuzzy Hash: 37a11e1a099a3cc8c210076411e486a5e237758c09085889ed42a10add4ce777
                                                                            • Instruction Fuzzy Hash: 0AF0627130C212EBF738EFD9BC657A13795E714720F516276F640CB295EB7089824B90
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName_wcscmp
                                                                            • String ID: #32770
                                                                            • API String ID: 2292705959-463685578
                                                                            • Opcode ID: 5e7d45e4cde1a31b95c4c7768270b7ec5b8b405b6222f1e0c0dba2ea6c929843
                                                                            • Instruction ID: 2257a74b44aaeca583315b9bbeb552c72b0c007244e0dbd49eb0e26283ededfc
                                                                            • Opcode Fuzzy Hash: 5e7d45e4cde1a31b95c4c7768270b7ec5b8b405b6222f1e0c0dba2ea6c929843
                                                                            • Instruction Fuzzy Hash: 58E0613250022827D320A699AC09FA7F7ECDB15770F000057FC04D3051D670EA5587D0
                                                                            APIs
                                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 001B88A0
                                                                              • Part of subcall function 00183588: _doexit.LIBCMT ref: 00183592
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Message_doexit
                                                                            • String ID: AutoIt$Error allocating memory.
                                                                            • API String ID: 1993061046-4017498283
                                                                            • Opcode ID: 09ac2dca3bccc5f95565199fa21c723ca4ff9125e421c684cab41944c97152fa
                                                                            • Instruction ID: 1cf3d577c7d4eae00214ea7d6886153cbd34d079ec293dd61fed2888ae253174
                                                                            • Opcode Fuzzy Hash: 09ac2dca3bccc5f95565199fa21c723ca4ff9125e421c684cab41944c97152fa
                                                                            • Instruction Fuzzy Hash: EFD05B7238535833D22532E4AC0BFDA7A4C8B25F51F044426FB08A55C34BD586D186D5
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(?), ref: 001A0091
                                                                              • Part of subcall function 001DC6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,001A027A,?), ref: 001DC6E7
                                                                              • Part of subcall function 001DC6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 001DC6F9
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 001A0289
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 0000000A.00000002.2928046953.0000000000161000.00000020.00000001.01000000.00000006.sdmp, Offset: 00160000, based on PE: true
                                                                            • Associated: 0000000A.00000002.2928023201.0000000000160000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.00000000001F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928095940.0000000000216000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928137151.0000000000220000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 0000000A.00000002.2928153099.0000000000229000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_10_2_160000_Mother.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                            • String ID: WIN_XPe
                                                                            • API String ID: 582185067-3257408948
                                                                            • Opcode ID: 469b416d5eb42094fdbb2487e729f9a9e6fb8181a6a100b6dae654f3d927107c
                                                                            • Instruction ID: 837dc2675011d024df96d3b4208ff0b331fb4f19f944826fce80da008b60eb91
                                                                            • Opcode Fuzzy Hash: 469b416d5eb42094fdbb2487e729f9a9e6fb8181a6a100b6dae654f3d927107c
                                                                            • Instruction Fuzzy Hash: FBF0ED75805109DFCB2ADBA4DA98BECBBF8AB0D384F241485F146B2191CB718F85DF21