Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ.exe

Overview

General Information

Sample name:RFQ.exe
Analysis ID:1568946
MD5:3861b9e7e90136630ba57296db976c82
SHA1:84ef76f15ad3f688c679c781edfa844206062db8
SHA256:d92795d6430f0ef54455895006dd6bfe6924a02d1ee531f60ee6f3b93b876078
Tags:exeRedLineStealeruser-julianmckein
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • RFQ.exe (PID: 1568 cmdline: "C:\Users\user\Desktop\RFQ.exe" MD5: 3861B9E7E90136630BA57296DB976C82)
    • RegSvcs.exe (PID: 5648 cmdline: "C:\Users\user\Desktop\RFQ.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • Ycdwx.exe (PID: 7136 cmdline: "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 3536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Ycdwx.exe (PID: 5468 cmdline: "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 4160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.3d76458.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.3d76458.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                2.2.RegSvcs.exe.295fb06.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.295fb06.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    2.2.RegSvcs.exe.5230000.8.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      Click to see the 30 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5648, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ycdwx
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5648, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://mail.elec-qatar.comAvira URL Cloud: Label: malware
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                      Source: RFQ.exeReversingLabs: Detection: 44%
                      Source: RFQ.exeVirustotal: Detection: 47%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: RFQ.exeJoe Sandbox ML: detected
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: /log.tmp
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>[
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ]<br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Time:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>User Name:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>Computer Name:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>OSFullName:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>CPU:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>RAM:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IP Address:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <hr>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: New
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IP Address:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: true
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: https://api.ipify.org
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: true
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: mail.elec-qatar.com
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: mohammed.abrar@elec-qatar.com
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: MHabrar2019@#
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: davidsurly1@gmail.com
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: true
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: false
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: appdata
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Ycdwx
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Ycdwx.exe
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Ycdwx
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Type
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <hr>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <b>[
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ]</b> (
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: )<br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {BACK}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {ALT+TAB}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {ALT+F4}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {TAB}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {ESC}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {Win}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {CAPSLOCK}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {KEYUP}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {KEYDOWN}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {KEYLEFT}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {KEYRIGHT}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {DEL}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {END}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {HOME}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {Insert}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {NumLock}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {PageDown}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {PageUp}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {ENTER}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F1}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F2}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F3}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F4}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F5}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F6}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F7}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F8}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F9}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F10}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F11}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {F12}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: control
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {CTRL}
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: &amp;
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: &lt;
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: &gt;
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: &quot;
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <hr>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: logins
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IE/Edge
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Secure Note
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Web Password Credential
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Credential Picker Protector
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Web Credentials
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Credentials
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Domain Password Credential
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Extended Credential
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SchemaId
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pResourceElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pIdentityElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pPackageSid
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pAuthenticatorElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IE/Edge
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UC Browser
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UCBrowser\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Login Data
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: journal
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: wow_logins
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Safari for Windows
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <array>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <dict>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <string>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </string>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <string>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </string>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <data>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </data>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: -convert xml1 -s -o "
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \fixed_keychain.xml"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Microsoft\Credentials\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Microsoft\Credentials\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Microsoft\Credentials\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Microsoft\Credentials\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Microsoft\Protect\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: credential
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: QQ Browser
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Default\EncryptedStorage
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Profile
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \EncryptedStorage
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: entries
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: category
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: str3
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: str2
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: blob0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: password_value
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IncrediMail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PopPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SmtpPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Accounts_New
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PopPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SmtpPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SmtpServer
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: EmailAddress
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Eudora
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: current
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Settings
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SavePasswordText
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Settings
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ReturnAddress
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Falkon Browser
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \falkon\profiles\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: profiles.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: profiles.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \browsedata.db
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: autofill
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ClawsMail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Claws-mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \clawsrc
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \clawsrc
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passkey0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \accountrc
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: smtp_server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: address
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: account
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \passwordstorerc
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Flock Browser
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Flock\Browser\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: signons3.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: DynDns
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ALLUSERSPROFILE
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: username=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: password=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: https://account.dyn.com/
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: t6KzXhCh
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ALLUSERSPROFILE
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: global
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: accounts
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: account.
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: username
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: account.
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Psi/Psi+
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: name
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Psi/Psi+
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Psi\profiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Psi+\profiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \accounts.xml
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \accounts.xml
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: OpenVPN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: username
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: auth-data
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: entropy
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: USERPROFILE
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \OpenVPN\config\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: remote
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: remote
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: NordVPN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: NordVPN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: NordVpn.exe*
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: user.config
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: //setting[@name='Username']/value
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: //setting[@name='Password']/value
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: NordVPN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Private Internet Access
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: %ProgramW6432%
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Private Internet Access\data
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles(x86)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Private Internet Access\data
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \account.json
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: .*"username":"(.*?)"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: .*"password":"(.*?)"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Private Internet Access
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: privateinternetaccess.com
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FileZilla
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Server>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Host>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Host>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </Host>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Port>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </Port>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <User>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <User>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </User>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Pass encoding="base64">
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Pass encoding="base64">
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </Pass>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Pass>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <Pass encoding="base64">
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </Pass>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: CoreFTP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: User
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Host
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Port
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: WinSCP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HostName
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UserName
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PublicKeyFile
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PortNumber
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: WinSCP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ABCDEF
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Flash FXP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: port
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: user
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pass
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: quick.dat
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Sites.dat
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FlashFXP\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FlashFXP\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FTP Navigator
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SystemDrive
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: No Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: User
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SmartFTP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: APPDATA
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: WS_FTP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: appdata
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HOST
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PWD=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PWD=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FtpCommander
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SystemDrive
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SystemDrive
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SystemDrive
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Password=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;User=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Server=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Port=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Port=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Password=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;User=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ;Anonymous=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FTPGetter
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_ip>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_ip>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </server_ip>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_port>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </server_port>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_user_name>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_user_name>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </server_user_name>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_user_password>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: <server_user_password>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: </server_user_password>
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FTPGetter
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: The Bat!
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: appdata
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \The Bat!
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Account.CFN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Account.CFN
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Becky!
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: DataDir
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Folder.lst
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Mailbox.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Account
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PassWd
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Account
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTPServer
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Account
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: MailAddress
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Becky!
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Outlook
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IMAP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: POP3 Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HTTP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IMAP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: POP3 Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HTTP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTP Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Windows Mail App
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SchemaId
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pResourceElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pIdentityElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pPackageSid
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: pAuthenticatorElement
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: syncpassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: mailoutgoing
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FoxMail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Executable
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: FoxmailPath
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Storage\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Storage\
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Accounts\Account.rec0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Accounts\Account.rec0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Account.stg
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Account.stg
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: POP3Host
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTPHost
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: IncomingServer
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Account
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: MailAddress
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: POP3Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Opera Mail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: opera:
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PocoMail
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: appdata
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: POPPass
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTPPass
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SMTP
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: eM Client
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: eM Client\accounts.dat
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: eM Client
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Accounts
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: "Username":"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: "Secret":"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: "ProviderName":"
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: o6806642kbM7c5
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Mailbird
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SenderIdentities
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Accounts
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Server_Host
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Accounts
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Email
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Username
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: EncryptedPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Mailbird
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: RealVNC 4.x
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: RealVNC 3.x
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: RealVNC 4.x
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: RealVNC 3.x
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: TightVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\TightVNC\Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: TightVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\TightVNC\Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: PasswordViewOnly
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: TightVNC ControlPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\TightVNC\Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ControlPassword
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: TigerVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Software\TigerVNC\Server
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: Password
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles(x86)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles(x86)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd2
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd2
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd2
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles(x86)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: UltraVNC
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: ProgramFiles(x86)
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: passwd2
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: JDownloader 2.0
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 2.2.RegSvcs.exe.5230000.8.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                      Source: RFQ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                      Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000002.00000002.3339655516.000000000556F000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2232635735.0000000000B02000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                      Source: Binary string: wntdll.pdbUGP source: RFQ.exe, 00000000.00000003.2117748214.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2118377850.0000000003C30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: RFQ.exe, 00000000.00000003.2117748214.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2118377850.0000000003C30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.3339655516.000000000556F000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2232635735.0000000000B02000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F8445A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8C6D1 FindFirstFileW,FindClose,0_2_00F8C6D1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F8C75C
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F8EF95
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F8F0F2
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F8F3F3
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F837EF
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F83B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F83B12
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F8BCBC
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 50.87.139.143:587
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 50.87.139.143:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F922EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00F922EE
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: mail.elec-qatar.com
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3339655516.00000000054E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: RegSvcs.exe, 00000002.00000002.3339655516.00000000054E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3339655516.00000000054E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F94164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F94164
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F94164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F94164
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F93F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F93F66
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00F8001C
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00FACABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00FACABC

                      System Summary

                      barindex
                      Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 0.2.RFQ.exe.3b90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 00000002.00000002.3336154686.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 00000000.00000002.2120151998.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: This is a third-party compiled AutoIt script.0_2_00F23B3A
                      Source: RFQ.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                      Source: RFQ.exe, 00000000.00000000.2086185553.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7f9d8e0e-f
                      Source: RFQ.exe, 00000000.00000000.2086185553.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_19c9e9a3-9
                      Source: RFQ.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bc231c7b-1
                      Source: RFQ.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_10234947-3
                      Source: initial sampleStatic PE information: Filename: RFQ.exe
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00F8A1EF
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F78310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F78310
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F851BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F851BD
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F2E6A00_2_00F2E6A0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4D9750_2_00F4D975
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F2FCE00_2_00F2FCE0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F421C50_2_00F421C5
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F562D20_2_00F562D2
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00FA03DA0_2_00FA03DA
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F5242E0_2_00F5242E
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F425FA0_2_00F425FA
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F366E10_2_00F366E1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F7E6160_2_00F7E616
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F5878F0_2_00F5878F
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F888890_2_00F88889
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00FA08570_2_00FA0857
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F568440_2_00F56844
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F388080_2_00F38808
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4CB210_2_00F4CB21
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F56DB60_2_00F56DB6
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F36F9E0_2_00F36F9E
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F330300_2_00F33030
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4F1D90_2_00F4F1D9
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F431870_2_00F43187
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F212870_2_00F21287
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F414840_2_00F41484
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F355200_2_00F35520
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F476960_2_00F47696
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F357600_2_00F35760
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F419780_2_00F41978
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F59AB50_2_00F59AB5
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00FA7DDB0_2_00FA7DDB
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4BDA60_2_00F4BDA6
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F41D900_2_00F41D90
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F33FE00_2_00F33FE0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F2DF000_2_00F2DF00
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_016EA2600_2_016EA260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028DD2A02_2_028DD2A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028DDEB82_2_028DDEB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028D0FC02_2_028D0FC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028D10302_2_028D1030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028DD5E82_2_028DD5E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_066A14002_2_066A1400
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_066AC2582_2_066AC258
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_066A68A12_2_066A68A1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_066A9EC82_2_066A9EC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_066A09372_2_066A0937
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: String function: 00F27DE1 appears 35 times
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: String function: 00F48900 appears 42 times
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: String function: 00F40AE3 appears 70 times
                      Source: RFQ.exe, 00000000.00000003.2119001998.0000000003D53000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ.exe
                      Source: RFQ.exe, 00000000.00000003.2117435940.0000000003EAD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ.exe
                      Source: RFQ.exe, 00000000.00000002.2120151998.0000000003B90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename43d1e201-3b42-4ac8-8e2b-270e79cd58bc.exe4 vs RFQ.exe
                      Source: RFQ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 0.2.RFQ.exe.3b90000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 00000002.00000002.3336154686.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 00000000.00000002.2120151998.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@2/2
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8A06A GetLastError,FormatMessageW,0_2_00F8A06A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F781CB AdjustTokenPrivileges,CloseHandle,0_2_00F781CB
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F787E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F787E1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F8B3FB
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F9EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F9EE0D
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F983BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00F983BB
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F24E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F24E89
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\YcdwxJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4160:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3536:120:WilError_03
                      Source: C:\Users\user\Desktop\RFQ.exeFile created: C:\Users\user\AppData\Local\Temp\aut121F.tmpJump to behavior
                      Source: RFQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: RFQ.exeReversingLabs: Detection: 44%
                      Source: RFQ.exeVirustotal: Detection: 47%
                      Source: unknownProcess created: C:\Users\user\Desktop\RFQ.exe "C:\Users\user\Desktop\RFQ.exe"
                      Source: C:\Users\user\Desktop\RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\RFQ.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe "C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\RFQ.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: RFQ.exeStatic file information: File size 1191424 > 1048576
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000002.00000002.3339655516.000000000556F000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2232635735.0000000000B02000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                      Source: Binary string: wntdll.pdbUGP source: RFQ.exe, 00000000.00000003.2117748214.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2118377850.0000000003C30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: RFQ.exe, 00000000.00000003.2117748214.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2118377850.0000000003C30000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.3339655516.000000000556F000.00000004.00000020.00020000.00000000.sdmp, Ycdwx.exe, 00000003.00000000.2232635735.0000000000B02000.00000002.00000001.01000000.00000007.sdmp, Ycdwx.exe.2.dr
                      Source: RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F24B37 LoadLibraryA,GetProcAddress,0_2_00F24B37
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F48945 push ecx; ret 0_2_00F48958
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BFCD pushad ; ret 2_2_0041BFCE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028D434D push esp; iretd 2_2_028D4361
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeCode function: 3_2_011E0838 push ebx; retf 3_2_011E0842
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeCode function: 3_2_011E089B push esp; retf 3_2_011E089E
                      Source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'A2rQAeJ04KrR1', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                      Source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'A2rQAeJ04KrR1', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                      Source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'A2rQAeJ04KrR1', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                      Source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'A2rQAeJ04KrR1', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                      Source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'A2rQAeJ04KrR1', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run YcdwxJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run YcdwxJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F248D7
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00FA5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00FA5376
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F43187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00F43187
                      Source: C:\Users\user\Desktop\RFQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\RFQ.exeAPI/Special instruction interceptor: Address: 16E9E84
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 11E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 4D50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5181Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1095Jump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105369
                      Source: C:\Users\user\Desktop\RFQ.exeAPI coverage: 4.6 %
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe TID: 3292Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe TID: 6428Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F8445A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8C6D1 FindFirstFileW,FindClose,0_2_00F8C6D1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F8C75C
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F8EF95
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F8F0F2
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F8F3F3
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F837EF
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F83B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F83B12
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F8BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F8BCBC
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F249A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99327Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99108Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98881Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98622Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98502Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98375Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98265Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98156Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98046Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97937Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97818Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97687Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97577Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97468Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96921Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96812Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96703Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96593Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: RFQ.exe, 00000000.00000003.2086985090.0000000001552000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe(
                      Source: RegSvcs.exe, 00000002.00000002.3339655516.00000000054E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
                      Source: C:\Users\user\Desktop\RFQ.exeAPI call chain: ExitProcess graph end nodegraph_0-104199
                      Source: C:\Users\user\Desktop\RFQ.exeAPI call chain: ExitProcess graph end nodegraph_0-104423
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F93F09 BlockInput,0_2_00F93F09
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F23B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F23B3A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F55A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F55A7C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F24B37 LoadLibraryA,GetProcAddress,0_2_00F24B37
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_016EA150 mov eax, dword ptr fs:[00000030h]0_2_016EA150
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_016EA0F0 mov eax, dword ptr fs:[00000030h]0_2_016EA0F0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_016E8AE0 mov eax, dword ptr fs:[00000030h]0_2_016E8AE0
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F780A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00F780A9
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F4A155
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4A124 SetUnhandledExceptionFilter,0_2_00F4A124
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\RFQ.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 8DB008Jump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F787B1 LogonUserW,0_2_00F787B1
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F23B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F23B3A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F248D7
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F84C7F mouse_event,0_2_00F84C7F
                      Source: C:\Users\user\Desktop\RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\RFQ.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F77CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00F77CAF
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F7874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F7874B
                      Source: RFQ.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                      Source: RFQ.exeBinary or memory string: Shell_TrayWnd
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F4862B cpuid 0_2_00F4862B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F54E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F54E87
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F61E06 GetUserNameW,0_2_00F61E06
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F53F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F53F3A
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F249A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: RFQ.exe, 00000000.00000002.2119769921.0000000001552000.00000004.00000020.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2086865893.00000000014D5000.00000004.00000020.00020000.00000000.sdmp, RFQ.exe, 00000000.00000003.2086985090.0000000001552000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msmpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337432346.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: RFQ.exeBinary or memory string: WIN_81
                      Source: RFQ.exeBinary or memory string: WIN_XP
                      Source: RFQ.exeBinary or memory string: WIN_XPe
                      Source: RFQ.exeBinary or memory string: WIN_VISTA
                      Source: RFQ.exeBinary or memory string: WIN_7
                      Source: RFQ.exeBinary or memory string: WIN_8
                      Source: RFQ.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                      Source: Yara matchFile source: 00000002.00000002.3337432346.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337432346.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3db4d90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d76458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5230ee8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295ec1e.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.295fb06.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.5120000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.3d75570.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F96283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00F96283
                      Source: C:\Users\user\Desktop\RFQ.exeCode function: 0_2_00F96747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F96747
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure2
                      Valid Accounts
                      121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      2
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts2
                      Native API
                      2
                      Valid Accounts
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      21
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Registry Run Keys / Startup Folder
                      2
                      Valid Accounts
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      2
                      File and Directory Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                      Access Token Manipulation
                      1
                      Software Packing
                      NTDS148
                      System Information Discovery
                      Distributed Component Object Model21
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets261
                      Security Software Discovery
                      SSH3
                      Clipboard Data
                      23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Registry Run Keys / Startup Folder
                      1
                      Masquerading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                      Valid Accounts
                      DCSync2
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc Filesystem11
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                      Access Token Manipulation
                      /etc/passwd and /etc/shadow1
                      System Owner/User Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                      Process Injection
                      Network Sniffing1
                      System Network Configuration Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                      Hidden Files and Directories
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1568946 Sample: RFQ.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 100 25 mail.elec-qatar.com 2->25 27 api.ipify.org 2->27 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus detection for URL or domain 2->45 47 9 other signatures 2->47 7 RFQ.exe 2 2->7         started        10 Ycdwx.exe 2 2->10         started        12 Ycdwx.exe 1 2->12         started        signatures3 process4 signatures5 49 Binary is likely a compiled AutoIt script file 7->49 51 Writes to foreign memory regions 7->51 53 Maps a DLL or memory area into another process 7->53 55 Switches to a custom stack to bypass stack traces 7->55 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 29 mail.elec-qatar.com 50.87.139.143, 49705, 587 UNIFIEDLAYER-AS-1US United States 14->29 31 api.ipify.org 104.26.12.205, 443, 49704 CLOUDFLARENETUS United States 14->31 23 C:\Users\user\AppData\Roaming\...\Ycdwx.exe, PE32 14->23 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->35 37 Tries to steal Mail credentials (via file / registry access) 14->37 39 3 other signatures 14->39 file8 signatures9

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      RFQ.exe45%ReversingLabsWin32.Trojan.AutoitInject
                      RFQ.exe47%VirustotalBrowse
                      RFQ.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://mail.elec-qatar.com100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      104.26.12.205
                      truefalse
                        high
                        mail.elec-qatar.com
                        50.87.139.143
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://mail.elec-qatar.comRegSvcs.exe, 00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.orgRegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://sectigo.com/CPS0RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.sectigo.com0RegSvcs.exe, 00000002.00000002.3337432346.0000000002DFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3336272889.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3337432346.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        104.26.12.205
                                        api.ipify.orgUnited States
                                        13335CLOUDFLARENETUSfalse
                                        50.87.139.143
                                        mail.elec-qatar.comUnited States
                                        46606UNIFIEDLAYER-AS-1UStrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1568946
                                        Start date and time:2024-12-05 09:17:06 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 39s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:9
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:RFQ.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@7/6@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 96%
                                        • Number of executed functions: 56
                                        • Number of non-executed functions: 270
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target Ycdwx.exe, PID 5468 because it is empty
                                        • Execution Graph export aborted for target Ycdwx.exe, PID 7136 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        03:18:07API Interceptor31x Sleep call for process: RegSvcs.exe modified
                                        09:18:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Ycdwx C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                        09:18:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Ycdwx C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        104.26.12.205Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                        • api.ipify.org/
                                        Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                        • api.ipify.org/
                                        perfcc.elfGet hashmaliciousXmrigBrowse
                                        • api.ipify.org/
                                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        50.87.139.143231210-01-AgentTesla-2eba02.exeGet hashmaliciousAgentTeslaBrowse
                                          SecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                              NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                                Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                                    Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            api.ipify.orgvenomderek.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                            • 104.26.13.205
                                                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 104.26.13.205
                                                            Order NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 104.26.12.205
                                                            Employee_Bonus_Notlce.pdfGet hashmaliciousUnknownBrowse
                                                            • 172.67.74.152
                                                            Employee_Important_Message.pdfGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.26.12.205
                                                            v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.13.205
                                                            zwW6sDt6hU.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            e7lGwhCp7r.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.26.12.205
                                                            Svku9pKypu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            • 104.26.12.205
                                                            pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 104.26.12.205
                                                            mail.elec-qatar.com231210-01-AgentTesla-2eba02.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            SecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 50.87.139.143
                                                            Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 50.87.139.143
                                                            Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 50.87.139.143
                                                            SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 50.87.139.143
                                                            SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 50.87.139.143
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUSBACS190027-01.pdfGet hashmaliciousUnknownBrowse
                                                            • 172.66.42.208
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.21.16.9
                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                                                            • 172.67.181.44
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.21.16.9
                                                            sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 172.65.9.47
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.21.16.9
                                                            maybecreatebesthingswithgreatnicewhichgivenbreakingthingstobe.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                            • 104.21.31.249
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.21.16.9
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 104.21.16.9
                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 172.67.165.166
                                                            UNIFIEDLAYER-AS-1USBACS190027-01.pdfGet hashmaliciousUnknownBrowse
                                                            • 50.116.113.32
                                                            https://iemetodista.com.br/?data=c2VydmljZUBqcHBsdXMuY29tGet hashmaliciousUnknownBrowse
                                                            • 108.179.252.197
                                                            http://voicemaaila.3utilities.comGet hashmaliciousUnknownBrowse
                                                            • 192.185.179.156
                                                            Danellarealty 1052.htmlGet hashmaliciousUnknownBrowse
                                                            • 69.49.245.172
                                                            sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 98.130.22.65
                                                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 192.185.13.234
                                                            Order NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 192.185.13.234
                                                            teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                                            • 98.130.22.47
                                                            MGj3hwACvs.htmlGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                            • 192.185.77.66
                                                            https://ublypwgeo.turismoalperu.com/Get hashmaliciousCaptcha PhishBrowse
                                                            • 192.185.153.249
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0e31#U544a.exeGet hashmaliciousCobaltStrikeBrowse
                                                            • 104.26.12.205
                                                            R7bv9d6gTH.dllGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            Patch.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                            • 104.26.12.205
                                                            RuntimeBroker.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                            • 104.26.12.205
                                                            Qsgtknmtt.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            Fzcaaz.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            Ekyrfzxogk.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            EHak.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            Qsgtknmtt.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            Fzcaaz.exeGet hashmaliciousUnknownBrowse
                                                            • 104.26.12.205
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exeAWB#150332.exeGet hashmaliciousAgentTeslaBrowse
                                                              SOA_9828392091.exeGet hashmaliciousAgentTeslaBrowse
                                                                ngPebbPhbp.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                  Pi648je050.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                    shipping documents.exeGet hashmaliciousAgentTeslaBrowse
                                                                      Termination_List_November_2024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                        Payment_Advice_USD_48,054.40_.exeGet hashmaliciousAgentTeslaBrowse
                                                                          M1Y6kc9FpE.exeGet hashmaliciousFormBookBrowse
                                                                            mJIvCBk5vF.exeGet hashmaliciousFormBookBrowse
                                                                              1aG5DoOsAW.exeGet hashmaliciousFormBookBrowse
                                                                                Process:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):142
                                                                                Entropy (8bit):5.090621108356562
                                                                                Encrypted:false
                                                                                SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                Process:C:\Users\user\Desktop\RFQ.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):266752
                                                                                Entropy (8bit):7.887835213727865
                                                                                Encrypted:false
                                                                                SSDEEP:6144:rAOMygGPOyrFG69ZtMOFmvzG7unEaKkwkd4okzi2myizd3vvFX:rAJOVc2fkvzGKnEEjKzi2JizdXV
                                                                                MD5:8909607617266BC36A98B7BA93D82EE0
                                                                                SHA1:FC88D5CC6491B16291DBB80B31DC0D6DB9EB4035
                                                                                SHA-256:76ACF3941E3A486ACB9BFA551A9421D6EA3C59CC64348F3F68808E0D02A4D04D
                                                                                SHA-512:B227691B700E3485F45CE01C3D3832D5A14B339316C8B098F6A4A76AC214511C7AC890E3DE87B5656918EC95B44C631328D6A11564CA63ED41804661847129AC
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...TQLEJ@IFW..O2.Z3TRLEJ.IFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFW.XO2IE.ZR.L.e.G..y.Z.).$ #"8%$f4'6!]3zQ1r>0$d (w....*5W1|AH@`IFWFXO2/J.y~=.4h8.)j).LuyL*m=.4O..)m).Lk+.*.=.4vj()Z).LuyZ*.=.4vj=)k).L.3P<~=.4DIFWFXO2GZ3TRLEJ...3FXO2..3T.MAJ0.F.FXO2GZ3T.LfKOHOWF.N2G,1TRLEJk.FWFHO2G.2TRL.JDYFWFZO2BZ3TRLEJAIFWFXO2G:7TRHEJ.rDWDXO.GZ#TR\EJDIVWFHO2GZ3TBLEJDIFWFXO2.O1T.LEJD)DW:.N2GZ3TRLEJDIFWFXO2GZ3TRLEJ..GWZXO2GZ3TRLEJDIFWFXO2GZ3TRLEJ.DDW.XO2GZ3TRLEJD.GW.YO2GZ3TRLEJDIFWFXO2GZ3TRLEJj=#/2XO2_.2TR\EJD.GWF\O2GZ3TRLEJDIFWfXORi(W5&-EJ.$FWF.N2G43TR.DJDIFWFXO2GZ3T.LE.j-'#'XO2.j3TRlGJD_FWFRM2GZ3TRLEJDIFW.XO.i(@&1LEJ8.GWF8M2G.2TRlGJDIFWFXO2GZ3T.LE.DIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJDIFWFXO2GZ3TRLEJ
                                                                                Process:C:\Users\user\Desktop\RFQ.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):261450
                                                                                Entropy (8bit):7.974676733284304
                                                                                Encrypted:false
                                                                                SSDEEP:6144:cfar14rOpKLSjzVeLOyIZm9JFssqKpmIN/YHYZn:cfax4rOpKao96Sy5Kh/kun
                                                                                MD5:66D24154A56AD0A6395AA4D99308838C
                                                                                SHA1:95498ED38AF5DF46B0800CF5804C026125D740DA
                                                                                SHA-256:2B35CA52CB5C94F660022F1009B916822C77A559C901385EA1D8688555A44D14
                                                                                SHA-512:82583828E5F2B3A663E1A61C0C3EC85204DC50F379B24134B829E9283F297771D1126304F78DC71D4590A5BB07A7BAEFC3F42F0F7F91BB1016574F6BA6D0CC0E
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:EA06.....@4uJ.2.J.Rh.}..2..uJ......(.|..!. .....)4\Mj...a..<o.y.....A#.N$.K4.O6..fw....>.I,..E....D.SZ...A.P,........._4.N5..T.KL..i..h..O.u.6....+.J......(...*...!Oe6...+3.O......+.......~gT.Sh4...... ..f........N.Q......@)....d. AiTJ...Z..@....0ju7.T..ZV..D..+.....#.T..".X........:|....e4J..SN.P.0..=^....y(.J.....=_.Y.0.mS...d. W.. ..th.z5p...V).+L..5.Kh........P.@...D.P."T.,*.-.........@[(..%|...S@.>....i.P$....q..p'....d.a.............<..^...Qi.M.z{F....~.N.W..H.:<.sM....c=....\Vo.........'L.b.T;..sX......R....w{`..s".z.....S....V.2.{(Z....I.[75z7bm5...z.n..E.^)>.5o...V.}I]..G.m.:.5_.C.Up.J.*...Rx...B.2.iy.J..iH....L..a2...U8.....A..z.3.F..Y.E...|M.....Ui\.-..I...<......r..%^.sp1....p.....@.."..{5...;...{5.Z.2.J...L.o9...fuN.........z.gi..7EU..20+.rg>..:..d.....&4.vW..L.....".W.T...-_.]...e..F.......E..)..i....^..-S.O<Z.W2...Q..j.;.G...E..K.......5..d+...(....<.5...........K..H.7L.aS.|...K...x..uB...Y...*]...8.8m..F..4...%..P84* ..E.
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:modified
                                                                                Size (bytes):45984
                                                                                Entropy (8bit):6.16795797263964
                                                                                Encrypted:false
                                                                                SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                                                MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                                                SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                                                SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                                                SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: AWB#150332.exe, Detection: malicious, Browse
                                                                                • Filename: SOA_9828392091.exe, Detection: malicious, Browse
                                                                                • Filename: ngPebbPhbp.exe, Detection: malicious, Browse
                                                                                • Filename: Pi648je050.exe, Detection: malicious, Browse
                                                                                • Filename: shipping documents.exe, Detection: malicious, Browse
                                                                                • Filename: Termination_List_November_2024_pdf.exe, Detection: malicious, Browse
                                                                                • Filename: Payment_Advice_USD_48,054.40_.exe, Detection: malicious, Browse
                                                                                • Filename: M1Y6kc9FpE.exe, Detection: malicious, Browse
                                                                                • Filename: mJIvCBk5vF.exe, Detection: malicious, Browse
                                                                                • Filename: 1aG5DoOsAW.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                Process:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1141
                                                                                Entropy (8bit):4.442398121585593
                                                                                Encrypted:false
                                                                                SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                                                MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                                                SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                                                SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                                                SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                                                Malicious:false
                                                                                Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.173077477595768
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:RFQ.exe
                                                                                File size:1'191'424 bytes
                                                                                MD5:3861b9e7e90136630ba57296db976c82
                                                                                SHA1:84ef76f15ad3f688c679c781edfa844206062db8
                                                                                SHA256:d92795d6430f0ef54455895006dd6bfe6924a02d1ee531f60ee6f3b93b876078
                                                                                SHA512:30a3396d67ab0511183181d9148017663f9125dcc53ea3db51b366bb39cdf2646bce098a4665fd8b033bced4dd137743516c9a9f77dd2bc51618790534606b6c
                                                                                SSDEEP:24576:eu6J33O0c+JY5UZ+XC0kGso6FalpKWZfQe0zXbNhBWY:wu0c++OCvkGs9FalpK2f0YY
                                                                                TLSH:1C45CF22B3DDC360CB669173BF69B7016EBF78614630B85B2F880D7DA950172162D7A3
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                Entrypoint:0x427dcd
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x6750EE07 [Thu Dec 5 00:04:23 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:1
                                                                                File Version Major:5
                                                                                File Version Minor:1
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:1
                                                                                Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                                Instruction
                                                                                call 00007FA0A11059CAh
                                                                                jmp 00007FA0A10F8794h
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                push edi
                                                                                push esi
                                                                                mov esi, dword ptr [esp+10h]
                                                                                mov ecx, dword ptr [esp+14h]
                                                                                mov edi, dword ptr [esp+0Ch]
                                                                                mov eax, ecx
                                                                                mov edx, ecx
                                                                                add eax, esi
                                                                                cmp edi, esi
                                                                                jbe 00007FA0A10F891Ah
                                                                                cmp edi, eax
                                                                                jc 00007FA0A10F8C7Eh
                                                                                bt dword ptr [004C31FCh], 01h
                                                                                jnc 00007FA0A10F8919h
                                                                                rep movsb
                                                                                jmp 00007FA0A10F8C2Ch
                                                                                cmp ecx, 00000080h
                                                                                jc 00007FA0A10F8AE4h
                                                                                mov eax, edi
                                                                                xor eax, esi
                                                                                test eax, 0000000Fh
                                                                                jne 00007FA0A10F8920h
                                                                                bt dword ptr [004BE324h], 01h
                                                                                jc 00007FA0A10F8DF0h
                                                                                bt dword ptr [004C31FCh], 00000000h
                                                                                jnc 00007FA0A10F8ABDh
                                                                                test edi, 00000003h
                                                                                jne 00007FA0A10F8ACEh
                                                                                test esi, 00000003h
                                                                                jne 00007FA0A10F8AADh
                                                                                bt edi, 02h
                                                                                jnc 00007FA0A10F891Fh
                                                                                mov eax, dword ptr [esi]
                                                                                sub ecx, 04h
                                                                                lea esi, dword ptr [esi+04h]
                                                                                mov dword ptr [edi], eax
                                                                                lea edi, dword ptr [edi+04h]
                                                                                bt edi, 03h
                                                                                jnc 00007FA0A10F8923h
                                                                                movq xmm1, qword ptr [esi]
                                                                                sub ecx, 08h
                                                                                lea esi, dword ptr [esi+08h]
                                                                                movq qword ptr [edi], xmm1
                                                                                lea edi, dword ptr [edi+08h]
                                                                                test esi, 00000007h
                                                                                je 00007FA0A10F8975h
                                                                                bt esi, 03h
                                                                                jnc 00007FA0A10F89C8h
                                                                                Programming Language:
                                                                                • [ASM] VS2013 build 21005
                                                                                • [ C ] VS2013 build 21005
                                                                                • [C++] VS2013 build 21005
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                • [ASM] VS2013 UPD4 build 31101
                                                                                • [RES] VS2013 build 21005
                                                                                • [LNK] VS2013 UPD4 build 31101
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5a5e0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1220000x711c.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0xc70000x5a5e00x5a6002a355dae68ccc21094706991740dc2a9False0.9278478345435685data7.893373974188122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x1220000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                                RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                                RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                RT_RCDATA0xcf7b80x518a7data1.0003323442847263
                                                                                RT_GROUP_ICON0x1210600x76dataEnglishGreat Britain0.6610169491525424
                                                                                RT_GROUP_ICON0x1210d80x14dataEnglishGreat Britain1.25
                                                                                RT_GROUP_ICON0x1210ec0x14dataEnglishGreat Britain1.15
                                                                                RT_GROUP_ICON0x1211000x14dataEnglishGreat Britain1.25
                                                                                RT_VERSION0x1211140xdcdataEnglishGreat Britain0.6181818181818182
                                                                                RT_MANIFEST0x1211f00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                DLLImport
                                                                                WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                                VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                                WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                                USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                                UxTheme.dllIsThemeActive
                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                                USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                                GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                                COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                                OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishGreat Britain
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 5, 2024 09:18:06.210355043 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:06.210393906 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:06.210467100 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:06.216805935 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:06.216820955 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.431632996 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.431706905 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:07.435863972 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:07.435873985 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.436093092 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.481178045 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:07.492579937 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:07.539333105 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.871265888 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.871320963 CET44349704104.26.12.205192.168.2.5
                                                                                Dec 5, 2024 09:18:07.871400118 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:07.876604080 CET49704443192.168.2.5104.26.12.205
                                                                                Dec 5, 2024 09:18:08.713423014 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:08.833177090 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:08.836838007 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:10.025178909 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:10.025374889 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:10.145406008 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:10.402276039 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:10.402642965 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:10.522397995 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:10.783085108 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:10.785145998 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:10.905009985 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.170154095 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.170171022 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.170201063 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.170311928 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:11.170314074 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.170346022 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:11.361989975 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.393311977 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:11.513087034 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.770287991 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.783282042 CET49705587192.168.2.550.87.139.143
                                                                                Dec 5, 2024 09:18:11.903539896 CET5874970550.87.139.143192.168.2.5
                                                                                Dec 5, 2024 09:18:11.903589964 CET49705587192.168.2.550.87.139.143
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 5, 2024 09:18:06.067688942 CET5637453192.168.2.51.1.1.1
                                                                                Dec 5, 2024 09:18:06.205092907 CET53563741.1.1.1192.168.2.5
                                                                                Dec 5, 2024 09:18:08.326958895 CET5734453192.168.2.51.1.1.1
                                                                                Dec 5, 2024 09:18:08.709327936 CET53573441.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Dec 5, 2024 09:18:06.067688942 CET192.168.2.51.1.1.10x5ccdStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                Dec 5, 2024 09:18:08.326958895 CET192.168.2.51.1.1.10xc13dStandard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Dec 5, 2024 09:18:06.205092907 CET1.1.1.1192.168.2.50x5ccdNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                Dec 5, 2024 09:18:06.205092907 CET1.1.1.1192.168.2.50x5ccdNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                Dec 5, 2024 09:18:06.205092907 CET1.1.1.1192.168.2.50x5ccdNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                Dec 5, 2024 09:18:08.709327936 CET1.1.1.1192.168.2.50xc13dNo error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                                                                • api.ipify.org
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549704104.26.12.2054435648C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-05 08:18:07 UTC155OUTGET / HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                Host: api.ipify.org
                                                                                Connection: Keep-Alive
                                                                                2024-12-05 08:18:07 UTC424INHTTP/1.1 200 OK
                                                                                Date: Thu, 05 Dec 2024 08:18:07 GMT
                                                                                Content-Type: text/plain
                                                                                Content-Length: 12
                                                                                Connection: close
                                                                                Vary: Origin
                                                                                CF-Cache-Status: DYNAMIC
                                                                                Server: cloudflare
                                                                                CF-RAY: 8ed29a8e2fea43da-EWR
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1556&min_rtt=1541&rtt_var=608&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1757977&cwnd=203&unsent_bytes=0&cid=d52c6b9a792f1751&ts=448&x=0"
                                                                                2024-12-05 08:18:07 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                                                Data Ascii: 8.46.123.228


                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                Dec 5, 2024 09:18:10.025178909 CET5874970550.87.139.143192.168.2.5220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Thu, 05 Dec 2024 01:18:09 -0700
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Dec 5, 2024 09:18:10.025374889 CET49705587192.168.2.550.87.139.143EHLO 066656
                                                                                Dec 5, 2024 09:18:10.402276039 CET5874970550.87.139.143192.168.2.5250-box2248.bluehost.com Hello 066656 [8.46.123.228]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPECONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Dec 5, 2024 09:18:10.402642965 CET49705587192.168.2.550.87.139.143STARTTLS
                                                                                Dec 5, 2024 09:18:10.783085108 CET5874970550.87.139.143192.168.2.5220 TLS go ahead

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:03:18:01
                                                                                Start date:05/12/2024
                                                                                Path:C:\Users\user\Desktop\RFQ.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\RFQ.exe"
                                                                                Imagebase:0xf20000
                                                                                File size:1'191'424 bytes
                                                                                MD5 hash:3861B9E7E90136630BA57296DB976C82
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2120151998.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:03:18:04
                                                                                Start date:05/12/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\RFQ.exe"
                                                                                Imagebase:0x7e0000
                                                                                File size:45'984 bytes
                                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3337432346.0000000002DF6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3338726977.0000000003D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3339437325.0000000005230000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3337432346.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3337432346.0000000002DC4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3339308886.0000000005120000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3337125429.000000000291E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.3336154686.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:3
                                                                                Start time:03:18:16
                                                                                Start date:05/12/2024
                                                                                Path:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                                                                                Imagebase:0xb00000
                                                                                File size:45'984 bytes
                                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:4
                                                                                Start time:03:18:16
                                                                                Start date:05/12/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6d64d0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:03:18:24
                                                                                Start date:05/12/2024
                                                                                Path:C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Ycdwx\Ycdwx.exe"
                                                                                Imagebase:0xb50000
                                                                                File size:45'984 bytes
                                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:03:18:24
                                                                                Start date:05/12/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6d64d0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:3.8%
                                                                                  Dynamic/Decrypted Code Coverage:1.3%
                                                                                  Signature Coverage:6.6%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:177
                                                                                  execution_graph 104036 f23633 104037 f2366a 104036->104037 104038 f236e7 104037->104038 104039 f23688 104037->104039 104076 f236e5 104037->104076 104041 f5d0cc 104038->104041 104042 f236ed 104038->104042 104043 f23695 104039->104043 104044 f2374b PostQuitMessage 104039->104044 104040 f236ca DefWindowProcW 104078 f236d8 104040->104078 104091 f31070 10 API calls Mailbox 104041->104091 104045 f236f2 104042->104045 104046 f23715 SetTimer RegisterWindowMessageW 104042->104046 104048 f5d154 104043->104048 104049 f236a0 104043->104049 104044->104078 104050 f5d06f 104045->104050 104051 f236f9 KillTimer 104045->104051 104053 f2373e CreatePopupMenu 104046->104053 104046->104078 104107 f82527 71 API calls _memset 104048->104107 104054 f23755 104049->104054 104055 f236a8 104049->104055 104058 f5d074 104050->104058 104059 f5d0a8 MoveWindow 104050->104059 104088 f2443a Shell_NotifyIconW _memset 104051->104088 104052 f5d0f3 104092 f31093 331 API calls Mailbox 104052->104092 104053->104078 104081 f244a0 104054->104081 104062 f236b3 104055->104062 104063 f5d139 104055->104063 104065 f5d097 SetFocus 104058->104065 104066 f5d078 104058->104066 104059->104078 104068 f236be 104062->104068 104069 f5d124 104062->104069 104063->104040 104106 f77c36 59 API calls Mailbox 104063->104106 104064 f5d166 104064->104040 104064->104078 104065->104078 104066->104068 104070 f5d081 104066->104070 104067 f2370c 104089 f23114 DeleteObject DestroyWindow Mailbox 104067->104089 104068->104040 104093 f2443a Shell_NotifyIconW _memset 104068->104093 104105 f82d36 81 API calls _memset 104069->104105 104090 f31070 10 API calls Mailbox 104070->104090 104075 f5d134 104075->104078 104076->104040 104079 f5d118 104094 f2434a 104079->104094 104082 f244b7 _memset 104081->104082 104083 f24539 104081->104083 104108 f2407c 104082->104108 104083->104078 104085 f24522 KillTimer SetTimer 104085->104083 104086 f244de 104086->104085 104087 f5d4ab Shell_NotifyIconW 104086->104087 104087->104085 104088->104067 104089->104078 104090->104078 104091->104052 104092->104068 104093->104079 104095 f24375 _memset 104094->104095 104227 f24182 104095->104227 104097 f243fa 104100 f24430 Shell_NotifyIconW 104097->104100 104101 f24414 Shell_NotifyIconW 104097->104101 104102 f24422 104100->104102 104101->104102 104103 f2407c 61 API calls 104102->104103 104104 f24429 104103->104104 104104->104076 104105->104075 104106->104076 104107->104064 104109 f24098 104108->104109 104129 f2416f Mailbox 104108->104129 104130 f27a16 104109->104130 104112 f240b3 104135 f27bcc 104112->104135 104113 f5d3c8 LoadStringW 104116 f5d3e2 104113->104116 104115 f240c8 104115->104116 104117 f240d9 104115->104117 104118 f27b2e 59 API calls 104116->104118 104119 f240e3 104117->104119 104120 f24174 104117->104120 104123 f5d3ec 104118->104123 104144 f27b2e 104119->104144 104153 f28047 104120->104153 104126 f240ed _memset _wcscpy 104123->104126 104157 f27cab 104123->104157 104125 f5d40e 104128 f27cab 59 API calls 104125->104128 104127 f24155 Shell_NotifyIconW 104126->104127 104127->104129 104128->104126 104129->104086 104164 f40db6 104130->104164 104132 f27a3b 104174 f28029 104132->104174 104136 f27c45 104135->104136 104138 f27bd8 __NMSG_WRITE 104135->104138 104206 f27d2c 104136->104206 104139 f27c13 104138->104139 104140 f27bee 104138->104140 104142 f28029 59 API calls 104139->104142 104205 f27f27 59 API calls Mailbox 104140->104205 104143 f27bf6 _memmove 104142->104143 104143->104115 104145 f27b40 104144->104145 104146 f5ec6b 104144->104146 104214 f27a51 104145->104214 104220 f77bdb 59 API calls _memmove 104146->104220 104149 f27b4c 104149->104126 104150 f5ec75 104151 f28047 59 API calls 104150->104151 104152 f5ec7d Mailbox 104151->104152 104154 f28052 104153->104154 104155 f2805a 104153->104155 104221 f27f77 59 API calls 2 library calls 104154->104221 104155->104126 104158 f27cbf 104157->104158 104159 f5ed4a 104157->104159 104222 f27c50 104158->104222 104160 f28029 59 API calls 104159->104160 104163 f5ed55 __NMSG_WRITE _memmove 104160->104163 104162 f27cca 104162->104125 104166 f40dbe 104164->104166 104167 f40dd8 104166->104167 104169 f40ddc std::exception::exception 104166->104169 104177 f4571c 104166->104177 104194 f433a1 DecodePointer 104166->104194 104167->104132 104195 f4859b RaiseException 104169->104195 104171 f40e06 104196 f484d1 58 API calls _free 104171->104196 104173 f40e18 104173->104132 104175 f40db6 Mailbox 59 API calls 104174->104175 104176 f240a6 104175->104176 104176->104112 104176->104113 104178 f45797 104177->104178 104191 f45728 104177->104191 104203 f433a1 DecodePointer 104178->104203 104180 f4579d 104204 f48b28 58 API calls __getptd_noexit 104180->104204 104183 f4575b RtlAllocateHeap 104183->104191 104193 f4578f 104183->104193 104185 f45783 104201 f48b28 58 API calls __getptd_noexit 104185->104201 104189 f45781 104202 f48b28 58 API calls __getptd_noexit 104189->104202 104190 f45733 104190->104191 104197 f4a16b 58 API calls __NMSG_WRITE 104190->104197 104198 f4a1c8 58 API calls 6 library calls 104190->104198 104199 f4309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104190->104199 104191->104183 104191->104185 104191->104189 104191->104190 104200 f433a1 DecodePointer 104191->104200 104193->104166 104194->104166 104195->104171 104196->104173 104197->104190 104198->104190 104200->104191 104201->104189 104202->104193 104203->104180 104204->104193 104205->104143 104207 f27d43 _memmove 104206->104207 104208 f27d3a 104206->104208 104207->104143 104208->104207 104210 f27e4f 104208->104210 104211 f27e62 104210->104211 104213 f27e5f _memmove 104210->104213 104212 f40db6 Mailbox 59 API calls 104211->104212 104212->104213 104213->104207 104215 f27a5f 104214->104215 104216 f27a85 _memmove 104214->104216 104215->104216 104217 f40db6 Mailbox 59 API calls 104215->104217 104216->104149 104218 f27ad4 104217->104218 104219 f40db6 Mailbox 59 API calls 104218->104219 104219->104216 104220->104150 104221->104155 104223 f27c5f __NMSG_WRITE 104222->104223 104224 f27c70 _memmove 104223->104224 104225 f28029 59 API calls 104223->104225 104224->104162 104226 f5ed07 _memmove 104225->104226 104228 f24196 104227->104228 104229 f5d423 104227->104229 104228->104097 104231 f82f94 62 API calls _W_store_winword 104228->104231 104229->104228 104230 f5d42c DestroyIcon 104229->104230 104230->104228 104231->104097 104232 f47c56 104233 f47c62 __alloc_osfhnd 104232->104233 104269 f49e08 GetStartupInfoW 104233->104269 104235 f47c67 104271 f48b7c GetProcessHeap 104235->104271 104237 f47cbf 104238 f47cca 104237->104238 104354 f47da6 58 API calls 3 library calls 104237->104354 104272 f49ae6 104238->104272 104241 f47cd0 104242 f47cdb __RTC_Initialize 104241->104242 104355 f47da6 58 API calls 3 library calls 104241->104355 104293 f4d5d2 104242->104293 104245 f47cea 104246 f47cf6 GetCommandLineW 104245->104246 104356 f47da6 58 API calls 3 library calls 104245->104356 104312 f54f23 GetEnvironmentStringsW 104246->104312 104249 f47cf5 104249->104246 104252 f47d10 104253 f47d1b 104252->104253 104357 f430b5 58 API calls 3 library calls 104252->104357 104322 f54d58 104253->104322 104256 f47d21 104257 f47d2c 104256->104257 104358 f430b5 58 API calls 3 library calls 104256->104358 104336 f430ef 104257->104336 104260 f47d34 104261 f47d3f __wwincmdln 104260->104261 104359 f430b5 58 API calls 3 library calls 104260->104359 104342 f247d0 104261->104342 104264 f47d53 104265 f47d62 104264->104265 104360 f43358 58 API calls _doexit 104264->104360 104361 f430e0 58 API calls _doexit 104265->104361 104268 f47d67 __alloc_osfhnd 104270 f49e1e 104269->104270 104270->104235 104271->104237 104362 f43187 36 API calls 2 library calls 104272->104362 104274 f49aeb 104363 f49d3c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 104274->104363 104276 f49af0 104277 f49af4 104276->104277 104365 f49d8a TlsAlloc 104276->104365 104364 f49b5c 61 API calls 2 library calls 104277->104364 104280 f49af9 104280->104241 104281 f49b06 104281->104277 104282 f49b11 104281->104282 104366 f487d5 104282->104366 104285 f49b53 104374 f49b5c 61 API calls 2 library calls 104285->104374 104288 f49b58 104288->104241 104289 f49b32 104289->104285 104290 f49b38 104289->104290 104373 f49a33 58 API calls 4 library calls 104290->104373 104292 f49b40 GetCurrentThreadId 104292->104241 104294 f4d5de __alloc_osfhnd 104293->104294 104386 f49c0b 104294->104386 104296 f4d5e5 104297 f487d5 __calloc_crt 58 API calls 104296->104297 104298 f4d5f6 104297->104298 104299 f4d661 GetStartupInfoW 104298->104299 104300 f4d601 __alloc_osfhnd @_EH4_CallFilterFunc@8 104298->104300 104305 f4d7a5 104299->104305 104308 f4d676 104299->104308 104300->104245 104301 f4d86d 104395 f4d87d LeaveCriticalSection _doexit 104301->104395 104303 f487d5 __calloc_crt 58 API calls 104303->104308 104304 f4d7f2 GetStdHandle 104304->104305 104305->104301 104305->104304 104307 f4d805 GetFileType 104305->104307 104394 f49e2b InitializeCriticalSectionAndSpinCount 104305->104394 104306 f4d6c4 104306->104305 104309 f4d6f8 GetFileType 104306->104309 104393 f49e2b InitializeCriticalSectionAndSpinCount 104306->104393 104307->104305 104308->104303 104308->104305 104308->104306 104309->104306 104313 f54f34 104312->104313 104314 f47d06 104312->104314 104435 f4881d 58 API calls 2 library calls 104313->104435 104318 f54b1b GetModuleFileNameW 104314->104318 104316 f54f5a _memmove 104317 f54f70 FreeEnvironmentStringsW 104316->104317 104317->104314 104319 f54b4f _wparse_cmdline 104318->104319 104321 f54b8f _wparse_cmdline 104319->104321 104436 f4881d 58 API calls 2 library calls 104319->104436 104321->104252 104323 f54d71 __NMSG_WRITE 104322->104323 104327 f54d69 104322->104327 104324 f487d5 __calloc_crt 58 API calls 104323->104324 104332 f54d9a __NMSG_WRITE 104324->104332 104325 f54df1 104326 f42d55 _free 58 API calls 104325->104326 104326->104327 104327->104256 104328 f487d5 __calloc_crt 58 API calls 104328->104332 104329 f54e16 104330 f42d55 _free 58 API calls 104329->104330 104330->104327 104332->104325 104332->104327 104332->104328 104332->104329 104333 f54e2d 104332->104333 104437 f54607 58 API calls __write 104332->104437 104438 f48dc6 IsProcessorFeaturePresent 104333->104438 104335 f54e39 104335->104256 104337 f430fb __IsNonwritableInCurrentImage 104336->104337 104461 f4a4d1 104337->104461 104339 f43119 __initterm_e 104341 f43138 _doexit __IsNonwritableInCurrentImage 104339->104341 104464 f42d40 104339->104464 104341->104260 104343 f247ea 104342->104343 104353 f24889 104342->104353 104344 f24824 IsThemeActive 104343->104344 104499 f4336c 104344->104499 104348 f24850 104511 f248fd SystemParametersInfoW SystemParametersInfoW 104348->104511 104350 f2485c 104512 f23b3a 104350->104512 104352 f24864 SystemParametersInfoW 104352->104353 104353->104264 104354->104238 104355->104242 104356->104249 104360->104265 104361->104268 104362->104274 104363->104276 104364->104280 104365->104281 104367 f487dc 104366->104367 104369 f48817 104367->104369 104371 f487fa 104367->104371 104375 f551f6 104367->104375 104369->104285 104372 f49de6 TlsSetValue 104369->104372 104371->104367 104371->104369 104383 f4a132 Sleep 104371->104383 104372->104289 104373->104292 104374->104288 104376 f55201 104375->104376 104377 f5521c 104375->104377 104376->104377 104378 f5520d 104376->104378 104379 f5522c HeapAlloc 104377->104379 104381 f55212 104377->104381 104385 f433a1 DecodePointer 104377->104385 104384 f48b28 58 API calls __getptd_noexit 104378->104384 104379->104377 104379->104381 104381->104367 104383->104371 104384->104381 104385->104377 104387 f49c1c 104386->104387 104388 f49c2f EnterCriticalSection 104386->104388 104396 f49c93 104387->104396 104388->104296 104390 f49c22 104390->104388 104420 f430b5 58 API calls 3 library calls 104390->104420 104393->104306 104394->104305 104395->104300 104397 f49c9f __alloc_osfhnd 104396->104397 104398 f49cc0 104397->104398 104399 f49ca8 104397->104399 104413 f49ce1 __alloc_osfhnd 104398->104413 104424 f4881d 58 API calls 2 library calls 104398->104424 104421 f4a16b 58 API calls __NMSG_WRITE 104399->104421 104401 f49cad 104422 f4a1c8 58 API calls 6 library calls 104401->104422 104404 f49cd5 104406 f49cdc 104404->104406 104407 f49ceb 104404->104407 104405 f49cb4 104423 f4309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104405->104423 104425 f48b28 58 API calls __getptd_noexit 104406->104425 104410 f49c0b __lock 58 API calls 104407->104410 104411 f49cf2 104410->104411 104414 f49d17 104411->104414 104415 f49cff 104411->104415 104413->104390 104427 f42d55 104414->104427 104426 f49e2b InitializeCriticalSectionAndSpinCount 104415->104426 104418 f49d0b 104433 f49d33 LeaveCriticalSection _doexit 104418->104433 104421->104401 104422->104405 104424->104404 104425->104413 104426->104418 104428 f42d5e RtlFreeHeap 104427->104428 104429 f42d87 _free 104427->104429 104428->104429 104430 f42d73 104428->104430 104429->104418 104434 f48b28 58 API calls __getptd_noexit 104430->104434 104432 f42d79 GetLastError 104432->104429 104433->104413 104434->104432 104435->104316 104436->104321 104437->104332 104439 f48dd1 104438->104439 104444 f48c59 104439->104444 104443 f48dec 104443->104335 104445 f48c73 _memset ___raise_securityfailure 104444->104445 104446 f48c93 IsDebuggerPresent 104445->104446 104452 f4a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104446->104452 104449 f48d57 ___raise_securityfailure 104453 f4c5f6 104449->104453 104450 f48d7a 104451 f4a140 GetCurrentProcess TerminateProcess 104450->104451 104451->104443 104452->104449 104454 f4c600 IsProcessorFeaturePresent 104453->104454 104455 f4c5fe 104453->104455 104457 f5590a 104454->104457 104455->104450 104460 f558b9 5 API calls ___raise_securityfailure 104457->104460 104459 f559ed 104459->104450 104460->104459 104462 f4a4d4 EncodePointer 104461->104462 104462->104462 104463 f4a4ee 104462->104463 104463->104339 104467 f42c44 104464->104467 104466 f42d4b 104466->104341 104468 f42c50 __alloc_osfhnd 104467->104468 104475 f43217 104468->104475 104474 f42c77 __alloc_osfhnd 104474->104466 104476 f49c0b __lock 58 API calls 104475->104476 104477 f42c59 104476->104477 104478 f42c88 DecodePointer DecodePointer 104477->104478 104479 f42cb5 104478->104479 104480 f42c65 104478->104480 104479->104480 104492 f487a4 59 API calls __write 104479->104492 104489 f42c82 104480->104489 104482 f42d18 EncodePointer EncodePointer 104482->104480 104483 f42cc7 104483->104482 104484 f42cec 104483->104484 104493 f48864 61 API calls __realloc_crt 104483->104493 104484->104480 104488 f42d06 EncodePointer 104484->104488 104494 f48864 61 API calls __realloc_crt 104484->104494 104487 f42d00 104487->104480 104487->104488 104488->104482 104495 f43220 104489->104495 104492->104483 104493->104484 104494->104487 104498 f49d75 LeaveCriticalSection 104495->104498 104497 f42c87 104497->104474 104498->104497 104500 f49c0b __lock 58 API calls 104499->104500 104501 f43377 DecodePointer EncodePointer 104500->104501 104564 f49d75 LeaveCriticalSection 104501->104564 104503 f24849 104504 f433d4 104503->104504 104505 f433de 104504->104505 104506 f433f8 104504->104506 104505->104506 104565 f48b28 58 API calls __getptd_noexit 104505->104565 104506->104348 104508 f433e8 104566 f48db6 9 API calls __write 104508->104566 104510 f433f3 104510->104348 104511->104350 104513 f23b47 __write_nolock 104512->104513 104567 f27667 104513->104567 104517 f23b7a IsDebuggerPresent 104518 f5d272 MessageBoxA 104517->104518 104519 f23b88 104517->104519 104521 f5d28c 104518->104521 104519->104521 104522 f23ba5 104519->104522 104551 f23c61 104519->104551 104520 f23c68 SetCurrentDirectoryW 104525 f23c75 Mailbox 104520->104525 104771 f27213 59 API calls Mailbox 104521->104771 104653 f27285 104522->104653 104525->104352 104526 f5d29c 104531 f5d2b2 SetCurrentDirectoryW 104526->104531 104528 f23bc3 GetFullPathNameW 104529 f27bcc 59 API calls 104528->104529 104530 f23bfe 104529->104530 104669 f3092d 104530->104669 104531->104525 104534 f23c1c 104535 f23c26 104534->104535 104772 f7874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104534->104772 104685 f23a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104535->104685 104538 f5d2cf 104538->104535 104541 f5d2e0 104538->104541 104773 f24706 104541->104773 104542 f23c30 104544 f23c43 104542->104544 104546 f2434a 68 API calls 104542->104546 104693 f309d0 104544->104693 104545 f5d2e8 104780 f27de1 104545->104780 104546->104544 104551->104520 104564->104503 104565->104508 104566->104510 104568 f40db6 Mailbox 59 API calls 104567->104568 104569 f27688 104568->104569 104570 f40db6 Mailbox 59 API calls 104569->104570 104571 f23b51 GetCurrentDirectoryW 104570->104571 104572 f23766 104571->104572 104573 f27667 59 API calls 104572->104573 104574 f2377c 104573->104574 104784 f23d31 104574->104784 104576 f2379a 104577 f24706 61 API calls 104576->104577 104578 f237ae 104577->104578 104579 f27de1 59 API calls 104578->104579 104580 f237bb 104579->104580 104798 f24ddd 104580->104798 104583 f5d173 104865 f8955b 104583->104865 104584 f237dc Mailbox 104588 f28047 59 API calls 104584->104588 104587 f5d192 104590 f42d55 _free 58 API calls 104587->104590 104591 f237ef 104588->104591 104592 f5d19f 104590->104592 104822 f2928a 104591->104822 104594 f24e4a 84 API calls 104592->104594 104596 f5d1a8 104594->104596 104600 f23ed0 59 API calls 104596->104600 104597 f27de1 59 API calls 104598 f23808 104597->104598 104825 f284c0 104598->104825 104602 f5d1c3 104600->104602 104601 f2381a Mailbox 104603 f27de1 59 API calls 104601->104603 104604 f23ed0 59 API calls 104602->104604 104605 f23840 104603->104605 104606 f5d1df 104604->104606 104607 f284c0 69 API calls 104605->104607 104608 f24706 61 API calls 104606->104608 104610 f2384f Mailbox 104607->104610 104609 f5d204 104608->104609 104611 f23ed0 59 API calls 104609->104611 104613 f27667 59 API calls 104610->104613 104612 f5d210 104611->104612 104614 f28047 59 API calls 104612->104614 104615 f2386d 104613->104615 104616 f5d21e 104614->104616 104829 f23ed0 104615->104829 104618 f23ed0 59 API calls 104616->104618 104620 f5d22d 104618->104620 104626 f28047 59 API calls 104620->104626 104622 f23887 104622->104596 104623 f23891 104622->104623 104624 f42efd _W_store_winword 60 API calls 104623->104624 104625 f2389c 104624->104625 104625->104602 104627 f238a6 104625->104627 104628 f5d24f 104626->104628 104629 f42efd _W_store_winword 60 API calls 104627->104629 104630 f23ed0 59 API calls 104628->104630 104631 f238b1 104629->104631 104632 f5d25c 104630->104632 104631->104606 104633 f238bb 104631->104633 104632->104632 104634 f42efd _W_store_winword 60 API calls 104633->104634 104635 f238c6 104634->104635 104635->104620 104636 f23907 104635->104636 104638 f23ed0 59 API calls 104635->104638 104636->104620 104637 f23914 104636->104637 104845 f292ce 104637->104845 104640 f238ea 104638->104640 104642 f28047 59 API calls 104640->104642 104644 f238f8 104642->104644 104646 f23ed0 59 API calls 104644->104646 104646->104636 104648 f2928a 59 API calls 104650 f2394f 104648->104650 104649 f28ee0 60 API calls 104649->104650 104650->104648 104650->104649 104651 f23ed0 59 API calls 104650->104651 104652 f23995 Mailbox 104650->104652 104651->104650 104652->104517 104654 f27292 __write_nolock 104653->104654 104655 f5ea22 _memset 104654->104655 104656 f272ab 104654->104656 104659 f5ea3e GetOpenFileNameW 104655->104659 105749 f24750 104656->105749 104661 f5ea8d 104659->104661 104663 f27bcc 59 API calls 104661->104663 104665 f5eaa2 104663->104665 104665->104665 104666 f272c9 105777 f2686a 104666->105777 104670 f3093a __write_nolock 104669->104670 106039 f26d80 104670->106039 104672 f3093f 104684 f23c14 104672->104684 106050 f3119e 89 API calls 104672->106050 104674 f3094c 104674->104684 106051 f33ee7 91 API calls Mailbox 104674->106051 104676 f30955 104677 f30959 GetFullPathNameW 104676->104677 104676->104684 104678 f27bcc 59 API calls 104677->104678 104679 f30985 104678->104679 104680 f27bcc 59 API calls 104679->104680 104681 f30992 104680->104681 104682 f64cab _wcscat 104681->104682 104683 f27bcc 59 API calls 104681->104683 104683->104684 104684->104526 104684->104534 104686 f23ab0 LoadImageW RegisterClassExW 104685->104686 104687 f5d261 104685->104687 106084 f23041 7 API calls 104686->106084 106085 f247a0 LoadImageW EnumResourceNamesW 104687->106085 104690 f23b34 104692 f239d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104690->104692 104691 f5d26a 104692->104542 104694 f64cc3 104693->104694 104707 f309f5 104693->104707 106225 f89e4a 89 API calls 4 library calls 104694->106225 104696 f30ce4 104701 f30a4b PeekMessageW 104738 f30a05 Mailbox 104701->104738 104707->104738 106226 f29e5d 60 API calls 104707->106226 106227 f76349 331 API calls 104707->106227 104708 f64e81 Sleep 104708->104738 104712 f64d50 TranslateAcceleratorW 104714 f30e43 PeekMessageW 104712->104714 104712->104738 104713 f29e5d 60 API calls 104713->104738 104714->104738 104715 f30ea5 TranslateMessage DispatchMessageW 104715->104714 104716 f6581f WaitForSingleObject 104716->104738 104718 f40db6 59 API calls Mailbox 104718->104738 104719 f30d13 timeGetTime 104719->104738 104721 f30e5f Sleep 104742 f30e70 Mailbox 104721->104742 104722 f28047 59 API calls 104722->104738 104724 f30f95 104725 f65af8 Sleep 104725->104742 104729 f30f4e timeGetTime 104738->104696 104738->104701 104738->104708 104738->104712 104738->104713 104738->104714 104738->104715 104738->104716 104738->104718 104738->104719 104738->104721 104738->104722 104738->104724 104738->104725 104738->104729 104738->104742 104755 f89e4a 89 API calls 104738->104755 104757 f29c90 59 API calls Mailbox 104738->104757 104758 f29ea0 304 API calls 104738->104758 104759 f284c0 69 API calls 104738->104759 104760 f2b73c 304 API calls 104738->104760 104762 f7617e 59 API calls Mailbox 104738->104762 104763 f289b3 69 API calls 104738->104763 104764 f655d5 VariantClear 104738->104764 104765 f76e8f 59 API calls 104738->104765 104766 f6566b VariantClear 104738->104766 104767 f28cd4 59 API calls Mailbox 104738->104767 104768 f65419 VariantClear 104738->104768 104769 f27de1 59 API calls 104738->104769 106086 f2e6a0 104738->106086 106117 f2f460 104738->106117 106136 f231ce 104738->106136 106141 f2e420 331 API calls 104738->106141 106142 f2fce0 104738->106142 106228 fa6018 59 API calls 104738->106228 106229 f89a15 59 API calls Mailbox 104738->106229 106230 f7d4f2 59 API calls 104738->106230 106231 f29837 104738->106231 106249 f760ef 59 API calls 2 library calls 104738->106249 106250 f28401 59 API calls 104738->106250 106251 f282df 104738->106251 104742->104724 104742->104738 104755->104738 104757->104738 104758->104738 104759->104738 104760->104738 104762->104738 104763->104738 104764->104738 104765->104738 104766->104738 104767->104738 104768->104738 104769->104738 104771->104526 104772->104538 104774 f51940 __write_nolock 104773->104774 104775 f24713 GetModuleFileNameW 104774->104775 104776 f27de1 59 API calls 104775->104776 104777 f24739 104776->104777 104778 f24750 60 API calls 104777->104778 104779 f24743 Mailbox 104778->104779 104779->104545 104785 f23d3e __write_nolock 104784->104785 104786 f27bcc 59 API calls 104785->104786 104790 f23ea4 Mailbox 104785->104790 104788 f23d70 104786->104788 104797 f23da6 Mailbox 104788->104797 104906 f279f2 104788->104906 104789 f23e77 104789->104790 104791 f27de1 59 API calls 104789->104791 104790->104576 104793 f23e98 104791->104793 104792 f27de1 59 API calls 104792->104797 104795 f23f74 59 API calls 104793->104795 104794 f279f2 59 API calls 104794->104797 104795->104790 104797->104789 104797->104790 104797->104792 104797->104794 104909 f23f74 104797->104909 104915 f24bb5 104798->104915 104803 f5d8e6 104806 f24e4a 84 API calls 104803->104806 104804 f24e08 LoadLibraryExW 104925 f24b6a 104804->104925 104808 f5d8ed 104806->104808 104809 f24b6a 3 API calls 104808->104809 104811 f5d8f5 104809->104811 104951 f24f0b 104811->104951 104812 f24e2f 104812->104811 104813 f24e3b 104812->104813 104815 f24e4a 84 API calls 104813->104815 104817 f237d4 104815->104817 104817->104583 104817->104584 104819 f5d91c 104959 f24ec7 104819->104959 104821 f5d929 104823 f40db6 Mailbox 59 API calls 104822->104823 104824 f237fb 104823->104824 104824->104597 104826 f284cb 104825->104826 104828 f284f2 104826->104828 105389 f289b3 69 API calls Mailbox 104826->105389 104828->104601 104830 f23ef3 104829->104830 104831 f23eda 104829->104831 104832 f27bcc 59 API calls 104830->104832 104833 f28047 59 API calls 104831->104833 104834 f23879 104832->104834 104833->104834 104835 f42efd 104834->104835 104836 f42f7e 104835->104836 104837 f42f09 104835->104837 105392 f42f90 60 API calls 3 library calls 104836->105392 104844 f42f2e 104837->104844 105390 f48b28 58 API calls __getptd_noexit 104837->105390 104840 f42f8b 104840->104622 104841 f42f15 105391 f48db6 9 API calls __write 104841->105391 104843 f42f20 104843->104622 104844->104622 104846 f292d6 104845->104846 104847 f40db6 Mailbox 59 API calls 104846->104847 104848 f292e4 104847->104848 104849 f23924 104848->104849 105393 f291fc 59 API calls Mailbox 104848->105393 104851 f29050 104849->104851 105394 f29160 104851->105394 104853 f2905f 104854 f40db6 Mailbox 59 API calls 104853->104854 104855 f23932 104853->104855 104854->104855 104856 f28ee0 104855->104856 104857 f5f17c 104856->104857 104861 f28ef7 104856->104861 104857->104861 105421 f28bdb 59 API calls Mailbox 104857->105421 104859 f29040 105408 f29d3c 104859->105408 104860 f28ff8 104862 f40db6 Mailbox 59 API calls 104860->104862 104861->104859 104861->104860 104864 f28fff 104861->104864 104862->104864 104864->104650 104866 f24ee5 85 API calls 104865->104866 104867 f895ca 104866->104867 105424 f89734 104867->105424 104870 f24f0b 74 API calls 104871 f895f7 104870->104871 104872 f24f0b 74 API calls 104871->104872 104873 f89607 104872->104873 104874 f24f0b 74 API calls 104873->104874 104875 f89622 104874->104875 104876 f24f0b 74 API calls 104875->104876 104877 f8963d 104876->104877 104878 f24ee5 85 API calls 104877->104878 104879 f89654 104878->104879 104880 f4571c __crtGetStringTypeA_stat 58 API calls 104879->104880 104881 f8965b 104880->104881 104882 f4571c __crtGetStringTypeA_stat 58 API calls 104881->104882 104883 f89665 104882->104883 104884 f24f0b 74 API calls 104883->104884 104885 f89679 104884->104885 104886 f89109 GetSystemTimeAsFileTime 104885->104886 104887 f8968c 104886->104887 104888 f896a1 104887->104888 104889 f896b6 104887->104889 104892 f42d55 _free 58 API calls 104888->104892 104890 f8971b 104889->104890 104891 f896bc 104889->104891 104894 f42d55 _free 58 API calls 104890->104894 105430 f88b06 104891->105430 104895 f896a7 104892->104895 104897 f5d186 104894->104897 104898 f42d55 _free 58 API calls 104895->104898 104897->104587 104900 f24e4a 104897->104900 104898->104897 104899 f42d55 _free 58 API calls 104899->104897 104901 f24e54 104900->104901 104903 f24e5b 104900->104903 104902 f453a6 __fcloseall 83 API calls 104901->104902 104902->104903 104904 f24e6a 104903->104904 104905 f24e7b FreeLibrary 104903->104905 104904->104587 104905->104904 104907 f27e4f 59 API calls 104906->104907 104908 f279fd 104907->104908 104908->104788 104910 f23f82 104909->104910 104914 f23fa4 _memmove 104909->104914 104912 f40db6 Mailbox 59 API calls 104910->104912 104911 f40db6 Mailbox 59 API calls 104913 f23fb8 104911->104913 104912->104914 104913->104797 104914->104911 104964 f24c03 104915->104964 104918 f24bf5 104922 f4525b 104918->104922 104919 f24bec FreeLibrary 104919->104918 104920 f24c03 2 API calls 104921 f24bdc 104920->104921 104921->104918 104921->104919 104968 f45270 104922->104968 104924 f24dfc 104924->104803 104924->104804 105126 f24c36 104925->105126 104928 f24b8f 104930 f24ba1 FreeLibrary 104928->104930 104931 f24baa 104928->104931 104929 f24c36 2 API calls 104929->104928 104930->104931 104932 f24c70 104931->104932 104933 f40db6 Mailbox 59 API calls 104932->104933 104934 f24c85 104933->104934 105130 f2522e 104934->105130 104936 f24c91 _memmove 104937 f24ccc 104936->104937 104938 f24dc1 104936->104938 104939 f24d89 104936->104939 104940 f24ec7 69 API calls 104937->104940 105144 f8991b 95 API calls 104938->105144 105133 f24e89 CreateStreamOnHGlobal 104939->105133 104948 f24cd5 104940->104948 104943 f24f0b 74 API calls 104943->104948 104944 f24d69 104944->104812 104946 f5d8a7 104947 f24ee5 85 API calls 104946->104947 104949 f5d8bb 104947->104949 104948->104943 104948->104944 104948->104946 105139 f24ee5 104948->105139 104950 f24f0b 74 API calls 104949->104950 104950->104944 104952 f24f1d 104951->104952 104955 f5d9cd 104951->104955 105168 f455e2 104952->105168 104956 f89109 105366 f88f5f 104956->105366 104958 f8911f 104958->104819 104960 f24ed6 104959->104960 104961 f5d990 104959->104961 105371 f45c60 104960->105371 104963 f24ede 104963->104821 104965 f24bd0 104964->104965 104966 f24c0c LoadLibraryA 104964->104966 104965->104920 104965->104921 104966->104965 104967 f24c1d GetProcAddress 104966->104967 104967->104965 104971 f4527c __alloc_osfhnd 104968->104971 104969 f4528f 105017 f48b28 58 API calls __getptd_noexit 104969->105017 104971->104969 104972 f452c0 104971->104972 104987 f504e8 104972->104987 104973 f45294 105018 f48db6 9 API calls __write 104973->105018 104976 f452c5 104977 f452ce 104976->104977 104978 f452db 104976->104978 105019 f48b28 58 API calls __getptd_noexit 104977->105019 104980 f45305 104978->104980 104981 f452e5 104978->104981 105002 f50607 104980->105002 105020 f48b28 58 API calls __getptd_noexit 104981->105020 104982 f4529f __alloc_osfhnd @_EH4_CallFilterFunc@8 104982->104924 104988 f504f4 __alloc_osfhnd 104987->104988 104989 f49c0b __lock 58 API calls 104988->104989 105000 f50502 104989->105000 104990 f50576 105022 f505fe 104990->105022 104991 f5057d 105027 f4881d 58 API calls 2 library calls 104991->105027 104994 f505f3 __alloc_osfhnd 104994->104976 104995 f50584 104995->104990 105028 f49e2b InitializeCriticalSectionAndSpinCount 104995->105028 104997 f49c93 __mtinitlocknum 58 API calls 104997->105000 104999 f505aa EnterCriticalSection 104999->104990 105000->104990 105000->104991 105000->104997 105025 f46c50 59 API calls __lock 105000->105025 105026 f46cba LeaveCriticalSection LeaveCriticalSection _doexit 105000->105026 105011 f50627 __wopenfile 105002->105011 105003 f50641 105033 f48b28 58 API calls __getptd_noexit 105003->105033 105004 f507fc 105004->105003 105008 f5085f 105004->105008 105006 f50646 105034 f48db6 9 API calls __write 105006->105034 105030 f585a1 105008->105030 105009 f45310 105021 f45332 LeaveCriticalSection LeaveCriticalSection _fseek 105009->105021 105011->105003 105011->105004 105035 f437cb 60 API calls 2 library calls 105011->105035 105013 f507f5 105013->105004 105036 f437cb 60 API calls 2 library calls 105013->105036 105015 f50814 105015->105004 105037 f437cb 60 API calls 2 library calls 105015->105037 105017->104973 105018->104982 105019->104982 105020->104982 105021->104982 105029 f49d75 LeaveCriticalSection 105022->105029 105024 f50605 105024->104994 105025->105000 105026->105000 105027->104995 105028->104999 105029->105024 105038 f57d85 105030->105038 105032 f585ba 105032->105009 105033->105006 105034->105009 105035->105013 105036->105015 105037->105004 105041 f57d91 __alloc_osfhnd 105038->105041 105039 f57da7 105123 f48b28 58 API calls __getptd_noexit 105039->105123 105041->105039 105043 f57ddd 105041->105043 105042 f57dac 105124 f48db6 9 API calls __write 105042->105124 105049 f57e4e 105043->105049 105046 f57df9 105125 f57e22 LeaveCriticalSection __unlock_fhandle 105046->105125 105048 f57db6 __alloc_osfhnd 105048->105032 105050 f57e6e 105049->105050 105051 f444ea __wsopen_nolock 58 API calls 105050->105051 105054 f57e8a 105051->105054 105052 f48dc6 __invoke_watson 8 API calls 105053 f585a0 105052->105053 105056 f57d85 __wsopen_helper 103 API calls 105053->105056 105055 f57ec4 105054->105055 105062 f57ee7 105054->105062 105122 f57fc1 105054->105122 105057 f48af4 __write 58 API calls 105055->105057 105058 f585ba 105056->105058 105059 f57ec9 105057->105059 105058->105046 105060 f48b28 __write 58 API calls 105059->105060 105061 f57ed6 105060->105061 105064 f48db6 __write 9 API calls 105061->105064 105063 f57fa5 105062->105063 105070 f57f83 105062->105070 105065 f48af4 __write 58 API calls 105063->105065 105066 f57ee0 105064->105066 105067 f57faa 105065->105067 105066->105046 105068 f48b28 __write 58 API calls 105067->105068 105069 f57fb7 105068->105069 105071 f48db6 __write 9 API calls 105069->105071 105072 f4d294 __alloc_osfhnd 61 API calls 105070->105072 105071->105122 105073 f58051 105072->105073 105074 f5807e 105073->105074 105075 f5805b 105073->105075 105077 f57cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105074->105077 105076 f48af4 __write 58 API calls 105075->105076 105078 f58060 105076->105078 105085 f580a0 105077->105085 105080 f48b28 __write 58 API calls 105078->105080 105079 f5811e GetFileType 105083 f58129 GetLastError 105079->105083 105084 f5816b 105079->105084 105082 f5806a 105080->105082 105081 f580ec GetLastError 105086 f48b07 __dosmaperr 58 API calls 105081->105086 105087 f48b28 __write 58 API calls 105082->105087 105088 f48b07 __dosmaperr 58 API calls 105083->105088 105094 f4d52a __set_osfhnd 59 API calls 105084->105094 105085->105079 105085->105081 105089 f57cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105085->105089 105090 f58111 105086->105090 105087->105066 105091 f58150 CloseHandle 105088->105091 105093 f580e1 105089->105093 105096 f48b28 __write 58 API calls 105090->105096 105091->105090 105092 f5815e 105091->105092 105095 f48b28 __write 58 API calls 105092->105095 105093->105079 105093->105081 105098 f58189 105094->105098 105097 f58163 105095->105097 105096->105122 105097->105090 105099 f58344 105098->105099 105100 f518c1 __lseeki64_nolock 60 API calls 105098->105100 105110 f5820a 105098->105110 105101 f58517 CloseHandle 105099->105101 105099->105122 105102 f581f3 105100->105102 105103 f57cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105101->105103 105104 f48af4 __write 58 API calls 105102->105104 105102->105110 105106 f5853e 105103->105106 105104->105110 105105 f50e5b 70 API calls __read_nolock 105105->105110 105107 f58546 GetLastError 105106->105107 105108 f58572 105106->105108 105109 f48b07 __dosmaperr 58 API calls 105107->105109 105108->105122 105111 f58552 105109->105111 105110->105099 105110->105105 105112 f50add __close_nolock 61 API calls 105110->105112 105113 f5823c 105110->105113 105114 f518c1 60 API calls __lseeki64_nolock 105110->105114 105117 f4d886 __write 78 API calls 105110->105117 105118 f583c1 105110->105118 105115 f4d43d __free_osfhnd 59 API calls 105111->105115 105112->105110 105113->105110 105116 f597a2 __chsize_nolock 82 API calls 105113->105116 105114->105110 105115->105108 105116->105113 105117->105110 105119 f50add __close_nolock 61 API calls 105118->105119 105120 f583c8 105119->105120 105121 f48b28 __write 58 API calls 105120->105121 105121->105122 105122->105052 105123->105042 105124->105048 105125->105048 105127 f24b83 105126->105127 105128 f24c3f LoadLibraryA 105126->105128 105127->104928 105127->104929 105128->105127 105129 f24c50 GetProcAddress 105128->105129 105129->105127 105131 f40db6 Mailbox 59 API calls 105130->105131 105132 f25240 105131->105132 105132->104936 105134 f24ea3 FindResourceExW 105133->105134 105138 f24ec0 105133->105138 105135 f5d933 LoadResource 105134->105135 105134->105138 105136 f5d948 SizeofResource 105135->105136 105135->105138 105137 f5d95c LockResource 105136->105137 105136->105138 105137->105138 105138->104937 105140 f24ef4 105139->105140 105141 f5d9ab 105139->105141 105145 f4584d 105140->105145 105143 f24f02 105143->104948 105144->104937 105146 f45859 __alloc_osfhnd 105145->105146 105147 f4586b 105146->105147 105149 f45891 105146->105149 105158 f48b28 58 API calls __getptd_noexit 105147->105158 105160 f46c11 105149->105160 105150 f45870 105159 f48db6 9 API calls __write 105150->105159 105153 f45897 105166 f457be 83 API calls 3 library calls 105153->105166 105155 f458a6 105167 f458c8 LeaveCriticalSection LeaveCriticalSection _fseek 105155->105167 105157 f4587b __alloc_osfhnd 105157->105143 105158->105150 105159->105157 105161 f46c21 105160->105161 105162 f46c43 EnterCriticalSection 105160->105162 105161->105162 105163 f46c29 105161->105163 105164 f46c39 105162->105164 105165 f49c0b __lock 58 API calls 105163->105165 105164->105153 105165->105164 105166->105155 105167->105157 105171 f455fd 105168->105171 105170 f24f2e 105170->104956 105172 f45609 __alloc_osfhnd 105171->105172 105173 f4564c 105172->105173 105174 f4561f _memset 105172->105174 105175 f45644 __alloc_osfhnd 105172->105175 105176 f46c11 __lock_file 59 API calls 105173->105176 105198 f48b28 58 API calls __getptd_noexit 105174->105198 105175->105170 105178 f45652 105176->105178 105184 f4541d 105178->105184 105179 f45639 105199 f48db6 9 API calls __write 105179->105199 105185 f45453 105184->105185 105188 f45438 _memset 105184->105188 105200 f45686 LeaveCriticalSection LeaveCriticalSection _fseek 105185->105200 105186 f45443 105296 f48b28 58 API calls __getptd_noexit 105186->105296 105188->105185 105188->105186 105190 f45493 105188->105190 105190->105185 105192 f455a4 _memset 105190->105192 105201 f446e6 105190->105201 105208 f50e5b 105190->105208 105276 f50ba7 105190->105276 105298 f50cc8 58 API calls 3 library calls 105190->105298 105299 f48b28 58 API calls __getptd_noexit 105192->105299 105197 f45448 105297 f48db6 9 API calls __write 105197->105297 105198->105179 105199->105175 105200->105175 105202 f44705 105201->105202 105203 f446f0 105201->105203 105202->105190 105300 f48b28 58 API calls __getptd_noexit 105203->105300 105205 f446f5 105301 f48db6 9 API calls __write 105205->105301 105207 f44700 105207->105190 105209 f50e93 105208->105209 105210 f50e7c 105208->105210 105212 f515cb 105209->105212 105217 f50ecd 105209->105217 105311 f48af4 58 API calls __getptd_noexit 105210->105311 105327 f48af4 58 API calls __getptd_noexit 105212->105327 105213 f50e81 105312 f48b28 58 API calls __getptd_noexit 105213->105312 105215 f515d0 105328 f48b28 58 API calls __getptd_noexit 105215->105328 105219 f50ed5 105217->105219 105225 f50eec 105217->105225 105313 f48af4 58 API calls __getptd_noexit 105219->105313 105220 f50ee1 105329 f48db6 9 API calls __write 105220->105329 105222 f50eda 105314 f48b28 58 API calls __getptd_noexit 105222->105314 105224 f50f01 105315 f48af4 58 API calls __getptd_noexit 105224->105315 105225->105224 105228 f50f1b 105225->105228 105229 f50f39 105225->105229 105256 f50e88 105225->105256 105228->105224 105233 f50f26 105228->105233 105316 f4881d 58 API calls 2 library calls 105229->105316 105231 f50f49 105234 f50f51 105231->105234 105235 f50f6c 105231->105235 105302 f55c6b 105233->105302 105317 f48b28 58 API calls __getptd_noexit 105234->105317 105319 f518c1 60 API calls 3 library calls 105235->105319 105236 f5103a 105238 f510b3 ReadFile 105236->105238 105243 f51050 GetConsoleMode 105236->105243 105241 f510d5 105238->105241 105242 f51593 GetLastError 105238->105242 105240 f50f56 105318 f48af4 58 API calls __getptd_noexit 105240->105318 105241->105242 105249 f510a5 105241->105249 105245 f51093 105242->105245 105246 f515a0 105242->105246 105247 f51064 105243->105247 105248 f510b0 105243->105248 105263 f51099 105245->105263 105320 f48b07 58 API calls 2 library calls 105245->105320 105325 f48b28 58 API calls __getptd_noexit 105246->105325 105247->105248 105251 f5106a ReadConsoleW 105247->105251 105248->105238 105258 f5110a 105249->105258 105259 f51377 105249->105259 105249->105263 105251->105249 105253 f5108d GetLastError 105251->105253 105252 f515a5 105326 f48af4 58 API calls __getptd_noexit 105252->105326 105253->105245 105256->105190 105257 f42d55 _free 58 API calls 105257->105256 105260 f511f7 105258->105260 105262 f51176 ReadFile 105258->105262 105259->105263 105266 f5147d ReadFile 105259->105266 105260->105263 105265 f512a4 105260->105265 105268 f512b4 105260->105268 105272 f51264 MultiByteToWideChar 105260->105272 105264 f51197 GetLastError 105262->105264 105271 f511a1 105262->105271 105263->105256 105263->105257 105264->105271 105322 f48b28 58 API calls __getptd_noexit 105265->105322 105269 f514a0 GetLastError 105266->105269 105275 f514ae 105266->105275 105268->105272 105323 f518c1 60 API calls 3 library calls 105268->105323 105269->105275 105271->105258 105321 f518c1 60 API calls 3 library calls 105271->105321 105272->105253 105272->105263 105275->105259 105324 f518c1 60 API calls 3 library calls 105275->105324 105277 f50bb2 105276->105277 105280 f50bc7 105276->105280 105363 f48b28 58 API calls __getptd_noexit 105277->105363 105279 f50bb7 105364 f48db6 9 API calls __write 105279->105364 105282 f50bfc 105280->105282 105287 f50bc2 105280->105287 105365 f55fe4 58 API calls __malloc_crt 105280->105365 105284 f446e6 __flush 58 API calls 105282->105284 105285 f50c10 105284->105285 105330 f50d47 105285->105330 105287->105190 105288 f50c17 105288->105287 105289 f446e6 __flush 58 API calls 105288->105289 105290 f50c3a 105289->105290 105290->105287 105291 f446e6 __flush 58 API calls 105290->105291 105292 f50c46 105291->105292 105292->105287 105293 f446e6 __flush 58 API calls 105292->105293 105294 f50c53 105293->105294 105295 f446e6 __flush 58 API calls 105294->105295 105295->105287 105296->105197 105297->105185 105298->105190 105299->105197 105300->105205 105301->105207 105303 f55c76 105302->105303 105304 f55c83 105302->105304 105305 f48b28 __write 58 API calls 105303->105305 105307 f55c8f 105304->105307 105308 f48b28 __write 58 API calls 105304->105308 105306 f55c7b 105305->105306 105306->105236 105307->105236 105309 f55cb0 105308->105309 105310 f48db6 __write 9 API calls 105309->105310 105310->105306 105311->105213 105312->105256 105313->105222 105314->105220 105315->105222 105316->105231 105317->105240 105318->105256 105319->105233 105320->105263 105321->105271 105322->105263 105323->105272 105324->105275 105325->105252 105326->105263 105327->105215 105328->105220 105329->105256 105331 f50d53 __alloc_osfhnd 105330->105331 105332 f50d77 105331->105332 105333 f50d60 105331->105333 105335 f50e3b 105332->105335 105338 f50d8b 105332->105338 105334 f48af4 __write 58 API calls 105333->105334 105337 f50d65 105334->105337 105336 f48af4 __write 58 API calls 105335->105336 105341 f50dae 105336->105341 105342 f48b28 __write 58 API calls 105337->105342 105339 f50db6 105338->105339 105340 f50da9 105338->105340 105344 f50dc3 105339->105344 105345 f50dd8 105339->105345 105343 f48af4 __write 58 API calls 105340->105343 105348 f48b28 __write 58 API calls 105341->105348 105352 f50d6c __alloc_osfhnd 105342->105352 105343->105341 105346 f48af4 __write 58 API calls 105344->105346 105347 f4d206 ___lock_fhandle 59 API calls 105345->105347 105349 f50dc8 105346->105349 105350 f50dde 105347->105350 105351 f50dd0 105348->105351 105353 f48b28 __write 58 API calls 105349->105353 105354 f50e04 105350->105354 105355 f50df1 105350->105355 105358 f48db6 __write 9 API calls 105351->105358 105352->105288 105353->105351 105356 f48b28 __write 58 API calls 105354->105356 105357 f50e5b __read_nolock 70 API calls 105355->105357 105359 f50e09 105356->105359 105360 f50dfd 105357->105360 105358->105352 105361 f48af4 __write 58 API calls 105359->105361 105362 f50e33 __read LeaveCriticalSection 105360->105362 105361->105360 105362->105352 105363->105279 105364->105287 105365->105282 105369 f4520a GetSystemTimeAsFileTime 105366->105369 105368 f88f6e 105368->104958 105370 f45238 __aulldiv 105369->105370 105370->105368 105372 f45c6c __alloc_osfhnd 105371->105372 105373 f45c93 105372->105373 105374 f45c7e 105372->105374 105376 f46c11 __lock_file 59 API calls 105373->105376 105385 f48b28 58 API calls __getptd_noexit 105374->105385 105378 f45c99 105376->105378 105377 f45c83 105386 f48db6 9 API calls __write 105377->105386 105387 f458d0 67 API calls 5 library calls 105378->105387 105381 f45ca4 105388 f45cc4 LeaveCriticalSection LeaveCriticalSection _fseek 105381->105388 105383 f45cb6 105384 f45c8e __alloc_osfhnd 105383->105384 105384->104963 105385->105377 105386->105384 105387->105381 105388->105383 105389->104828 105390->104841 105391->104843 105392->104840 105393->104849 105395 f29169 Mailbox 105394->105395 105396 f5f19f 105395->105396 105401 f29173 105395->105401 105397 f40db6 Mailbox 59 API calls 105396->105397 105398 f5f1ab 105397->105398 105399 f2917a 105399->104853 105401->105399 105402 f29c90 105401->105402 105405 f29c9b 105402->105405 105403 f29cd2 105403->105401 105405->105403 105407 f28cd4 59 API calls Mailbox 105405->105407 105406 f29cfd 105406->105401 105407->105406 105409 f29d4a 105408->105409 105419 f29d78 Mailbox 105408->105419 105410 f29d9d 105409->105410 105413 f29d50 Mailbox 105409->105413 105411 f28047 59 API calls 105410->105411 105411->105419 105412 f29d64 105414 f29d6f 105412->105414 105415 f29dcc 105412->105415 105412->105419 105413->105412 105418 f5fa0f 105413->105418 105417 f5f9e6 VariantClear 105414->105417 105414->105419 105415->105419 105422 f28cd4 59 API calls Mailbox 105415->105422 105417->105419 105418->105419 105423 f76e8f 59 API calls 105418->105423 105419->104864 105421->104861 105422->105419 105423->105419 105426 f89748 __tzset_nolock _wcscmp 105424->105426 105425 f89109 GetSystemTimeAsFileTime 105425->105426 105426->105425 105427 f24f0b 74 API calls 105426->105427 105428 f895dc 105426->105428 105429 f24ee5 85 API calls 105426->105429 105427->105426 105428->104870 105428->104897 105429->105426 105431 f88b1f 105430->105431 105432 f88b11 105430->105432 105434 f88b64 105431->105434 105435 f4525b 115 API calls 105431->105435 105445 f88b28 105431->105445 105433 f4525b 115 API calls 105432->105433 105433->105431 105461 f88d91 105434->105461 105436 f88b49 105435->105436 105436->105434 105438 f88b52 105436->105438 105442 f453a6 __fcloseall 83 API calls 105438->105442 105438->105445 105439 f88ba8 105440 f88bac 105439->105440 105441 f88bcd 105439->105441 105444 f88bb9 105440->105444 105447 f453a6 __fcloseall 83 API calls 105440->105447 105465 f889a9 105441->105465 105442->105445 105444->105445 105448 f453a6 __fcloseall 83 API calls 105444->105448 105445->104899 105447->105444 105448->105445 105449 f88bfb 105474 f88c2b 105449->105474 105450 f88bdb 105453 f453a6 __fcloseall 83 API calls 105450->105453 105454 f88be8 105450->105454 105453->105454 105454->105445 105456 f453a6 __fcloseall 83 API calls 105454->105456 105456->105445 105458 f88c16 105458->105445 105460 f453a6 __fcloseall 83 API calls 105458->105460 105460->105445 105462 f88d9f __tzset_nolock _memmove 105461->105462 105463 f88db6 105461->105463 105462->105439 105464 f455e2 __fread_nolock 74 API calls 105463->105464 105464->105462 105466 f4571c __crtGetStringTypeA_stat 58 API calls 105465->105466 105467 f889b8 105466->105467 105468 f4571c __crtGetStringTypeA_stat 58 API calls 105467->105468 105469 f889cc 105468->105469 105470 f4571c __crtGetStringTypeA_stat 58 API calls 105469->105470 105471 f889e0 105470->105471 105472 f88d0d 58 API calls 105471->105472 105473 f889f3 105471->105473 105472->105473 105473->105449 105473->105450 105475 f88c40 105474->105475 105476 f88cf8 105475->105476 105477 f88a05 74 API calls 105475->105477 105481 f88c02 105475->105481 105503 f88e12 105475->105503 105511 f88aa1 74 API calls 105475->105511 105507 f88f35 105476->105507 105477->105475 105482 f88d0d 105481->105482 105483 f88d1a 105482->105483 105486 f88d20 105482->105486 105484 f42d55 _free 58 API calls 105483->105484 105484->105486 105485 f42d55 _free 58 API calls 105487 f88d31 105485->105487 105486->105485 105486->105487 105488 f42d55 _free 58 API calls 105487->105488 105489 f88c09 105487->105489 105488->105489 105489->105458 105490 f453a6 105489->105490 105491 f453b2 __alloc_osfhnd 105490->105491 105492 f453c6 105491->105492 105493 f453de 105491->105493 105560 f48b28 58 API calls __getptd_noexit 105492->105560 105496 f46c11 __lock_file 59 API calls 105493->105496 105499 f453d6 __alloc_osfhnd 105493->105499 105495 f453cb 105561 f48db6 9 API calls __write 105495->105561 105498 f453f0 105496->105498 105544 f4533a 105498->105544 105499->105458 105504 f88e61 105503->105504 105505 f88e21 105503->105505 105504->105505 105512 f88ee8 105504->105512 105505->105475 105508 f88f53 105507->105508 105509 f88f42 105507->105509 105508->105481 105510 f44863 80 API calls 105509->105510 105510->105508 105511->105475 105513 f88f25 105512->105513 105514 f88f14 105512->105514 105513->105504 105516 f44863 105514->105516 105517 f4486f __alloc_osfhnd 105516->105517 105518 f4489d __alloc_osfhnd 105517->105518 105519 f448a5 105517->105519 105520 f4488d 105517->105520 105518->105513 105522 f46c11 __lock_file 59 API calls 105519->105522 105541 f48b28 58 API calls __getptd_noexit 105520->105541 105524 f448ab 105522->105524 105523 f44892 105542 f48db6 9 API calls __write 105523->105542 105529 f4470a 105524->105529 105532 f44719 105529->105532 105536 f44737 105529->105536 105530 f44727 105531 f48b28 __write 58 API calls 105530->105531 105533 f4472c 105531->105533 105532->105530 105534 f44751 _memmove 105532->105534 105532->105536 105535 f48db6 __write 9 API calls 105533->105535 105534->105536 105537 f4ae1e __flsbuf 78 API calls 105534->105537 105538 f44a3d __flush 78 API calls 105534->105538 105539 f446e6 __flush 58 API calls 105534->105539 105540 f4d886 __write 78 API calls 105534->105540 105535->105536 105543 f448dd LeaveCriticalSection LeaveCriticalSection _fseek 105536->105543 105537->105534 105538->105534 105539->105534 105540->105534 105541->105523 105542->105518 105543->105518 105545 f4535d 105544->105545 105546 f45349 105544->105546 105548 f45359 105545->105548 105563 f44a3d 105545->105563 105599 f48b28 58 API calls __getptd_noexit 105546->105599 105562 f45415 LeaveCriticalSection LeaveCriticalSection _fseek 105548->105562 105549 f4534e 105600 f48db6 9 API calls __write 105549->105600 105555 f446e6 __flush 58 API calls 105556 f45377 105555->105556 105573 f50a02 105556->105573 105558 f4537d 105558->105548 105559 f42d55 _free 58 API calls 105558->105559 105559->105548 105560->105495 105561->105499 105562->105499 105564 f44a50 105563->105564 105568 f44a74 105563->105568 105565 f446e6 __flush 58 API calls 105564->105565 105564->105568 105566 f44a6d 105565->105566 105601 f4d886 105566->105601 105569 f50b77 105568->105569 105570 f45371 105569->105570 105571 f50b84 105569->105571 105570->105555 105571->105570 105572 f42d55 _free 58 API calls 105571->105572 105572->105570 105574 f50a0e __alloc_osfhnd 105573->105574 105575 f50a32 105574->105575 105576 f50a1b 105574->105576 105578 f50abd 105575->105578 105580 f50a42 105575->105580 105726 f48af4 58 API calls __getptd_noexit 105576->105726 105731 f48af4 58 API calls __getptd_noexit 105578->105731 105579 f50a20 105727 f48b28 58 API calls __getptd_noexit 105579->105727 105583 f50a60 105580->105583 105584 f50a6a 105580->105584 105728 f48af4 58 API calls __getptd_noexit 105583->105728 105587 f4d206 ___lock_fhandle 59 API calls 105584->105587 105585 f50a65 105732 f48b28 58 API calls __getptd_noexit 105585->105732 105589 f50a70 105587->105589 105590 f50a83 105589->105590 105591 f50a8e 105589->105591 105711 f50add 105590->105711 105729 f48b28 58 API calls __getptd_noexit 105591->105729 105592 f50ac9 105733 f48db6 9 API calls __write 105592->105733 105594 f50a27 __alloc_osfhnd 105594->105558 105597 f50a89 105730 f50ab5 LeaveCriticalSection __unlock_fhandle 105597->105730 105599->105549 105600->105548 105602 f4d892 __alloc_osfhnd 105601->105602 105603 f4d8b6 105602->105603 105604 f4d89f 105602->105604 105606 f4d955 105603->105606 105608 f4d8ca 105603->105608 105702 f48af4 58 API calls __getptd_noexit 105604->105702 105708 f48af4 58 API calls __getptd_noexit 105606->105708 105607 f4d8a4 105703 f48b28 58 API calls __getptd_noexit 105607->105703 105611 f4d8f2 105608->105611 105612 f4d8e8 105608->105612 105629 f4d206 105611->105629 105704 f48af4 58 API calls __getptd_noexit 105612->105704 105613 f4d8ed 105709 f48b28 58 API calls __getptd_noexit 105613->105709 105614 f4d8ab __alloc_osfhnd 105614->105568 105617 f4d8f8 105619 f4d91e 105617->105619 105620 f4d90b 105617->105620 105705 f48b28 58 API calls __getptd_noexit 105619->105705 105638 f4d975 105620->105638 105621 f4d961 105710 f48db6 9 API calls __write 105621->105710 105625 f4d917 105707 f4d94d LeaveCriticalSection __unlock_fhandle 105625->105707 105626 f4d923 105706 f48af4 58 API calls __getptd_noexit 105626->105706 105630 f4d212 __alloc_osfhnd 105629->105630 105631 f4d261 EnterCriticalSection 105630->105631 105632 f49c0b __lock 58 API calls 105630->105632 105633 f4d287 __alloc_osfhnd 105631->105633 105634 f4d237 105632->105634 105633->105617 105635 f49e2b __alloc_osfhnd InitializeCriticalSectionAndSpinCount 105634->105635 105637 f4d24f 105634->105637 105635->105637 105636 f4d28b ___lock_fhandle LeaveCriticalSection 105636->105631 105637->105636 105639 f4d982 __write_nolock 105638->105639 105640 f4d9e0 105639->105640 105641 f4d9c1 105639->105641 105669 f4d9b6 105639->105669 105644 f4da38 105640->105644 105645 f4da1c 105640->105645 105643 f48af4 __write 58 API calls 105641->105643 105642 f4c5f6 __except1 6 API calls 105646 f4e1d6 105642->105646 105647 f4d9c6 105643->105647 105649 f4da51 105644->105649 105651 f518c1 __lseeki64_nolock 60 API calls 105644->105651 105648 f48af4 __write 58 API calls 105645->105648 105646->105625 105650 f48b28 __write 58 API calls 105647->105650 105654 f4da21 105648->105654 105653 f55c6b __flsbuf 58 API calls 105649->105653 105652 f4d9cd 105650->105652 105651->105649 105655 f48db6 __write 9 API calls 105652->105655 105656 f4da5f 105653->105656 105657 f48b28 __write 58 API calls 105654->105657 105655->105669 105658 f4ddb8 105656->105658 105663 f499ac __setmbcp 58 API calls 105656->105663 105659 f4da28 105657->105659 105660 f4ddd6 105658->105660 105661 f4e14b WriteFile 105658->105661 105662 f48db6 __write 9 API calls 105659->105662 105664 f4defa 105660->105664 105673 f4ddec 105660->105673 105665 f4ddab GetLastError 105661->105665 105671 f4dd78 105661->105671 105662->105669 105666 f4da8b GetConsoleMode 105663->105666 105676 f4df05 105664->105676 105679 f4dfef 105664->105679 105665->105671 105666->105658 105668 f4daca 105666->105668 105667 f4e184 105667->105669 105670 f48b28 __write 58 API calls 105667->105670 105668->105658 105672 f4dada GetConsoleCP 105668->105672 105669->105642 105677 f4e1b2 105670->105677 105671->105667 105671->105669 105678 f4ded8 105671->105678 105672->105667 105699 f4db09 105672->105699 105673->105667 105674 f4de5b WriteFile 105673->105674 105674->105665 105675 f4de98 105674->105675 105675->105673 105680 f4debc 105675->105680 105676->105667 105681 f4df6a WriteFile 105676->105681 105682 f48af4 __write 58 API calls 105677->105682 105683 f4dee3 105678->105683 105684 f4e17b 105678->105684 105679->105667 105685 f4e064 WideCharToMultiByte 105679->105685 105680->105671 105681->105665 105686 f4dfb9 105681->105686 105682->105669 105687 f48b28 __write 58 API calls 105683->105687 105688 f48b07 __dosmaperr 58 API calls 105684->105688 105685->105665 105694 f4e0ab 105685->105694 105686->105671 105686->105676 105686->105680 105690 f4dee8 105687->105690 105688->105669 105689 f4e0b3 WriteFile 105692 f4e106 GetLastError 105689->105692 105689->105694 105693 f48af4 __write 58 API calls 105690->105693 105691 f435f5 __write_nolock 58 API calls 105691->105699 105692->105694 105693->105669 105694->105671 105694->105679 105694->105680 105694->105689 105695 f57a5e WriteConsoleW CreateFileW __putwch_nolock 105700 f4dc5f 105695->105700 105696 f562ba 60 API calls __write_nolock 105696->105699 105697 f4dbf2 WideCharToMultiByte 105697->105671 105698 f4dc2d WriteFile 105697->105698 105698->105665 105698->105700 105699->105671 105699->105691 105699->105696 105699->105697 105699->105700 105700->105665 105700->105671 105700->105695 105700->105699 105701 f4dc87 WriteFile 105700->105701 105701->105665 105701->105700 105702->105607 105703->105614 105704->105613 105705->105626 105706->105625 105707->105614 105708->105613 105709->105621 105710->105614 105734 f4d4c3 105711->105734 105713 f50b41 105747 f4d43d 59 API calls __write 105713->105747 105714 f50aeb 105714->105713 105716 f50b1f 105714->105716 105719 f4d4c3 __close_nolock 58 API calls 105714->105719 105716->105713 105717 f4d4c3 __close_nolock 58 API calls 105716->105717 105720 f50b2b CloseHandle 105717->105720 105718 f50b49 105721 f50b6b 105718->105721 105748 f48b07 58 API calls 2 library calls 105718->105748 105722 f50b16 105719->105722 105720->105713 105724 f50b37 GetLastError 105720->105724 105721->105597 105723 f4d4c3 __close_nolock 58 API calls 105722->105723 105723->105716 105724->105713 105726->105579 105727->105594 105728->105585 105729->105597 105730->105594 105731->105585 105732->105592 105733->105594 105735 f4d4ce 105734->105735 105737 f4d4e3 105734->105737 105736 f48af4 __write 58 API calls 105735->105736 105739 f4d4d3 105736->105739 105738 f48af4 __write 58 API calls 105737->105738 105741 f4d508 105737->105741 105742 f4d512 105738->105742 105740 f48b28 __write 58 API calls 105739->105740 105743 f4d4db 105740->105743 105741->105714 105744 f48b28 __write 58 API calls 105742->105744 105743->105714 105745 f4d51a 105744->105745 105746 f48db6 __write 9 API calls 105745->105746 105746->105743 105747->105718 105748->105721 105811 f51940 105749->105811 105752 f24799 105817 f27d8c 105752->105817 105753 f2477c 105754 f27bcc 59 API calls 105753->105754 105756 f24788 105754->105756 105813 f27726 105756->105813 105759 f40791 105760 f4079e __write_nolock 105759->105760 105761 f4079f GetLongPathNameW 105760->105761 105762 f27bcc 59 API calls 105761->105762 105763 f272bd 105762->105763 105764 f2700b 105763->105764 105765 f27667 59 API calls 105764->105765 105766 f2701d 105765->105766 105767 f24750 60 API calls 105766->105767 105768 f27028 105767->105768 105769 f5e885 105768->105769 105770 f27033 105768->105770 105775 f5e89f 105769->105775 105827 f27908 61 API calls 105769->105827 105771 f23f74 59 API calls 105770->105771 105773 f2703f 105771->105773 105821 f234c2 105773->105821 105776 f27052 Mailbox 105776->104666 105778 f24ddd 136 API calls 105777->105778 105779 f2688f 105778->105779 105780 f5e031 105779->105780 105781 f24ddd 136 API calls 105779->105781 105782 f8955b 122 API calls 105780->105782 105783 f268a3 105781->105783 105784 f5e046 105782->105784 105783->105780 105787 f268ab 105783->105787 105785 f5e067 105784->105785 105786 f5e04a 105784->105786 105789 f40db6 Mailbox 59 API calls 105785->105789 105788 f24e4a 84 API calls 105786->105788 105790 f268b7 105787->105790 105791 f5e052 105787->105791 105788->105791 105810 f5e0ac Mailbox 105789->105810 105828 f26a8c 105790->105828 105935 f842f8 90 API calls _wprintf 105791->105935 105794 f5e060 105794->105785 105796 f5e260 105797 f42d55 _free 58 API calls 105796->105797 105798 f5e268 105797->105798 105799 f24e4a 84 API calls 105798->105799 105804 f5e271 105799->105804 105803 f42d55 _free 58 API calls 105803->105804 105804->105803 105806 f24e4a 84 API calls 105804->105806 105939 f7f7a1 89 API calls 4 library calls 105804->105939 105806->105804 105807 f27de1 59 API calls 105807->105810 105810->105796 105810->105804 105810->105807 105921 f2750f 105810->105921 105929 f2735d 105810->105929 105936 f7f73d 59 API calls 2 library calls 105810->105936 105937 f7f65e 61 API calls 2 library calls 105810->105937 105938 f8737f 59 API calls Mailbox 105810->105938 105812 f2475d GetFullPathNameW 105811->105812 105812->105752 105812->105753 105814 f27734 105813->105814 105815 f27d2c 59 API calls 105814->105815 105816 f24794 105815->105816 105816->105759 105818 f27da6 105817->105818 105820 f27d99 105817->105820 105819 f40db6 Mailbox 59 API calls 105818->105819 105819->105820 105820->105756 105822 f234d4 105821->105822 105826 f234f3 _memmove 105821->105826 105824 f40db6 Mailbox 59 API calls 105822->105824 105823 f40db6 Mailbox 59 API calls 105825 f2350a 105823->105825 105824->105826 105825->105776 105826->105823 105827->105769 105829 f26ab5 105828->105829 105830 f5e41e 105828->105830 105945 f257a6 60 API calls Mailbox 105829->105945 106012 f7f7a1 89 API calls 4 library calls 105830->106012 105833 f5e431 106013 f7f7a1 89 API calls 4 library calls 105833->106013 105834 f26ad7 105946 f257f6 67 API calls 105834->105946 105836 f26aec 105836->105833 105838 f26af4 105836->105838 105840 f27667 59 API calls 105838->105840 105839 f5e44d 105843 f26b61 105839->105843 105841 f26b00 105840->105841 105947 f40957 60 API calls __write_nolock 105841->105947 105845 f5e460 105843->105845 105846 f26b6f 105843->105846 105844 f26b0c 105847 f27667 59 API calls 105844->105847 105848 f25c6f CloseHandle 105845->105848 105849 f27667 59 API calls 105846->105849 105850 f26b18 105847->105850 105851 f5e46c 105848->105851 105852 f26b78 105849->105852 105853 f24750 60 API calls 105850->105853 105854 f24ddd 136 API calls 105851->105854 105855 f27667 59 API calls 105852->105855 105856 f26b26 105853->105856 105857 f5e488 105854->105857 105858 f26b81 105855->105858 105948 f25850 ReadFile SetFilePointerEx 105856->105948 105861 f5e4b1 105857->105861 105865 f8955b 122 API calls 105857->105865 105950 f2459b 105858->105950 106014 f7f7a1 89 API calls 4 library calls 105861->106014 105862 f26b98 105866 f27b2e 59 API calls 105862->105866 105864 f26b52 105949 f25aee SetFilePointerEx SetFilePointerEx 105864->105949 105869 f5e4a4 105865->105869 105872 f26ba9 SetCurrentDirectoryW 105866->105872 105867 f5e4c8 105899 f26d0c Mailbox 105867->105899 105870 f5e4cd 105869->105870 105871 f5e4ac 105869->105871 105874 f24e4a 84 API calls 105870->105874 105873 f24e4a 84 API calls 105871->105873 105877 f26bbc Mailbox 105872->105877 105873->105861 105875 f5e4d2 105874->105875 105876 f40db6 Mailbox 59 API calls 105875->105876 105883 f5e506 105876->105883 105879 f40db6 Mailbox 59 API calls 105877->105879 105881 f26bcf 105879->105881 105880 f23bbb 105880->104528 105880->104551 105882 f2522e 59 API calls 105881->105882 105884 f2750f 59 API calls 105883->105884 105918 f5e54f Mailbox 105884->105918 105886 f5e740 106019 f872df 59 API calls Mailbox 105886->106019 105892 f5e762 106020 f9fbce 59 API calls 2 library calls 105892->106020 105895 f5e76f 105897 f42d55 _free 58 API calls 105895->105897 105897->105899 105940 f257d4 105899->105940 105901 f2750f 59 API calls 105901->105918 105911 f27de1 59 API calls 105911->105918 105915 f5e792 106021 f7f7a1 89 API calls 4 library calls 105915->106021 105917 f5e7ab 105919 f42d55 _free 58 API calls 105917->105919 105918->105886 105918->105901 105918->105911 105918->105915 106015 f7f73d 59 API calls 2 library calls 105918->106015 106016 f7f65e 61 API calls 2 library calls 105918->106016 106017 f8737f 59 API calls Mailbox 105918->106017 106018 f27213 59 API calls Mailbox 105918->106018 105920 f5e7be 105919->105920 105920->105899 105922 f275af 105921->105922 105928 f27522 _memmove 105921->105928 105924 f40db6 Mailbox 59 API calls 105922->105924 105923 f40db6 Mailbox 59 API calls 105926 f27529 105923->105926 105924->105928 105925 f27552 105925->105810 105926->105925 105927 f40db6 Mailbox 59 API calls 105926->105927 105927->105925 105928->105923 105930 f27370 105929->105930 105933 f2741e 105929->105933 105931 f40db6 Mailbox 59 API calls 105930->105931 105932 f273a2 105930->105932 105931->105932 105932->105933 105934 f40db6 59 API calls Mailbox 105932->105934 105933->105810 105934->105932 105935->105794 105936->105810 105937->105810 105938->105810 105939->105804 105941 f25c6f CloseHandle 105940->105941 105942 f257dc Mailbox 105941->105942 105943 f25c6f CloseHandle 105942->105943 105944 f257eb 105943->105944 105944->105880 105945->105834 105946->105836 105947->105844 105948->105864 105949->105843 105951 f27667 59 API calls 105950->105951 105952 f245b1 105951->105952 105953 f27667 59 API calls 105952->105953 105954 f245b9 105953->105954 105955 f27667 59 API calls 105954->105955 105956 f245c1 105955->105956 105957 f27667 59 API calls 105956->105957 105958 f245c9 105957->105958 105959 f5d4d2 105958->105959 105960 f245fd 105958->105960 105961 f28047 59 API calls 105959->105961 105962 f2784b 59 API calls 105960->105962 105963 f5d4db 105961->105963 105964 f2460b 105962->105964 105965 f27d8c 59 API calls 105963->105965 105966 f27d2c 59 API calls 105964->105966 105968 f24640 105965->105968 105967 f24615 105966->105967 105967->105968 105969 f2784b 59 API calls 105967->105969 105970 f24680 105968->105970 105971 f2465f 105968->105971 105983 f5d4fb 105968->105983 105972 f24636 105969->105972 106024 f2784b 105970->106024 105977 f279f2 59 API calls 105971->105977 105976 f27d2c 59 API calls 105972->105976 105974 f24691 105978 f246a3 105974->105978 105981 f28047 59 API calls 105974->105981 105975 f5d5cb 105979 f27bcc 59 API calls 105975->105979 105976->105968 105980 f24669 105977->105980 105982 f246b3 105978->105982 105984 f28047 59 API calls 105978->105984 105996 f5d588 105979->105996 105980->105970 105987 f2784b 59 API calls 105980->105987 105981->105978 105986 f246ba 105982->105986 105988 f28047 59 API calls 105982->105988 105983->105975 105985 f5d5b4 105983->105985 105995 f5d532 105983->105995 105984->105982 105985->105975 105991 f5d59f 105985->105991 105989 f28047 59 API calls 105986->105989 105998 f246c1 Mailbox 105986->105998 105987->105970 105988->105986 105989->105998 105990 f279f2 59 API calls 105990->105996 105994 f27bcc 59 API calls 105991->105994 105992 f5d590 105993 f27bcc 59 API calls 105992->105993 105993->105996 105994->105996 105995->105992 105999 f5d57b 105995->105999 105996->105970 105996->105990 106037 f27924 59 API calls 2 library calls 105996->106037 105998->105862 106000 f27bcc 59 API calls 105999->106000 106000->105996 106012->105833 106013->105839 106014->105867 106015->105918 106016->105918 106017->105918 106018->105918 106019->105892 106020->105895 106021->105917 106025 f278b7 106024->106025 106026 f2785a 106024->106026 106028 f27d2c 59 API calls 106025->106028 106026->106025 106027 f27865 106026->106027 106029 f27880 106027->106029 106030 f5eb09 106027->106030 106034 f27888 _memmove 106028->106034 106038 f27f27 59 API calls Mailbox 106029->106038 106031 f28029 59 API calls 106030->106031 106033 f5eb13 106031->106033 106035 f40db6 Mailbox 59 API calls 106033->106035 106034->105974 106036 f5eb33 106035->106036 106037->105996 106038->106034 106040 f26d95 106039->106040 106045 f26ea9 106039->106045 106041 f40db6 Mailbox 59 API calls 106040->106041 106040->106045 106042 f26dbc 106041->106042 106043 f40db6 Mailbox 59 API calls 106042->106043 106049 f26e31 106043->106049 106045->104672 106047 f2735d 59 API calls 106047->106049 106048 f2750f 59 API calls 106048->106049 106049->106045 106049->106047 106049->106048 106052 f26240 106049->106052 106077 f76553 59 API calls Mailbox 106049->106077 106050->104674 106051->104676 106053 f27a16 59 API calls 106052->106053 106071 f26265 106053->106071 106054 f2646a 106055 f2750f 59 API calls 106054->106055 106056 f26484 Mailbox 106055->106056 106056->106049 106059 f5dff6 106082 f7f8aa 91 API calls 4 library calls 106059->106082 106060 f27d8c 59 API calls 106060->106071 106061 f2750f 59 API calls 106061->106071 106065 f5e004 106066 f2750f 59 API calls 106065->106066 106067 f5e01a 106066->106067 106067->106056 106068 f26799 _memmove 106083 f7f8aa 91 API calls 4 library calls 106068->106083 106069 f5df92 106070 f28029 59 API calls 106069->106070 106072 f5df9d 106070->106072 106071->106054 106071->106059 106071->106060 106071->106061 106071->106068 106071->106069 106074 f27e4f 59 API calls 106071->106074 106078 f25f6c 60 API calls 106071->106078 106079 f25d41 59 API calls Mailbox 106071->106079 106080 f25e72 60 API calls 106071->106080 106081 f27924 59 API calls 2 library calls 106071->106081 106076 f40db6 Mailbox 59 API calls 106072->106076 106075 f2643b CharUpperBuffW 106074->106075 106075->106071 106076->106068 106077->106049 106078->106071 106079->106071 106080->106071 106081->106071 106082->106065 106083->106056 106084->104690 106085->104691 106141->104738 106225->104707 106226->104707 106227->104707 106228->104738 106229->104738 106230->104738 106249->104738 106250->104738 106640 f5fe27 106653 f3f944 106640->106653 106642 f5fe3d 106643 f5fe53 106642->106643 106644 f5febe 106642->106644 106662 f29e5d 60 API calls 106643->106662 106647 f2fce0 331 API calls 106644->106647 106646 f5fe92 106648 f6089c 106646->106648 106649 f5fe9a 106646->106649 106652 f5feb2 Mailbox 106647->106652 106664 f89e4a 89 API calls 4 library calls 106648->106664 106663 f8834f 59 API calls Mailbox 106649->106663 106654 f3f962 106653->106654 106655 f3f950 106653->106655 106657 f3f991 106654->106657 106658 f3f968 106654->106658 106656 f29d3c 60 API calls 106655->106656 106661 f3f95a 106656->106661 106660 f29d3c 60 API calls 106657->106660 106659 f40db6 Mailbox 59 API calls 106658->106659 106659->106661 106660->106661 106661->106642 106662->106646 106663->106652 106664->106652 106665 f21066 106670 f2f76f 106665->106670 106667 f2106c 106668 f42d40 __cinit 67 API calls 106667->106668 106669 f21076 106668->106669 106671 f2f790 106670->106671 106703 f3ff03 106671->106703 106675 f2f7d7 106676 f27667 59 API calls 106675->106676 106677 f2f7e1 106676->106677 106678 f27667 59 API calls 106677->106678 106679 f2f7eb 106678->106679 106680 f27667 59 API calls 106679->106680 106681 f2f7f5 106680->106681 106682 f27667 59 API calls 106681->106682 106683 f2f833 106682->106683 106684 f27667 59 API calls 106683->106684 106685 f2f8fe 106684->106685 106713 f35f87 106685->106713 106689 f2f930 106690 f27667 59 API calls 106689->106690 106691 f2f93a 106690->106691 106741 f3fd9e 106691->106741 106693 f2f981 106694 f2f991 GetStdHandle 106693->106694 106695 f645ab 106694->106695 106696 f2f9dd 106694->106696 106695->106696 106698 f645b4 106695->106698 106697 f2f9e5 OleInitialize 106696->106697 106697->106667 106748 f86b38 64 API calls Mailbox 106698->106748 106700 f645bb 106749 f87207 CreateThread 106700->106749 106702 f645c7 CloseHandle 106702->106697 106750 f3ffdc 106703->106750 106706 f3ffdc 59 API calls 106707 f3ff45 106706->106707 106708 f27667 59 API calls 106707->106708 106709 f3ff51 106708->106709 106710 f27bcc 59 API calls 106709->106710 106711 f2f796 106710->106711 106712 f40162 6 API calls 106711->106712 106712->106675 106714 f27667 59 API calls 106713->106714 106715 f35f97 106714->106715 106716 f27667 59 API calls 106715->106716 106717 f35f9f 106716->106717 106757 f35a9d 106717->106757 106720 f35a9d 59 API calls 106721 f35faf 106720->106721 106722 f27667 59 API calls 106721->106722 106723 f35fba 106722->106723 106724 f40db6 Mailbox 59 API calls 106723->106724 106725 f2f908 106724->106725 106726 f360f9 106725->106726 106727 f36107 106726->106727 106728 f27667 59 API calls 106727->106728 106729 f36112 106728->106729 106730 f27667 59 API calls 106729->106730 106731 f3611d 106730->106731 106732 f27667 59 API calls 106731->106732 106733 f36128 106732->106733 106734 f27667 59 API calls 106733->106734 106735 f36133 106734->106735 106736 f35a9d 59 API calls 106735->106736 106737 f3613e 106736->106737 106738 f40db6 Mailbox 59 API calls 106737->106738 106739 f36145 RegisterWindowMessageW 106738->106739 106739->106689 106742 f7576f 106741->106742 106743 f3fdae 106741->106743 106760 f89ae7 60 API calls 106742->106760 106744 f40db6 Mailbox 59 API calls 106743->106744 106746 f3fdb6 106744->106746 106746->106693 106747 f7577a 106748->106700 106749->106702 106761 f871ed 65 API calls 106749->106761 106751 f27667 59 API calls 106750->106751 106752 f3ffe7 106751->106752 106753 f27667 59 API calls 106752->106753 106754 f3ffef 106753->106754 106755 f27667 59 API calls 106754->106755 106756 f3ff3b 106755->106756 106756->106706 106758 f27667 59 API calls 106757->106758 106759 f35aa5 106758->106759 106759->106720 106760->106747 106762 f21016 106767 f24974 106762->106767 106765 f42d40 __cinit 67 API calls 106766 f21025 106765->106766 106768 f40db6 Mailbox 59 API calls 106767->106768 106769 f2497c 106768->106769 106770 f2101b 106769->106770 106774 f24936 106769->106774 106770->106765 106775 f24951 106774->106775 106776 f2493f 106774->106776 106778 f249a0 106775->106778 106777 f42d40 __cinit 67 API calls 106776->106777 106777->106775 106779 f27667 59 API calls 106778->106779 106780 f249b8 GetVersionExW 106779->106780 106781 f27bcc 59 API calls 106780->106781 106782 f249fb 106781->106782 106783 f27d2c 59 API calls 106782->106783 106790 f24a28 106782->106790 106784 f24a1c 106783->106784 106785 f27726 59 API calls 106784->106785 106785->106790 106786 f24a93 GetCurrentProcess IsWow64Process 106787 f24aac 106786->106787 106788 f24ac2 106787->106788 106789 f24b2b GetSystemInfo 106787->106789 106802 f24b37 106788->106802 106793 f24af8 106789->106793 106790->106786 106791 f5d864 106790->106791 106793->106770 106795 f24ad4 106797 f24b37 2 API calls 106795->106797 106796 f24b1f GetSystemInfo 106798 f24ae9 106796->106798 106799 f24adc GetNativeSystemInfo 106797->106799 106798->106793 106800 f24aef FreeLibrary 106798->106800 106799->106798 106800->106793 106803 f24ad0 106802->106803 106804 f24b40 LoadLibraryA 106802->106804 106803->106795 106803->106796 106804->106803 106805 f24b51 GetProcAddress 106804->106805 106805->106803 106806 16e95cb 106809 16e9240 106806->106809 106808 16e9617 106822 16e6c70 106809->106822 106812 16e9310 CreateFileW 106813 16e92df 106812->106813 106819 16e931d 106812->106819 106814 16e9339 VirtualAlloc 106813->106814 106813->106819 106820 16e9440 CloseHandle 106813->106820 106821 16e9450 VirtualFree 106813->106821 106825 16ea150 GetPEB 106813->106825 106815 16e935a ReadFile 106814->106815 106814->106819 106816 16e9378 VirtualAlloc 106815->106816 106815->106819 106816->106813 106816->106819 106817 16e952c VirtualFree 106818 16e953a 106817->106818 106818->106808 106819->106817 106819->106818 106820->106813 106821->106813 106827 16ea0f0 GetPEB 106822->106827 106824 16e72fb 106824->106813 106826 16ea17a 106825->106826 106826->106812 106828 16ea11a 106827->106828 106828->106824 106829 f21055 106834 f22649 106829->106834 106832 f42d40 __cinit 67 API calls 106833 f21064 106832->106833 106835 f27667 59 API calls 106834->106835 106836 f226b7 106835->106836 106842 f23582 106836->106842 106838 f5c069 106840 f22754 106840->106838 106841 f2105a 106840->106841 106845 f23416 59 API calls 2 library calls 106840->106845 106841->106832 106846 f235b0 106842->106846 106845->106840 106847 f235a1 106846->106847 106848 f235bd 106846->106848 106847->106840 106848->106847 106849 f235c4 RegOpenKeyExW 106848->106849 106849->106847 106850 f235de RegQueryValueExW 106849->106850 106851 f23614 RegCloseKey 106850->106851 106852 f235ff 106850->106852 106851->106847 106852->106851 106853 f5fdfc 106887 f2ab30 Mailbox _memmove 106853->106887 106855 f7617e Mailbox 59 API calls 106875 f2a057 106855->106875 106856 f29c90 Mailbox 59 API calls 106856->106887 106857 f40db6 59 API calls Mailbox 106857->106887 106860 f2b525 106953 f89e4a 89 API calls 4 library calls 106860->106953 106861 f60055 106952 f89e4a 89 API calls 4 library calls 106861->106952 106862 f40db6 59 API calls Mailbox 106876 f29f37 Mailbox 106862->106876 106865 f2b900 60 API calls 106865->106876 106866 f2b475 106868 f28047 59 API calls 106866->106868 106867 f60064 106868->106875 106869 f2b47a 106869->106861 106882 f609e5 106869->106882 106872 f28047 59 API calls 106872->106876 106874 f27667 59 API calls 106874->106876 106876->106861 106876->106862 106876->106865 106876->106866 106876->106869 106876->106872 106876->106874 106876->106875 106878 f76e8f 59 API calls 106876->106878 106879 f609d6 106876->106879 106880 f42d40 67 API calls __cinit 106876->106880 106883 f2a55a 106876->106883 106949 f2c8c0 331 API calls 2 library calls 106876->106949 106877 f27de1 59 API calls 106877->106887 106878->106876 106956 f89e4a 89 API calls 4 library calls 106879->106956 106880->106876 106957 f89e4a 89 API calls 4 library calls 106882->106957 106955 f89e4a 89 API calls 4 library calls 106883->106955 106884 f9bc6b 331 API calls 106884->106887 106886 f2b2b6 106950 f2f6a3 331 API calls 106886->106950 106887->106856 106887->106857 106887->106860 106887->106875 106887->106876 106887->106877 106887->106884 106887->106886 106889 f29ea0 331 API calls 106887->106889 106890 f6086a 106887->106890 106892 f60878 106887->106892 106894 f6085c 106887->106894 106895 f2b21c 106887->106895 106899 f76e8f 59 API calls 106887->106899 106902 f9df37 106887->106902 106905 f9df23 106887->106905 106908 f9c2e0 106887->106908 106940 f87956 106887->106940 106946 f7617e 106887->106946 106951 f9c193 85 API calls 2 library calls 106887->106951 106889->106887 106891 f29c90 Mailbox 59 API calls 106890->106891 106891->106894 106954 f89e4a 89 API calls 4 library calls 106892->106954 106894->106855 106894->106875 106896 f29d3c 60 API calls 106895->106896 106897 f2b22d 106896->106897 106898 f29d3c 60 API calls 106897->106898 106898->106886 106899->106887 106958 f9cadd 106902->106958 106904 f9df47 106904->106887 106906 f9cadd 130 API calls 106905->106906 106907 f9df33 106906->106907 106907->106887 106909 f27667 59 API calls 106908->106909 106910 f9c2f4 106909->106910 106911 f27667 59 API calls 106910->106911 106912 f9c2fc 106911->106912 106913 f27667 59 API calls 106912->106913 106914 f9c304 106913->106914 106915 f29837 84 API calls 106914->106915 106939 f9c312 106915->106939 106916 f27bcc 59 API calls 106916->106939 106917 f27924 59 API calls 106917->106939 106918 f9c4fb 106919 f9c528 Mailbox 106918->106919 107049 f29a3c 59 API calls Mailbox 106918->107049 106919->106887 106921 f9c4e2 106922 f27cab 59 API calls 106921->106922 106925 f9c4ef 106922->106925 106923 f9c4fd 106926 f27cab 59 API calls 106923->106926 106924 f28047 59 API calls 106924->106939 106927 f27b2e 59 API calls 106925->106927 106928 f9c50c 106926->106928 106927->106918 106931 f27b2e 59 API calls 106928->106931 106929 f27e4f 59 API calls 106930 f9c3a9 CharUpperBuffW 106929->106930 107047 f2843a 68 API calls 106930->107047 106931->106918 106932 f27e4f 59 API calls 106934 f9c469 CharUpperBuffW 106932->106934 107048 f2c5a7 69 API calls 2 library calls 106934->107048 106936 f29837 84 API calls 106936->106939 106937 f27cab 59 API calls 106937->106939 106938 f27b2e 59 API calls 106938->106939 106939->106916 106939->106917 106939->106918 106939->106919 106939->106921 106939->106923 106939->106924 106939->106929 106939->106932 106939->106936 106939->106937 106939->106938 106941 f87962 106940->106941 106942 f40db6 Mailbox 59 API calls 106941->106942 106943 f87970 106942->106943 106944 f8797e 106943->106944 106945 f27667 59 API calls 106943->106945 106944->106887 106945->106944 107050 f760c0 106946->107050 106948 f7618c 106948->106887 106949->106876 106950->106860 106951->106887 106952->106867 106953->106894 106954->106894 106955->106875 106956->106882 106957->106875 106959 f29837 84 API calls 106958->106959 106960 f9cb1a 106959->106960 106984 f9cb61 Mailbox 106960->106984 106996 f9d7a5 106960->106996 106962 f9cdb9 106963 f9cf2e 106962->106963 106967 f9cdc7 106962->106967 107034 f9d8c8 92 API calls Mailbox 106963->107034 106966 f9cf3d 106966->106967 106968 f9cf49 106966->106968 107009 f9c96e 106967->107009 106968->106984 106969 f29837 84 API calls 106986 f9cbb2 Mailbox 106969->106986 106974 f9ce00 107024 f40c08 106974->107024 106977 f9ce1a 107030 f89e4a 89 API calls 4 library calls 106977->107030 106978 f9ce33 106980 f292ce 59 API calls 106978->106980 106982 f9ce3f 106980->106982 106981 f9ce25 GetCurrentProcess TerminateProcess 106981->106978 106983 f29050 59 API calls 106982->106983 106985 f9ce55 106983->106985 106984->106904 106995 f9ce7c 106985->106995 107031 f28d40 59 API calls Mailbox 106985->107031 106986->106962 106986->106969 106986->106984 107028 f9fbce 59 API calls 2 library calls 106986->107028 107029 f9cfdf 61 API calls 2 library calls 106986->107029 106988 f9cfa4 106988->106984 106990 f9cfb8 FreeLibrary 106988->106990 106989 f9ce6b 107032 f9d649 107 API calls _free 106989->107032 106990->106984 106994 f29d3c 60 API calls 106994->106995 106995->106988 106995->106994 107033 f28d40 59 API calls Mailbox 106995->107033 107035 f9d649 107 API calls _free 106995->107035 106997 f27e4f 59 API calls 106996->106997 106998 f9d7c0 CharLowerBuffW 106997->106998 107036 f7f167 106998->107036 107002 f27667 59 API calls 107003 f9d7f9 107002->107003 107004 f2784b 59 API calls 107003->107004 107005 f9d810 107004->107005 107006 f27d2c 59 API calls 107005->107006 107007 f9d81c Mailbox 107006->107007 107008 f9d858 Mailbox 107007->107008 107043 f9cfdf 61 API calls 2 library calls 107007->107043 107008->106986 107010 f9c989 107009->107010 107014 f9c9de 107009->107014 107011 f40db6 Mailbox 59 API calls 107010->107011 107012 f9c9ab 107011->107012 107013 f40db6 Mailbox 59 API calls 107012->107013 107012->107014 107013->107012 107015 f9da50 107014->107015 107016 f9dc79 Mailbox 107015->107016 107023 f9da73 _strcat _wcscpy __NMSG_WRITE 107015->107023 107016->106974 107017 f29b98 59 API calls 107017->107023 107018 f29be6 59 API calls 107018->107023 107019 f29b3c 59 API calls 107019->107023 107020 f29837 84 API calls 107020->107023 107021 f4571c 58 API calls __crtGetStringTypeA_stat 107021->107023 107023->107016 107023->107017 107023->107018 107023->107019 107023->107020 107023->107021 107046 f85887 61 API calls 2 library calls 107023->107046 107025 f40c1d 107024->107025 107026 f40cb5 VirtualProtect 107025->107026 107027 f40c83 107025->107027 107026->107027 107027->106977 107027->106978 107028->106986 107029->106986 107030->106981 107031->106989 107032->106995 107033->106995 107034->106966 107035->106995 107037 f7f192 __NMSG_WRITE 107036->107037 107038 f7f1d1 107037->107038 107040 f7f1c7 107037->107040 107042 f7f278 107037->107042 107038->107002 107038->107007 107040->107038 107044 f278c4 61 API calls 107040->107044 107042->107038 107045 f278c4 61 API calls 107042->107045 107043->107008 107044->107040 107045->107042 107046->107023 107047->106939 107048->106939 107049->106919 107051 f760cb 107050->107051 107052 f760e8 107050->107052 107051->107052 107054 f760ab 59 API calls Mailbox 107051->107054 107052->106948 107054->107051 107055 f6416f 107059 f75fe6 107055->107059 107057 f6417a 107058 f75fe6 85 API calls 107057->107058 107058->107057 107061 f75ff3 107059->107061 107069 f76020 107059->107069 107060 f76022 107071 f29328 84 API calls Mailbox 107060->107071 107061->107060 107062 f76027 107061->107062 107067 f7601a 107061->107067 107061->107069 107064 f29837 84 API calls 107062->107064 107065 f7602e 107064->107065 107066 f27b2e 59 API calls 107065->107066 107066->107069 107070 f295a0 59 API calls _wcsstr 107067->107070 107069->107057 107070->107069 107071->107062 107072 f2be19 107073 f2be22 107072->107073 107086 f2baab 107072->107086 107074 f29837 84 API calls 107073->107074 107082 f2ba8b Mailbox 107073->107082 107073->107086 107075 f2be4d 107074->107075 107076 f6107b 107075->107076 107077 f2be5d 107075->107077 107087 f77bdb 59 API calls _memmove 107076->107087 107078 f27a51 59 API calls 107077->107078 107078->107082 107080 f61085 107081 f28047 59 API calls 107080->107081 107081->107082 107084 f61361 107082->107084 107082->107086 107089 f28cd4 59 API calls Mailbox 107082->107089 107084->107086 107088 f43d46 59 API calls __wtof_l 107084->107088 107087->107080 107088->107086 107089->107082 107090 16e9020 107091 16e6c70 GetPEB 107090->107091 107092 16e90c3 107091->107092 107104 16e8f10 107092->107104 107105 16e8f19 Sleep 107104->107105 107106 16e8f27 107105->107106 107107 f2107d 107112 f2708b 107107->107112 107109 f2108c 107110 f42d40 __cinit 67 API calls 107109->107110 107111 f21096 107110->107111 107113 f2709b __write_nolock 107112->107113 107114 f27667 59 API calls 107113->107114 107115 f27151 107114->107115 107116 f24706 61 API calls 107115->107116 107117 f2715a 107116->107117 107143 f4050b 107117->107143 107120 f27cab 59 API calls 107121 f27173 107120->107121 107122 f23f74 59 API calls 107121->107122 107123 f27182 107122->107123 107124 f27667 59 API calls 107123->107124 107125 f2718b 107124->107125 107126 f27d8c 59 API calls 107125->107126 107127 f27194 RegOpenKeyExW 107126->107127 107128 f5e8b1 RegQueryValueExW 107127->107128 107132 f271b6 Mailbox 107127->107132 107129 f5e943 RegCloseKey 107128->107129 107130 f5e8ce 107128->107130 107129->107132 107142 f5e955 _wcscat Mailbox __NMSG_WRITE 107129->107142 107131 f40db6 Mailbox 59 API calls 107130->107131 107133 f5e8e7 107131->107133 107132->107109 107134 f2522e 59 API calls 107133->107134 107135 f5e8f2 RegQueryValueExW 107134->107135 107136 f5e90f 107135->107136 107138 f5e929 107135->107138 107137 f27bcc 59 API calls 107136->107137 107137->107138 107138->107129 107139 f279f2 59 API calls 107139->107142 107140 f27de1 59 API calls 107140->107142 107141 f23f74 59 API calls 107141->107142 107142->107132 107142->107139 107142->107140 107142->107141 107144 f51940 __write_nolock 107143->107144 107145 f40518 GetFullPathNameW 107144->107145 107146 f4053a 107145->107146 107147 f27bcc 59 API calls 107146->107147 107148 f27165 107147->107148 107148->107120

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F23B68
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00F23B7A
                                                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?,00FE52F8,00FE52E0,?,?), ref: 00F23BEB
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                    • Part of subcall function 00F3092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F23C14,00FE52F8,?,?,?), ref: 00F3096E
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F23C6F
                                                                                  • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00FD7770,00000010), ref: 00F5D281
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,00FE52F8,?,?,?), ref: 00F5D2B9
                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00FD4260,00FE52F8,?,?,?), ref: 00F5D33F
                                                                                  • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F5D346
                                                                                    • Part of subcall function 00F23A46: GetSysColorBrush.USER32(0000000F), ref: 00F23A50
                                                                                    • Part of subcall function 00F23A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F23A5F
                                                                                    • Part of subcall function 00F23A46: LoadIconW.USER32(00000063), ref: 00F23A76
                                                                                    • Part of subcall function 00F23A46: LoadIconW.USER32(000000A4), ref: 00F23A88
                                                                                    • Part of subcall function 00F23A46: LoadIconW.USER32(000000A2), ref: 00F23A9A
                                                                                    • Part of subcall function 00F23A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F23AC0
                                                                                    • Part of subcall function 00F23A46: RegisterClassExW.USER32(?), ref: 00F23B16
                                                                                    • Part of subcall function 00F239D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F23A03
                                                                                    • Part of subcall function 00F239D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F23A24
                                                                                    • Part of subcall function 00F239D5: ShowWindow.USER32(00000000,?,?), ref: 00F23A38
                                                                                    • Part of subcall function 00F239D5: ShowWindow.USER32(00000000,?,?), ref: 00F23A41
                                                                                    • Part of subcall function 00F2434A: _memset.LIBCMT ref: 00F24370
                                                                                    • Part of subcall function 00F2434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F24415
                                                                                  Strings
                                                                                  • runas, xrefs: 00F5D33A
                                                                                  • This is a third-party compiled AutoIt script., xrefs: 00F5D279
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                  • String ID: This is a third-party compiled AutoIt script.$runas
                                                                                  • API String ID: 529118366-3287110873
                                                                                  • Opcode ID: 5cfa2d455ae0448bbc4ae4299449176d5194732c73c7c79c5df7e9ab7b409b48
                                                                                  • Instruction ID: 7268924045bfaa19d4a59ca6bed0db8874595c227ad474a493835aaa0abfdc50
                                                                                  • Opcode Fuzzy Hash: 5cfa2d455ae0448bbc4ae4299449176d5194732c73c7c79c5df7e9ab7b409b48
                                                                                  • Instruction Fuzzy Hash: 67513971D0826CAECF11FBF4FC45AED7B79AF45B14F004065F511AA1A2CA789605FB21

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 996 f249a0-f24a00 call f27667 GetVersionExW call f27bcc 1001 f24a06 996->1001 1002 f24b0b-f24b0d 996->1002 1003 f24a09-f24a0e 1001->1003 1004 f5d767-f5d773 1002->1004 1006 f24b12-f24b13 1003->1006 1007 f24a14 1003->1007 1005 f5d774-f5d778 1004->1005 1008 f5d77b-f5d787 1005->1008 1009 f5d77a 1005->1009 1010 f24a15-f24a4c call f27d2c call f27726 1006->1010 1007->1010 1008->1005 1011 f5d789-f5d78e 1008->1011 1009->1008 1019 f24a52-f24a53 1010->1019 1020 f5d864-f5d867 1010->1020 1011->1003 1013 f5d794-f5d79b 1011->1013 1013->1004 1015 f5d79d 1013->1015 1018 f5d7a2-f5d7a5 1015->1018 1021 f24a93-f24aaa GetCurrentProcess IsWow64Process 1018->1021 1022 f5d7ab-f5d7c9 1018->1022 1019->1018 1023 f24a59-f24a64 1019->1023 1024 f5d880-f5d884 1020->1024 1025 f5d869 1020->1025 1032 f24aaf-f24ac0 1021->1032 1033 f24aac 1021->1033 1022->1021 1026 f5d7cf-f5d7d5 1022->1026 1027 f24a6a-f24a6c 1023->1027 1028 f5d7ea-f5d7f0 1023->1028 1030 f5d886-f5d88f 1024->1030 1031 f5d86f-f5d878 1024->1031 1029 f5d86c 1025->1029 1036 f5d7d7-f5d7da 1026->1036 1037 f5d7df-f5d7e5 1026->1037 1038 f5d805-f5d811 1027->1038 1039 f24a72-f24a75 1027->1039 1040 f5d7f2-f5d7f5 1028->1040 1041 f5d7fa-f5d800 1028->1041 1029->1031 1030->1029 1042 f5d891-f5d894 1030->1042 1031->1024 1034 f24ac2-f24ad2 call f24b37 1032->1034 1035 f24b2b-f24b35 GetSystemInfo 1032->1035 1033->1032 1053 f24ad4-f24ae1 call f24b37 1034->1053 1054 f24b1f-f24b29 GetSystemInfo 1034->1054 1048 f24af8-f24b08 1035->1048 1036->1021 1037->1021 1043 f5d813-f5d816 1038->1043 1044 f5d81b-f5d821 1038->1044 1046 f5d831-f5d834 1039->1046 1047 f24a7b-f24a8a 1039->1047 1040->1021 1041->1021 1042->1031 1043->1021 1044->1021 1046->1021 1050 f5d83a-f5d84f 1046->1050 1051 f24a90 1047->1051 1052 f5d826-f5d82c 1047->1052 1055 f5d851-f5d854 1050->1055 1056 f5d859-f5d85f 1050->1056 1051->1021 1052->1021 1061 f24ae3-f24ae7 GetNativeSystemInfo 1053->1061 1062 f24b18-f24b1d 1053->1062 1058 f24ae9-f24aed 1054->1058 1055->1021 1056->1021 1058->1048 1060 f24aef-f24af2 FreeLibrary 1058->1060 1060->1048 1061->1058 1062->1061
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 00F249CD
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  • GetCurrentProcess.KERNEL32(?,00FAFAEC,00000000,00000000,?), ref: 00F24A9A
                                                                                  • IsWow64Process.KERNEL32(00000000), ref: 00F24AA1
                                                                                  • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F24AE7
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00F24AF2
                                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00F24B23
                                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00F24B2F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1986165174-0
                                                                                  • Opcode ID: 8bee4d4e1d0f44227015887f603de61eb5f983c6936e4b85c1f542e2e440d653
                                                                                  • Instruction ID: 78aff291b308dce128b93a31cb72a938260cb0e3674d8b068568c98016fc2ebd
                                                                                  • Opcode Fuzzy Hash: 8bee4d4e1d0f44227015887f603de61eb5f983c6936e4b85c1f542e2e440d653
                                                                                  • Instruction Fuzzy Hash: 5B91063198A7D0DEC731DB78A4502AAFFF4AF2A311B0449ADD0CB83A01D264F50CEB59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1063 f24e89-f24ea1 CreateStreamOnHGlobal 1064 f24ea3-f24eba FindResourceExW 1063->1064 1065 f24ec1-f24ec6 1063->1065 1066 f24ec0 1064->1066 1067 f5d933-f5d942 LoadResource 1064->1067 1066->1065 1067->1066 1068 f5d948-f5d956 SizeofResource 1067->1068 1068->1066 1069 f5d95c-f5d967 LockResource 1068->1069 1069->1066 1070 f5d96d-f5d98b 1069->1070 1070->1066
                                                                                  APIs
                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F24D8E,?,?,00000000,00000000), ref: 00F24E99
                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F24D8E,?,?,00000000,00000000), ref: 00F24EB0
                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,00F24D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F24E2F), ref: 00F5D937
                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00F24D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F24E2F), ref: 00F5D94C
                                                                                  • LockResource.KERNEL32(00F24D8E,?,?,00F24D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F24E2F,00000000), ref: 00F5D95F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                  • String ID: SCRIPT
                                                                                  • API String ID: 3051347437-3967369404
                                                                                  • Opcode ID: bbe88b14d822582d6fd98f902a1545bdb3aed690b18c0fc9f205a28331271a75
                                                                                  • Instruction ID: 31c61e8cb2b32800c880dbb7e097db5a0037cefbfc16e4178916f64b96884276
                                                                                  • Opcode Fuzzy Hash: bbe88b14d822582d6fd98f902a1545bdb3aed690b18c0fc9f205a28331271a75
                                                                                  • Instruction Fuzzy Hash: B8115EB5641704BFE7218BA5EC48F677BBAFBC6B11F104268F4058A250DBA1EC04AA60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID:
                                                                                  • API String ID: 3964851224-0
                                                                                  • Opcode ID: eae20e7045e1093ed31976a105671283ccc4822db306391ce2430aea70a9857a
                                                                                  • Instruction ID: e70e1550e442a7b2ec70be62140cad93824a02dafa89895dede967170d130aad
                                                                                  • Opcode Fuzzy Hash: eae20e7045e1093ed31976a105671283ccc4822db306391ce2430aea70a9857a
                                                                                  • Instruction Fuzzy Hash: CF928E71A083418FD724DF14C490B2ABBF1BF85324F14896DE89A8B352DB75EC45EB92
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNELBASE(?,00F5E398), ref: 00F8446A
                                                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 00F8447B
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8448B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirst
                                                                                  • String ID:
                                                                                  • API String ID: 48322524-0
                                                                                  • Opcode ID: 23d8fa105ebd6f6b07fe925250af65e21e8e130cf2394acffb6475253ec5f39f
                                                                                  • Instruction ID: 74b5928d2591ce3ae7f2b2f578d5766c6ebbebd3a8c55674cd71f845bab2cb7d
                                                                                  • Opcode Fuzzy Hash: 23d8fa105ebd6f6b07fe925250af65e21e8e130cf2394acffb6475253ec5f39f
                                                                                  • Instruction Fuzzy Hash: 64E0D873810505674210BB78EC0D5E97B9C9E06335F100715FC36C10E0E7B46D04B695
                                                                                  Strings
                                                                                  • Variable must be of type 'Object'., xrefs: 00F63E62
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Variable must be of type 'Object'.
                                                                                  • API String ID: 0-109567571
                                                                                  • Opcode ID: 70c832054f47ada76d737c79f320c03e44e272faa0acc41720377ce97e4e88f4
                                                                                  • Instruction ID: 883dcb24275a881c7a78c773414d1ece71a9869c87d4f8fedacca77af6a4856b
                                                                                  • Opcode Fuzzy Hash: 70c832054f47ada76d737c79f320c03e44e272faa0acc41720377ce97e4e88f4
                                                                                  • Instruction Fuzzy Hash: 46A28C75E00229CFCB24CF54E880AAAB7B1FF59320F748069E915AB351D775ED42EB90
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F30A5B
                                                                                  • timeGetTime.WINMM ref: 00F30D16
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F30E53
                                                                                  • Sleep.KERNEL32(0000000A), ref: 00F30E61
                                                                                  • LockWindowUpdate.USER32(00000000,?,?), ref: 00F30EFA
                                                                                  • DestroyWindow.USER32 ref: 00F30F06
                                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F30F20
                                                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 00F64E83
                                                                                  • TranslateMessage.USER32(?), ref: 00F65C60
                                                                                  • DispatchMessageW.USER32(?), ref: 00F65C6E
                                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F65C82
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                  • API String ID: 4212290369-3242690629
                                                                                  • Opcode ID: 6e004723bb457841f99bad54654c057b9dbcc8fe83e615d37654429985ea1431
                                                                                  • Instruction ID: a669ab38f91045ae92e25e122a2b40622bbbb464e75356220a5ea95840a9716f
                                                                                  • Opcode Fuzzy Hash: 6e004723bb457841f99bad54654c057b9dbcc8fe83e615d37654429985ea1431
                                                                                  • Instruction Fuzzy Hash: 63B20470A08741DFD724DF24C894BAAB7E0BF85724F14491EF4899B2A1CB75E884FB52

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 00F88F5F: __time64.LIBCMT ref: 00F88F69
                                                                                    • Part of subcall function 00F24EE5: _fseek.LIBCMT ref: 00F24EFD
                                                                                  • __wsplitpath.LIBCMT ref: 00F89234
                                                                                    • Part of subcall function 00F440FB: __wsplitpath_helper.LIBCMT ref: 00F4413B
                                                                                  • _wcscpy.LIBCMT ref: 00F89247
                                                                                  • _wcscat.LIBCMT ref: 00F8925A
                                                                                  • __wsplitpath.LIBCMT ref: 00F8927F
                                                                                  • _wcscat.LIBCMT ref: 00F89295
                                                                                  • _wcscat.LIBCMT ref: 00F892A8
                                                                                    • Part of subcall function 00F88FA5: _memmove.LIBCMT ref: 00F88FDE
                                                                                    • Part of subcall function 00F88FA5: _memmove.LIBCMT ref: 00F88FED
                                                                                  • _wcscmp.LIBCMT ref: 00F891EF
                                                                                    • Part of subcall function 00F89734: _wcscmp.LIBCMT ref: 00F89824
                                                                                    • Part of subcall function 00F89734: _wcscmp.LIBCMT ref: 00F89837
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F89452
                                                                                  • _wcsncpy.LIBCMT ref: 00F894C5
                                                                                  • DeleteFileW.KERNEL32(?,?), ref: 00F894FB
                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F89511
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F89522
                                                                                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F89534
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                  • String ID:
                                                                                  • API String ID: 1500180987-0
                                                                                  • Opcode ID: 0050c357ebf9289375aaa194f00e3b1d53f75133e045a17fa79182c4843e68e1
                                                                                  • Instruction ID: b109fbda7f0564dba50e542d915746ffaf735ee068482c2d2ce509508903f706
                                                                                  • Opcode Fuzzy Hash: 0050c357ebf9289375aaa194f00e3b1d53f75133e045a17fa79182c4843e68e1
                                                                                  • Instruction Fuzzy Hash: A5C15FB1D04119AADF21EF94CC81AEEBBBDEF45310F0440A6F609E7141EB749A449F65

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F23074
                                                                                  • RegisterClassExW.USER32(00000030), ref: 00F2309E
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F230AF
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00F230CC
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F230DC
                                                                                  • LoadIconW.USER32(000000A9), ref: 00F230F2
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F23101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: 30c550b2a377cbb9af1a2a6372783cb807671fb248c07cdd3ea34b0cacf62dd2
                                                                                  • Instruction ID: f28aaf30dd3bf911240aa3191eb4a6cbb29aa39263b93e6497ac165e8d58e7ab
                                                                                  • Opcode Fuzzy Hash: 30c550b2a377cbb9af1a2a6372783cb807671fb248c07cdd3ea34b0cacf62dd2
                                                                                  • Instruction Fuzzy Hash: 223129B18413499FDB10CFE4D885A99BBF0FB0A714F14452EE580EA2A0D3B50549DF51

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F23074
                                                                                  • RegisterClassExW.USER32(00000030), ref: 00F2309E
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F230AF
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00F230CC
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F230DC
                                                                                  • LoadIconW.USER32(000000A9), ref: 00F230F2
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F23101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: d6930044428889f58b7e2f646563281c433c4e0e38296a2b01a6c1827db936cf
                                                                                  • Instruction ID: 3a8966bf26676e157e3d900fd9912feac8cb96941e60960bf6fe13841ff0c204
                                                                                  • Opcode Fuzzy Hash: d6930044428889f58b7e2f646563281c433c4e0e38296a2b01a6c1827db936cf
                                                                                  • Instruction Fuzzy Hash: 3621C8B1D1125CAFDB10DFD4EC89B9DBBF4FB09704F00812AF611AA2A0D7B14548AF95

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 00F24706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FE52F8,?,00F237AE,?), ref: 00F24724
                                                                                    • Part of subcall function 00F4050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F27165), ref: 00F4052D
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F271A8
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F5E8C8
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F5E909
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F5E947
                                                                                  • _wcscat.LIBCMT ref: 00F5E9A0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                  • API String ID: 2673923337-2727554177
                                                                                  • Opcode ID: edb74618d526885d669a75a52eb2b685f594303f9548fdc05436aa065fea971a
                                                                                  • Instruction ID: 8f018cf05af6cb5924aeeac25a62749f801253b8c115f5db7652ae53650ea265
                                                                                  • Opcode Fuzzy Hash: edb74618d526885d669a75a52eb2b685f594303f9548fdc05436aa065fea971a
                                                                                  • Instruction Fuzzy Hash: 4871CF719083599EC704EF25EC8199BBBE8FF94390B40052EF644CB1B0DB349948EB92

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F23A50
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00F23A5F
                                                                                  • LoadIconW.USER32(00000063), ref: 00F23A76
                                                                                  • LoadIconW.USER32(000000A4), ref: 00F23A88
                                                                                  • LoadIconW.USER32(000000A2), ref: 00F23A9A
                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F23AC0
                                                                                  • RegisterClassExW.USER32(?), ref: 00F23B16
                                                                                    • Part of subcall function 00F23041: GetSysColorBrush.USER32(0000000F), ref: 00F23074
                                                                                    • Part of subcall function 00F23041: RegisterClassExW.USER32(00000030), ref: 00F2309E
                                                                                    • Part of subcall function 00F23041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F230AF
                                                                                    • Part of subcall function 00F23041: InitCommonControlsEx.COMCTL32(?), ref: 00F230CC
                                                                                    • Part of subcall function 00F23041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F230DC
                                                                                    • Part of subcall function 00F23041: LoadIconW.USER32(000000A9), ref: 00F230F2
                                                                                    • Part of subcall function 00F23041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F23101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                  • String ID: #$0$AutoIt v3
                                                                                  • API String ID: 423443420-4155596026
                                                                                  • Opcode ID: e2735347111a16339b9b3222d695b98d446f202d9b1f6b6e5afa18bc99e79e7d
                                                                                  • Instruction ID: 9f34a08de38b83adb21c1e8473b502782d657991be622684a91162131b9ed454
                                                                                  • Opcode Fuzzy Hash: e2735347111a16339b9b3222d695b98d446f202d9b1f6b6e5afa18bc99e79e7d
                                                                                  • Instruction Fuzzy Hash: 72214DB1D0135CAFEB10DFA4EC89B9D7BB4FB09B19F000129E600AE2A1D3B55544AF95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 767 f23633-f23681 769 f23683-f23686 767->769 770 f236e1-f236e3 767->770 772 f236e7 769->772 773 f23688-f2368f 769->773 770->769 771 f236e5 770->771 774 f236ca-f236d2 DefWindowProcW 771->774 775 f5d0cc-f5d0fa call f31070 call f31093 772->775 776 f236ed-f236f0 772->776 777 f23695-f2369a 773->777 778 f2374b-f23753 PostQuitMessage 773->778 779 f236d8-f236de 774->779 810 f5d0ff-f5d106 775->810 780 f236f2-f236f3 776->780 781 f23715-f2373c SetTimer RegisterWindowMessageW 776->781 783 f5d154-f5d168 call f82527 777->783 784 f236a0-f236a2 777->784 785 f23711-f23713 778->785 786 f5d06f-f5d072 780->786 787 f236f9-f2370c KillTimer call f2443a call f23114 780->787 781->785 789 f2373e-f23749 CreatePopupMenu 781->789 783->785 801 f5d16e 783->801 790 f23755-f2375f call f244a0 784->790 791 f236a8-f236ad 784->791 785->779 794 f5d074-f5d076 786->794 795 f5d0a8-f5d0c7 MoveWindow 786->795 787->785 789->785 802 f23764 790->802 798 f236b3-f236b8 791->798 799 f5d139-f5d140 791->799 803 f5d097-f5d0a3 SetFocus 794->803 804 f5d078-f5d07b 794->804 795->785 808 f5d124-f5d134 call f82d36 798->808 809 f236be-f236c4 798->809 799->774 806 f5d146-f5d14f call f77c36 799->806 801->774 802->785 803->785 804->809 811 f5d081-f5d092 call f31070 804->811 806->774 808->785 809->774 809->810 810->774 815 f5d10c-f5d11f call f2443a call f2434a 810->815 811->785 815->774
                                                                                  APIs
                                                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00F236D2
                                                                                  • KillTimer.USER32(?,00000001), ref: 00F236FC
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F2371F
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F2372A
                                                                                  • CreatePopupMenu.USER32 ref: 00F2373E
                                                                                  • PostQuitMessage.USER32(00000000), ref: 00F2374D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                  • String ID: TaskbarCreated
                                                                                  • API String ID: 129472671-2362178303
                                                                                  • Opcode ID: f8a40d6c19030b381a31fd80104f16ab83ba2fabd489a1a335230a113e0be6a7
                                                                                  • Instruction ID: 8ca9cd4e02c476a894fce541cd3a2d38d4c9d4b501cfd8a89feec49588189943
                                                                                  • Opcode Fuzzy Hash: f8a40d6c19030b381a31fd80104f16ab83ba2fabd489a1a335230a113e0be6a7
                                                                                  • Instruction Fuzzy Hash: BD417AF260455DBBDF246FA4FC49F793B58EB01715F100125FA02CA2B2CA6D9E09B761

                                                                                  Control-flow Graph

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                  • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                                                  • API String ID: 1825951767-3513169116
                                                                                  • Opcode ID: 586892d9ba6f2bcbcb1a41f0bf05eac19eb566cfebf69456168701e7a2e72142
                                                                                  • Instruction ID: a008ce2e4f4df65e8824aa0100851cfc8d4f3f63b6893aa91319640c020accca
                                                                                  • Opcode Fuzzy Hash: 586892d9ba6f2bcbcb1a41f0bf05eac19eb566cfebf69456168701e7a2e72142
                                                                                  • Instruction Fuzzy Hash: 4BA16FB2D0062D9ADF04EBE0EC91AEEB779BF15710F440429F515B7191DF78AA08EB60

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 942 16e9240-16e92ee call 16e6c70 945 16e92f5-16e931b call 16ea150 CreateFileW 942->945 948 16e931d 945->948 949 16e9322-16e9332 945->949 950 16e946d-16e9471 948->950 957 16e9339-16e9353 VirtualAlloc 949->957 958 16e9334 949->958 951 16e94b3-16e94b6 950->951 952 16e9473-16e9477 950->952 954 16e94b9-16e94c0 951->954 955 16e9479-16e947c 952->955 956 16e9483-16e9487 952->956 959 16e9515-16e952a 954->959 960 16e94c2-16e94cd 954->960 955->956 961 16e9489-16e9493 956->961 962 16e9497-16e949b 956->962 963 16e935a-16e9371 ReadFile 957->963 964 16e9355 957->964 958->950 969 16e952c-16e9537 VirtualFree 959->969 970 16e953a-16e9542 959->970 967 16e94cf 960->967 968 16e94d1-16e94dd 960->968 961->962 971 16e949d-16e94a7 962->971 972 16e94ab 962->972 965 16e9378-16e93b8 VirtualAlloc 963->965 966 16e9373 963->966 964->950 973 16e93bf-16e93da call 16ea3a0 965->973 974 16e93ba 965->974 966->950 967->959 975 16e94df-16e94ef 968->975 976 16e94f1-16e94fd 968->976 969->970 971->972 972->951 982 16e93e5-16e93ef 973->982 974->950 978 16e9513 975->978 979 16e94ff-16e9508 976->979 980 16e950a-16e9510 976->980 978->954 979->978 980->978 983 16e9422-16e9436 call 16ea1b0 982->983 984 16e93f1-16e9420 call 16ea3a0 982->984 990 16e943a-16e943e 983->990 991 16e9438 983->991 984->982 992 16e944a-16e944e 990->992 993 16e9440-16e9444 CloseHandle 990->993 991->950 994 16e945e-16e9467 992->994 995 16e9450-16e945b VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016E9311
                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016E9537
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileFreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 204039940-0
                                                                                  • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                                  • Instruction ID: e811d57c7c4c94d9da0ad8d00df453114f5e5d4fe024bf22f6fa36e57711ed71
                                                                                  • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                                  • Instruction Fuzzy Hash: 15A10A74E02209EBDB14CFA4C898BEEBBB5BF48308F208259E505BB381D7759A45CF55

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1073 f239d5-f23a45 CreateWindowExW * 2 ShowWindow * 2
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F23A03
                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F23A24
                                                                                  • ShowWindow.USER32(00000000,?,?), ref: 00F23A38
                                                                                  • ShowWindow.USER32(00000000,?,?), ref: 00F23A41
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateShow
                                                                                  • String ID: AutoIt v3$edit
                                                                                  • API String ID: 1584632944-3779509399
                                                                                  • Opcode ID: 654942755ef675d4dbfac3aad0e1c3499163482c1eda2b478a355bbece41b7f1
                                                                                  • Instruction ID: 10dc9837debf63646ad7827a2c02767445bc3d045bed1513612a6a52d518d34e
                                                                                  • Opcode Fuzzy Hash: 654942755ef675d4dbfac3aad0e1c3499163482c1eda2b478a355bbece41b7f1
                                                                                  • Instruction Fuzzy Hash: 99F03AB06012D87EEB3057A3AC88E7B3E7DD7C7F54B00002ABB00AA171C2610840EAB0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1074 16e9020-16e9139 call 16e6c70 call 16e8f10 CreateFileW 1081 16e913b 1074->1081 1082 16e9140-16e9150 1074->1082 1083 16e91f0-16e91f5 1081->1083 1085 16e9157-16e9171 VirtualAlloc 1082->1085 1086 16e9152 1082->1086 1087 16e9175-16e918c ReadFile 1085->1087 1088 16e9173 1085->1088 1086->1083 1089 16e918e 1087->1089 1090 16e9190-16e91ca call 16e8f50 call 16e7f10 1087->1090 1088->1083 1089->1083 1095 16e91cc-16e91e1 call 16e8fa0 1090->1095 1096 16e91e6-16e91ee ExitProcess 1090->1096 1095->1096 1096->1083
                                                                                  APIs
                                                                                    • Part of subcall function 016E8F10: Sleep.KERNELBASE(000001F4), ref: 016E8F21
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016E912F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileSleep
                                                                                  • String ID: GZ3TRLEJDIFWFXO2
                                                                                  • API String ID: 2694422964-3145963012
                                                                                  • Opcode ID: 77132aca0bc992af26709ddc114db02279ca6d5814d0ae99fd1c4d9f1947acae
                                                                                  • Instruction ID: 7b7388b64ffcf9cd6e18ddf230cdfaf4e5388982a8dab007099a5dcfcc2c3359
                                                                                  • Opcode Fuzzy Hash: 77132aca0bc992af26709ddc114db02279ca6d5814d0ae99fd1c4d9f1947acae
                                                                                  • Instruction Fuzzy Hash: DF519370D05249EAEF11DBA4CC48BEEBBB5AF15304F00419DE608BB2C0D7795B49CB65

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1098 f2407c-f24092 1099 f24098-f240ad call f27a16 1098->1099 1100 f2416f-f24173 1098->1100 1103 f240b3-f240d3 call f27bcc 1099->1103 1104 f5d3c8-f5d3d7 LoadStringW 1099->1104 1107 f5d3e2-f5d3fa call f27b2e call f26fe3 1103->1107 1108 f240d9-f240dd 1103->1108 1104->1107 1117 f240ed-f2416a call f42de0 call f2454e call f42dbc Shell_NotifyIconW call f25904 1107->1117 1120 f5d400-f5d41e call f27cab call f26fe3 call f27cab 1107->1120 1110 f240e3-f240e8 call f27b2e 1108->1110 1111 f24174-f2417d call f28047 1108->1111 1110->1117 1111->1117 1117->1100 1120->1117
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F5D3D7
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  • _memset.LIBCMT ref: 00F240FC
                                                                                  • _wcscpy.LIBCMT ref: 00F24150
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F24160
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                  • String ID: Line:
                                                                                  • API String ID: 3942752672-1585850449
                                                                                  • Opcode ID: e81e9cc80306d2237b6bb39758899e0ed819188778526a832e8c84c3f3844b27
                                                                                  • Instruction ID: 60e105ad8c737f1b8fba964b9d8c3ec6085884669c59fd5dcd1a229c6380a0ae
                                                                                  • Opcode Fuzzy Hash: e81e9cc80306d2237b6bb39758899e0ed819188778526a832e8c84c3f3844b27
                                                                                  • Instruction Fuzzy Hash: 4931F371408354AFD721EB60EC46FDB77E8AF44714F10451EF6858A0A1EB78A648E793

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1133 f4541d-f45436 1134 f45453 1133->1134 1135 f45438-f4543d 1133->1135 1137 f45455-f4545b 1134->1137 1135->1134 1136 f4543f-f45441 1135->1136 1138 f45443-f45448 call f48b28 1136->1138 1139 f4545c-f45461 1136->1139 1151 f4544e call f48db6 1138->1151 1140 f45463-f4546d 1139->1140 1141 f4546f-f45473 1139->1141 1140->1141 1143 f45493-f454a2 1140->1143 1144 f45475-f45480 call f42de0 1141->1144 1145 f45483-f45485 1141->1145 1149 f454a4-f454a7 1143->1149 1150 f454a9 1143->1150 1144->1145 1145->1138 1148 f45487-f45491 1145->1148 1148->1138 1148->1143 1153 f454ae-f454b3 1149->1153 1150->1153 1151->1134 1155 f4559c-f4559f 1153->1155 1156 f454b9-f454c0 1153->1156 1155->1137 1157 f45501-f45503 1156->1157 1158 f454c2-f454ca 1156->1158 1159 f45505-f45507 1157->1159 1160 f4556d-f4556e call f50ba7 1157->1160 1158->1157 1161 f454cc 1158->1161 1162 f45509-f45511 1159->1162 1163 f4552b-f45536 1159->1163 1170 f45573-f45577 1160->1170 1165 f454d2-f454d4 1161->1165 1166 f455ca 1161->1166 1168 f45521-f45525 1162->1168 1169 f45513-f4551f 1162->1169 1171 f45538 1163->1171 1172 f4553a-f4553d 1163->1172 1173 f454d6-f454d8 1165->1173 1174 f454db-f454e0 1165->1174 1167 f455ce-f455d7 1166->1167 1167->1137 1177 f45527-f45529 1168->1177 1169->1177 1170->1167 1178 f45579-f4557e 1170->1178 1171->1172 1175 f455a4-f455a8 1172->1175 1179 f4553f-f4554b call f446e6 call f50e5b 1172->1179 1173->1174 1174->1175 1176 f454e6-f454ff call f50cc8 1174->1176 1182 f455ba-f455c5 call f48b28 1175->1182 1183 f455aa-f455b7 call f42de0 1175->1183 1192 f45562-f4556b 1176->1192 1177->1172 1178->1175 1181 f45580-f45591 1178->1181 1194 f45550-f45555 1179->1194 1187 f45594-f45596 1181->1187 1182->1151 1183->1182 1187->1155 1187->1156 1192->1187 1195 f455dc-f455e0 1194->1195 1196 f4555b-f4555e 1194->1196 1195->1167 1196->1166 1197 f45560 1196->1197 1197->1192
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                  • String ID:
                                                                                  • API String ID: 1559183368-0
                                                                                  • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                  • Instruction ID: 36b9030249516e7753f96c6d53ded7254f40c430b08644668573469e4b8e72ba
                                                                                  • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                  • Instruction Fuzzy Hash: 2151D971E00B059BDB24EEA5DC4067E7FB2AF40B35F288729FC259A2D2D7749D50AB40
                                                                                  APIs
                                                                                    • Part of subcall function 00F24DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F24E0F
                                                                                  • _free.LIBCMT ref: 00F5E263
                                                                                  • _free.LIBCMT ref: 00F5E2AA
                                                                                    • Part of subcall function 00F26A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F26BAD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                  • API String ID: 2861923089-1757145024
                                                                                  • Opcode ID: 4baf16a7020d91735abd417e99c43338b6195c4b40401203a87fd2b5225c9249
                                                                                  • Instruction ID: d8bba779fe42d544a0e02b9587850c96d2b534fd77b12b324b1b13ecc003af16
                                                                                  • Opcode Fuzzy Hash: 4baf16a7020d91735abd417e99c43338b6195c4b40401203a87fd2b5225c9249
                                                                                  • Instruction Fuzzy Hash: 1E917171D042299FCF08EFA4DC419EDB7B4FF19310F14442AF915AB2A1DB78AA19EB50
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F235A1,SwapMouseButtons,00000004,?), ref: 00F235D4
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F235A1,SwapMouseButtons,00000004,?,?,?,?,00F22754), ref: 00F235F5
                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,00F235A1,SwapMouseButtons,00000004,?,?,?,?,00F22754), ref: 00F23617
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID: Control Panel\Mouse
                                                                                  • API String ID: 3677997916-824357125
                                                                                  • Opcode ID: 70641f0e8ec752213c37f14ffcbfadf0087686f12714f85280a3ad350fb6ed86
                                                                                  • Instruction ID: 1b7708b71c86be629124d0dfb966f7065feec0f436cadfdd488c7cf8db3115b7
                                                                                  • Opcode Fuzzy Hash: 70641f0e8ec752213c37f14ffcbfadf0087686f12714f85280a3ad350fb6ed86
                                                                                  • Instruction Fuzzy Hash: F9115EB1910218BFDB208FA4EC40EAFBBBCEF05750F018469F805D7210D2719F44A760
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 016E873D
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016E8761
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016E8783
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: a1064bca5dd4e59baeb4dd15c17425526c3ac906ac097e7eb484fd7342f8cad6
                                                                                  • Instruction ID: 17c859ccc04e3ee072dc841acef9b1f93fa266e1a9893f14b57d732722a2836d
                                                                                  • Opcode Fuzzy Hash: a1064bca5dd4e59baeb4dd15c17425526c3ac906ac097e7eb484fd7342f8cad6
                                                                                  • Instruction Fuzzy Hash: A7621930A15258DAEB24CFA4CC44BEEB776EF58300F1091A9D50DEB390E7769E81CB59
                                                                                  APIs
                                                                                    • Part of subcall function 00F24EE5: _fseek.LIBCMT ref: 00F24EFD
                                                                                    • Part of subcall function 00F89734: _wcscmp.LIBCMT ref: 00F89824
                                                                                    • Part of subcall function 00F89734: _wcscmp.LIBCMT ref: 00F89837
                                                                                  • _free.LIBCMT ref: 00F896A2
                                                                                  • _free.LIBCMT ref: 00F896A9
                                                                                  • _free.LIBCMT ref: 00F89714
                                                                                    • Part of subcall function 00F42D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F49A24), ref: 00F42D69
                                                                                    • Part of subcall function 00F42D55: GetLastError.KERNEL32(00000000,?,00F49A24), ref: 00F42D7B
                                                                                  • _free.LIBCMT ref: 00F8971C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                  • String ID:
                                                                                  • API String ID: 1552873950-0
                                                                                  • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                  • Instruction ID: 05ae458246f1e73cd22ef7d20675e96b93dbefc8a746c37e61cbe8170d566134
                                                                                  • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                  • Instruction Fuzzy Hash: 66515FB1D04218AFDF249F64DC81AEEBBB9EF48310F1404AEF609A7241DB755A80DF58
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2782032738-0
                                                                                  • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                  • Instruction ID: c135e471234d94a450564b615919a1a71b7c869286d77b695a9102c8779dfbc3
                                                                                  • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                  • Instruction Fuzzy Hash: 0741A275E007469BDB188F69C880BAE7FA5AF41374B24853DEC15E7680EB74ED42AB40
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F244CF
                                                                                    • Part of subcall function 00F2407C: _memset.LIBCMT ref: 00F240FC
                                                                                    • Part of subcall function 00F2407C: _wcscpy.LIBCMT ref: 00F24150
                                                                                    • Part of subcall function 00F2407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F24160
                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00F24524
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F24533
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F5D4B9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 1378193009-0
                                                                                  • Opcode ID: 7c42ec5cf68346d803c7f3d6f1fda159183e617a29c62584966001cc617b6e23
                                                                                  • Instruction ID: 80331a0766228090049ca612086770d2f615942af5cc46cf08dde9a25cda4362
                                                                                  • Opcode Fuzzy Hash: 7c42ec5cf68346d803c7f3d6f1fda159183e617a29c62584966001cc617b6e23
                                                                                  • Instruction Fuzzy Hash: 4E21D7B19057949FE732CB24DC56BE6BBEC9F06319F04009DEBDE5A141C3B42988EB51
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F5EA39
                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00F5EA83
                                                                                    • Part of subcall function 00F24750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F24743,?,?,00F237AE,?), ref: 00F24770
                                                                                    • Part of subcall function 00F40791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F407B0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                                                  • String ID: X
                                                                                  • API String ID: 3777226403-3081909835
                                                                                  • Opcode ID: ad1577035cd697239f959acce13d216b61013a647f60c26479064e473bb9c4e7
                                                                                  • Instruction ID: 08790c760c06beaf18bbb9c46ca8051d7483a0a873fe5c287904980b79ba9200
                                                                                  • Opcode Fuzzy Hash: ad1577035cd697239f959acce13d216b61013a647f60c26479064e473bb9c4e7
                                                                                  • Instruction Fuzzy Hash: FE21F331A002589BCB01DF94DC45BEE7BF9AF49311F00401AE908EB241DBB8598DAFA1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock_memmove
                                                                                  • String ID: EA06
                                                                                  • API String ID: 1988441806-3962188686
                                                                                  • Opcode ID: c3fb460435d9dcb54da087ebcc1f13d5900604332bb950123dc7350df5d38bdf
                                                                                  • Instruction ID: 1fd03f48ca8247819a79851309bd0e14e7523b375a699df3e0d8d272044787b4
                                                                                  • Opcode Fuzzy Hash: c3fb460435d9dcb54da087ebcc1f13d5900604332bb950123dc7350df5d38bdf
                                                                                  • Instruction Fuzzy Hash: DF01F972C042187FDB18DBA8CC16EFE7BF8DB11711F00419BF552D2281E878E6049760
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00F898F8
                                                                                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00F8990F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Temp$FileNamePath
                                                                                  • String ID: aut
                                                                                  • API String ID: 3285503233-3010740371
                                                                                  • Opcode ID: f40821baddb8f70b9322987b279ef45d6f58609321e8e0dba30f1db063f1f066
                                                                                  • Instruction ID: 1da4206ef980fcce9b92928d7158e3e3dce41676e3c85015a5ab9b9796bda10d
                                                                                  • Opcode Fuzzy Hash: f40821baddb8f70b9322987b279ef45d6f58609321e8e0dba30f1db063f1f066
                                                                                  • Instruction Fuzzy Hash: 4ED05EB958030DABDB509BE0DC0EFDA777CE704701F0002B1BA94951A1EAB09599AB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9fc3cbb8c9ceaea407ced62866595cc85e93dbba587ffbbb57757b8cc0e49b1a
                                                                                  • Instruction ID: 908a2f5276013c8cd5bc457f03d678d37383cb67656e83156f2d725beb4983fa
                                                                                  • Opcode Fuzzy Hash: 9fc3cbb8c9ceaea407ced62866595cc85e93dbba587ffbbb57757b8cc0e49b1a
                                                                                  • Instruction Fuzzy Hash: 2BF17B71A083009FDB14DF28C880A6ABBE5FF89314F54892EF8998B351D734E945DF82
                                                                                  APIs
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F40193
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F4019B
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F401A6
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F401B1
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F401B9
                                                                                    • Part of subcall function 00F40162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F401C1
                                                                                    • Part of subcall function 00F360F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F2F930), ref: 00F36154
                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F2F9CD
                                                                                  • OleInitialize.OLE32(00000000), ref: 00F2FA4A
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F645C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1986988660-0
                                                                                  • Opcode ID: 4266ea91a236228e73531dc0567a11329ad916952b191c2ced551c5fc7a9b618
                                                                                  • Instruction ID: 534b792b82cae8f78eb389ded095ba1df609634a186f55a420c0558920f0241a
                                                                                  • Opcode Fuzzy Hash: 4266ea91a236228e73531dc0567a11329ad916952b191c2ced551c5fc7a9b618
                                                                                  • Instruction Fuzzy Hash: 1A81A2B0901BCDCEC784DF69ADA06597BE6FB48B0E754812A9119CF2B2E7744484BF11
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F24370
                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F24415
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F24432
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_$_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1505330794-0
                                                                                  • Opcode ID: 09c706e267a8a9c7b39759a689f71bc7e1c3f485c0eb479f33146987f516aaf3
                                                                                  • Instruction ID: 9844d76353c89e044947ff76894a231e8a56d72f42c5697bb3b197f19b6ae583
                                                                                  • Opcode Fuzzy Hash: 09c706e267a8a9c7b39759a689f71bc7e1c3f485c0eb479f33146987f516aaf3
                                                                                  • Instruction Fuzzy Hash: F531A7B0904711CFD721DF74E88469BBBF8FB48718F00092EFA9A86251D7B57944EB52
                                                                                  APIs
                                                                                  • __FF_MSGBANNER.LIBCMT ref: 00F45733
                                                                                    • Part of subcall function 00F4A16B: __NMSG_WRITE.LIBCMT ref: 00F4A192
                                                                                    • Part of subcall function 00F4A16B: __NMSG_WRITE.LIBCMT ref: 00F4A19C
                                                                                  • __NMSG_WRITE.LIBCMT ref: 00F4573A
                                                                                    • Part of subcall function 00F4A1C8: GetModuleFileNameW.KERNEL32(00000000,00FE33BA,00000104,?,00000001,00000000), ref: 00F4A25A
                                                                                    • Part of subcall function 00F4A1C8: ___crtMessageBoxW.LIBCMT ref: 00F4A308
                                                                                    • Part of subcall function 00F4309F: ___crtCorExitProcess.LIBCMT ref: 00F430A5
                                                                                    • Part of subcall function 00F4309F: ExitProcess.KERNEL32 ref: 00F430AE
                                                                                    • Part of subcall function 00F48B28: __getptd_noexit.LIBCMT ref: 00F48B28
                                                                                  • RtlAllocateHeap.NTDLL(01450000,00000000,00000001,00000000,?,?,?,00F40DD3,?), ref: 00F4575F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                  • String ID:
                                                                                  • API String ID: 1372826849-0
                                                                                  • Opcode ID: a64271dc4cc41c4c3ec70ed97dac42bfe6fa6b6b11ed1113777ea121a684fa9a
                                                                                  • Instruction ID: 655a654b0c05fbf1e73956f859bc35ae908e92c1c7072652239928ace4d1b64a
                                                                                  • Opcode Fuzzy Hash: a64271dc4cc41c4c3ec70ed97dac42bfe6fa6b6b11ed1113777ea121a684fa9a
                                                                                  • Instruction Fuzzy Hash: 6F019236640A0ADFE6103B78AC8AB6E7F589F82B71F100535FD559B183DE789C017A61
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00F89548,?,?,?,?,?,00000004), ref: 00F898BB
                                                                                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00F89548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00F898D1
                                                                                  • CloseHandle.KERNEL32(00000000,?,00F89548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F898D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleTime
                                                                                  • String ID:
                                                                                  • API String ID: 3397143404-0
                                                                                  • Opcode ID: 1639f25513139322ea92babe708f29023efa2f9f36beabe8549b1ecffd4d1547
                                                                                  • Instruction ID: 3c31b88b1cd179190f4e795f64cf859e77ab4c48519dedafbe3c4f6bd94d6f4e
                                                                                  • Opcode Fuzzy Hash: 1639f25513139322ea92babe708f29023efa2f9f36beabe8549b1ecffd4d1547
                                                                                  • Instruction Fuzzy Hash: 13E08632240218BBDB312B94EC09FDA7B19AB07770F144120FB546D0E087B11515A798
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00F88D1B
                                                                                    • Part of subcall function 00F42D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F49A24), ref: 00F42D69
                                                                                    • Part of subcall function 00F42D55: GetLastError.KERNEL32(00000000,?,00F49A24), ref: 00F42D7B
                                                                                  • _free.LIBCMT ref: 00F88D2C
                                                                                  • _free.LIBCMT ref: 00F88D3E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                  • Instruction ID: 4928b61a7d792f2532eef0a07ccd600483eec09604c0cd5c9e284f84c824c777
                                                                                  • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                  • Instruction Fuzzy Hash: 48E012A2E0160146DB64B578AD40AD367EC4F583E2F94092DBC0DD7186DE68F883A224
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CALL
                                                                                  • API String ID: 0-4196123274
                                                                                  • Opcode ID: 25ae6bca25eb83d761c0a470e63bb3d390e4e2a5fd8bb97809e7423cee271658
                                                                                  • Instruction ID: 3911720595b6af67cd31563688410df1fc2ed80e2c122aca3db6a518deaaf9fd
                                                                                  • Opcode Fuzzy Hash: 25ae6bca25eb83d761c0a470e63bb3d390e4e2a5fd8bb97809e7423cee271658
                                                                                  • Instruction Fuzzy Hash: 66225B71908311DFC724DF14D894B2ABBE1BF84310F14896DE99A8B362DB75EC45EB82
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: EA06
                                                                                  • API String ID: 4104443479-3962188686
                                                                                  • Opcode ID: 55c9153117ac0282489358c99aebde71b4cd3f66771090d2959a47eaa49bb6b5
                                                                                  • Instruction ID: 57af9b8545bb9544c6d462654a2b29b78b697766759b478eecb306acd248c776
                                                                                  • Opcode Fuzzy Hash: 55c9153117ac0282489358c99aebde71b4cd3f66771090d2959a47eaa49bb6b5
                                                                                  • Instruction Fuzzy Hash: 69417C32E0417857DF229B64FC517BE7FA29B45310FA84464EC82DB287D6B4BD44B3A1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                                  • Instruction ID: b9aa283ec74f9502e3f4fe0f0890a782e53e97004b9f6f8186bb4b45ceacfe1b
                                                                                  • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                                  • Instruction Fuzzy Hash: 5331C9B2604616AFC704DF68D8D1E69B3A5FF483207148629E919CB391DB34E950DB90
                                                                                  APIs
                                                                                  • IsThemeActive.UXTHEME ref: 00F24834
                                                                                    • Part of subcall function 00F4336C: __lock.LIBCMT ref: 00F43372
                                                                                    • Part of subcall function 00F4336C: DecodePointer.KERNEL32(00000001,?,00F24849,00F77C74), ref: 00F4337E
                                                                                    • Part of subcall function 00F4336C: EncodePointer.KERNEL32(?,?,00F24849,00F77C74), ref: 00F43389
                                                                                    • Part of subcall function 00F248FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F24915
                                                                                    • Part of subcall function 00F248FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F2492A
                                                                                    • Part of subcall function 00F23B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F23B68
                                                                                    • Part of subcall function 00F23B3A: IsDebuggerPresent.KERNEL32 ref: 00F23B7A
                                                                                    • Part of subcall function 00F23B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00FE52F8,00FE52E0,?,?), ref: 00F23BEB
                                                                                    • Part of subcall function 00F23B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F23C6F
                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F24874
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                  • String ID:
                                                                                  • API String ID: 1438897964-0
                                                                                  • Opcode ID: 1fc4ba7dfc19653d0d97283410d1f2077312b12f11f9a904abf3cc9dc55d1dba
                                                                                  • Instruction ID: 40f5c4dee90cbb87c4d8c098409e9a24cb501f2ad04f6dd4106519810c0acef3
                                                                                  • Opcode Fuzzy Hash: 1fc4ba7dfc19653d0d97283410d1f2077312b12f11f9a904abf3cc9dc55d1dba
                                                                                  • Instruction Fuzzy Hash: 7F11DF718093999FC700EF68EC8594ABFE8EF99B54F10451EF5408B2B1DBB49508EB82
                                                                                  APIs
                                                                                    • Part of subcall function 00F4571C: __FF_MSGBANNER.LIBCMT ref: 00F45733
                                                                                    • Part of subcall function 00F4571C: __NMSG_WRITE.LIBCMT ref: 00F4573A
                                                                                    • Part of subcall function 00F4571C: RtlAllocateHeap.NTDLL(01450000,00000000,00000001,00000000,?,?,?,00F40DD3,?), ref: 00F4575F
                                                                                  • std::exception::exception.LIBCMT ref: 00F40DEC
                                                                                  • __CxxThrowException@8.LIBCMT ref: 00F40E01
                                                                                    • Part of subcall function 00F4859B: RaiseException.KERNEL32(?,?,?,00FD9E78,00000000,?,?,?,?,00F40E06,?,00FD9E78,?,00000001), ref: 00F485F0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 3902256705-0
                                                                                  • Opcode ID: 19f072291f05b2487f0dc00ed651cc2a32844d08b3543cddb51960984aa7e236
                                                                                  • Instruction ID: 931d50d8ad15a28c167495ebdaa94005c3f4b95c6e260bae332b49877d9b811d
                                                                                  • Opcode Fuzzy Hash: 19f072291f05b2487f0dc00ed651cc2a32844d08b3543cddb51960984aa7e236
                                                                                  • Instruction Fuzzy Hash: FFF0C83190431E66CB10FAA9EC019DF7FBC9F05361F10082AFE0496292DFB49A55F6D1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __lock_file_memset
                                                                                  • String ID:
                                                                                  • API String ID: 26237723-0
                                                                                  • Opcode ID: 832750978e4e4f1c3b2583dd04314d53ce4d36b1a53249b6ddb5c5c11e909272
                                                                                  • Instruction ID: 8a9b23c57f114af0c659d81e8fbf3be73f91600c3067ccfe56a4e17c186cd92d
                                                                                  • Opcode Fuzzy Hash: 832750978e4e4f1c3b2583dd04314d53ce4d36b1a53249b6ddb5c5c11e909272
                                                                                  • Instruction Fuzzy Hash: A901F771C01A08EBCF12BFA48C0649E7F71AF92B61F454115FC141B192DB398A52FF92
                                                                                  APIs
                                                                                    • Part of subcall function 00F48B28: __getptd_noexit.LIBCMT ref: 00F48B28
                                                                                  • __lock_file.LIBCMT ref: 00F453EB
                                                                                    • Part of subcall function 00F46C11: __lock.LIBCMT ref: 00F46C34
                                                                                  • __fclose_nolock.LIBCMT ref: 00F453F6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2800547568-0
                                                                                  • Opcode ID: ca3597e26b3233154a58c3d35f04f3137a31f66b2a8e371e1fe8b48bab06a838
                                                                                  • Instruction ID: 97ae9fcf4d7e8ad9a1c9ca2e0074af1326a3ac7efb423b7977ca65bdaa79d78b
                                                                                  • Opcode Fuzzy Hash: ca3597e26b3233154a58c3d35f04f3137a31f66b2a8e371e1fe8b48bab06a838
                                                                                  • Instruction Fuzzy Hash: 3CF09631C01A049BDB11BF659C057BD7EA16F41BB5F248105AC64AB1C2CBBC8946BB52
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 016E873D
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016E8761
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016E8783
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                                                  • Instruction ID: e6dae1c1f70e5c26a19a9ba460333d73cb32cdf806c0ed22a0ffc021ff25cccf
                                                                                  • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                                                  • Instruction Fuzzy Hash: 9412EE20E24658C6EB24DF64D8507DEB272EF68300F1091E9910DEB7A5E77A4F81CF5A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 5d0d18f021392680568856eb7cd6bad9056389dd402f537116c8c5f556646942
                                                                                  • Instruction ID: 26f632b36e6d113964277f6c8f6f464d3c1bce9dc9e9578234dc7da96b3b3f83
                                                                                  • Opcode Fuzzy Hash: 5d0d18f021392680568856eb7cd6bad9056389dd402f537116c8c5f556646942
                                                                                  • Instruction Fuzzy Hash: A331A775608B129FC714EF19D451A22F7B0FF09320718C569E98A8B751DB30E891EB84
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction ID: 31721ba04f4a8413c91dbf0e88335dd1e56b6faa20f76c1c9751526bee5e985b
                                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction Fuzzy Hash: 2D31C071A00106DBD718DF58D4C4A69FBB6FB99310B6486A5EA0ACB351DA31EDC1EBC0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: 1ce5f48c605a1b6dfe84373a340d416284c82325fe6685162d042091d8425a92
                                                                                  • Instruction ID: c076d583ac90f65ab9b44ad081f5b9e4160f5968849c991c99be48c4a65a531d
                                                                                  • Opcode Fuzzy Hash: 1ce5f48c605a1b6dfe84373a340d416284c82325fe6685162d042091d8425a92
                                                                                  • Instruction Fuzzy Hash: 304138749083518FDB24DF24C444B1ABBE0BF45314F0988ACE9998B362C735EC49DF52
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: ef202d80b6ee415e9c96598684154b05afc0aafba1fbc4e658cc03fc3b0b689e
                                                                                  • Instruction ID: 44cb84651851600702e5f230a477ec11d5fb0e99067dc1a3fc40de10ea5a7a48
                                                                                  • Opcode Fuzzy Hash: ef202d80b6ee415e9c96598684154b05afc0aafba1fbc4e658cc03fc3b0b689e
                                                                                  • Instruction Fuzzy Hash: C8214172A04B19EBDB189F21FC417AA7BB4FB54352F20842EE986C50A0EB30C2D4F741
                                                                                  APIs
                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F407B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 82841172-0
                                                                                  • Opcode ID: f65a85b0e33d6ec83d75462d6ee50944f4570b4a64ac6ba1b0b9d44d7317595e
                                                                                  • Instruction ID: d94cbd5393499c822466e1d4538ac683231dd58725c0dbf8160a3c85d74f6037
                                                                                  • Opcode Fuzzy Hash: f65a85b0e33d6ec83d75462d6ee50944f4570b4a64ac6ba1b0b9d44d7317595e
                                                                                  • Instruction Fuzzy Hash: D5113B7E0063019FC322AB75DC42AD6BBD4FF81710B06809EFC4547812CB705D66EB91
                                                                                  APIs
                                                                                    • Part of subcall function 00F24BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F24BEF
                                                                                    • Part of subcall function 00F4525B: __wfsopen.LIBCMT ref: 00F45266
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F24E0F
                                                                                    • Part of subcall function 00F24B6A: FreeLibrary.KERNEL32(00000000), ref: 00F24BA4
                                                                                    • Part of subcall function 00F24C70: _memmove.LIBCMT ref: 00F24CBA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1396898556-0
                                                                                  • Opcode ID: a0a4a1be3a355404276e52e0acbfc38d6797c3a8d244183aef8b89825ebe5731
                                                                                  • Instruction ID: c19bcf08a823c9ed10121d815dd4a0a241fd8a0dc73f32bbc6469becd92148f5
                                                                                  • Opcode Fuzzy Hash: a0a4a1be3a355404276e52e0acbfc38d6797c3a8d244183aef8b89825ebe5731
                                                                                  • Instruction Fuzzy Hash: 40110A32600616ABDF20FF70DC16FAD77A8AF84710F108429F941AB181DBF9AA04BB51
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: f0d57ae95e90d209b797d5b7e0f5bb0995bba4574619f2e6d5edecba60307907
                                                                                  • Instruction ID: 20ab8bf0c669aa7c11cc567739bd38668e03415d24442e52439ad12d691f2f2a
                                                                                  • Opcode Fuzzy Hash: f0d57ae95e90d209b797d5b7e0f5bb0995bba4574619f2e6d5edecba60307907
                                                                                  • Instruction Fuzzy Hash: 892125B4908311DFCB14DF64D844B1ABBE1BF88314F05896CF98A5B722D735E819EB92
                                                                                  APIs
                                                                                  • __lock_file.LIBCMT ref: 00F448A6
                                                                                    • Part of subcall function 00F48B28: __getptd_noexit.LIBCMT ref: 00F48B28
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __getptd_noexit__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2597487223-0
                                                                                  • Opcode ID: 2a17bd2e95f006d0f3616854aa722eca517283bc04a2f87b9eceed7dd6e9d0c5
                                                                                  • Instruction ID: e33532d8d3c068948f9faf5184cb1e0062640dfea8ecb22df209b6c7c8a35989
                                                                                  • Opcode Fuzzy Hash: 2a17bd2e95f006d0f3616854aa722eca517283bc04a2f87b9eceed7dd6e9d0c5
                                                                                  • Instruction Fuzzy Hash: D0F0AF31D01609ABDF11AFA48C067EE3EA1AF01366F158414BC24AA192CBBC9952FB52
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?,?,00FE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F24E7E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 58b557bf9a706a3219cd5135c25dbea86904ed46dcdf8a69a553eaa7afa947b3
                                                                                  • Instruction ID: 74aef5c00bc3348cf4eeba9147c24a858232c1365f6897c9b80afdb7b5bb8df4
                                                                                  • Opcode Fuzzy Hash: 58b557bf9a706a3219cd5135c25dbea86904ed46dcdf8a69a553eaa7afa947b3
                                                                                  • Instruction Fuzzy Hash: 98F03071501B21CFDB349F64E494812BBE1BF14339311893EE1D682610C7B1A844EF40
                                                                                  APIs
                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F407B0
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongNamePath_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2514874351-0
                                                                                  • Opcode ID: 96c06bb91f9bd58ade712dee0fd84f769648f9c3ad415205112c1fbe195743fd
                                                                                  • Instruction ID: 7b27c3d274b2727d5dde519bd046d4e87115396847c4e5414eb387cc7cbee273
                                                                                  • Opcode Fuzzy Hash: 96c06bb91f9bd58ade712dee0fd84f769648f9c3ad415205112c1fbe195743fd
                                                                                  • Instruction Fuzzy Hash: 84E07D329012281BC720E2989C05FEA73DCEFC83A1F0401B5FC0CC7208D964AC8086D0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock
                                                                                  • String ID:
                                                                                  • API String ID: 2638373210-0
                                                                                  • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                  • Instruction ID: 40ee7a6068690eba4e95c852b192073c3011d6924d9a1df2c22ec2afcc623c49
                                                                                  • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                  • Instruction Fuzzy Hash: D6E092B0504B045BD7389A24D800BE377E1AB05314F04081DF6AA93242EB6278429759
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wfsopen
                                                                                  • String ID:
                                                                                  • API String ID: 197181222-0
                                                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                  • Instruction ID: fca3b726430174ceb7858023a365da14cbe7ba74c518cc41b0d703133ccc82ea
                                                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                  • Instruction Fuzzy Hash: 0DB0927644020C77CE012A82EC02A493F199B42B64F408021FF0C18162A6B7A664AA89
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000001F4), ref: 016E8F21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                  • Instruction ID: 501e16321a267d958605d7faa4ce87aa9aeb9048fb237e62ec2a2617b464d653
                                                                                  • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                  • Instruction Fuzzy Hash: 4AE0BF7494510DEFDB00EFA8D94D6DE7BB4EF04301F1006A1FD05D7681DB309E548A62
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000001F4), ref: 016E8F21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119923407.00000000016E6000.00000040.00000020.00020000.00000000.sdmp, Offset: 016E6000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_16e6000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction ID: 57ca3ded23b12c09c6dd420b20ac8a88275048b1512b6536c96f2303c0961d96
                                                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction Fuzzy Hash: B8E0BF7494510D9FDB00EFA8D94D69E7BB4EF04301F100261FD0192281D6309D508A62
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00FACB37
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FACB95
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FACBD6
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FACC00
                                                                                  • SendMessageW.USER32 ref: 00FACC29
                                                                                  • _wcsncpy.LIBCMT ref: 00FACC95
                                                                                  • GetKeyState.USER32(00000011), ref: 00FACCB6
                                                                                  • GetKeyState.USER32(00000009), ref: 00FACCC3
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FACCD9
                                                                                  • GetKeyState.USER32(00000010), ref: 00FACCE3
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FACD0C
                                                                                  • SendMessageW.USER32 ref: 00FACD33
                                                                                  • SendMessageW.USER32(?,00001030,?,00FAB348), ref: 00FACE37
                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00FACE4D
                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00FACE60
                                                                                  • SetCapture.USER32(?), ref: 00FACE69
                                                                                  • ClientToScreen.USER32(?,?), ref: 00FACECE
                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00FACEDB
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FACEF5
                                                                                  • ReleaseCapture.USER32 ref: 00FACF00
                                                                                  • GetCursorPos.USER32(?), ref: 00FACF3A
                                                                                  • ScreenToClient.USER32(?,?), ref: 00FACF47
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FACFA3
                                                                                  • SendMessageW.USER32 ref: 00FACFD1
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FAD00E
                                                                                  • SendMessageW.USER32 ref: 00FAD03D
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00FAD05E
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00FAD06D
                                                                                  • GetCursorPos.USER32(?), ref: 00FAD08D
                                                                                  • ScreenToClient.USER32(?,?), ref: 00FAD09A
                                                                                  • GetParent.USER32(?), ref: 00FAD0BA
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FAD123
                                                                                  • SendMessageW.USER32 ref: 00FAD154
                                                                                  • ClientToScreen.USER32(?,?), ref: 00FAD1B2
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FAD1E2
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FAD20C
                                                                                  • SendMessageW.USER32 ref: 00FAD22F
                                                                                  • ClientToScreen.USER32(?,?), ref: 00FAD281
                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00FAD2B5
                                                                                    • Part of subcall function 00F225DB: GetWindowLongW.USER32(?,000000EB), ref: 00F225EC
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FAD351
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                  • String ID: @GUI_DRAGID$F
                                                                                  • API String ID: 3977979337-4164748364
                                                                                  • Opcode ID: 69a60de2381d280ce36eca0f6d1116268847807c434d5677b2611304e7d4966e
                                                                                  • Instruction ID: 83078ff80939538f611852d639b98d916169360468ea144ceb7015ee6cb23f39
                                                                                  • Opcode Fuzzy Hash: 69a60de2381d280ce36eca0f6d1116268847807c434d5677b2611304e7d4966e
                                                                                  • Instruction Fuzzy Hash: 5942D0B4504384AFDB24CF64C884BAABBE5FF8A760F140519F5958B2B1C731E944FBA1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_memset
                                                                                  • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                                                  • API String ID: 1357608183-1798697756
                                                                                  • Opcode ID: 65845905be90c04d79c252b141d7973722e1fc628403bc076a8481f68b6f6d96
                                                                                  • Instruction ID: a66675e8a8122841c4c60e19d23b284d053b5c7b29fc4adb1820bbdff14f9693
                                                                                  • Opcode Fuzzy Hash: 65845905be90c04d79c252b141d7973722e1fc628403bc076a8481f68b6f6d96
                                                                                  • Instruction Fuzzy Hash: F493A471E04319DBDB24DF58C881BADB7B1FF48320F24816BE949AB281E7749D81EB51
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(00000000,?), ref: 00F248DF
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F5D665
                                                                                  • IsIconic.USER32(?), ref: 00F5D66E
                                                                                  • ShowWindow.USER32(?,00000009), ref: 00F5D67B
                                                                                  • SetForegroundWindow.USER32(?), ref: 00F5D685
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F5D69B
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F5D6A2
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F5D6AE
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F5D6BF
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F5D6C7
                                                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F5D6CF
                                                                                  • SetForegroundWindow.USER32(?), ref: 00F5D6D2
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F5D6E7
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F5D6F2
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F5D6FC
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F5D701
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F5D70A
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F5D70F
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F5D719
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F5D71E
                                                                                  • SetForegroundWindow.USER32(?), ref: 00F5D721
                                                                                  • AttachThreadInput.USER32(?,?,00000000), ref: 00F5D748
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 4125248594-2988720461
                                                                                  • Opcode ID: a948a22bdb63b8be771604aaf951bd86ca068211ae0cb770d963c0265fd5cab2
                                                                                  • Instruction ID: bc132b1747c165955f94700f27a809fa8fcf983327569466891bb80d2ef8a409
                                                                                  • Opcode Fuzzy Hash: a948a22bdb63b8be771604aaf951bd86ca068211ae0cb770d963c0265fd5cab2
                                                                                  • Instruction Fuzzy Hash: 0F3180B1A4131CBFEB306BA19C49F7F3E6CEB45B61F144025FA04EA1D1C6B05905BAA1
                                                                                  APIs
                                                                                    • Part of subcall function 00F787E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7882B
                                                                                    • Part of subcall function 00F787E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F78858
                                                                                    • Part of subcall function 00F787E1: GetLastError.KERNEL32 ref: 00F78865
                                                                                  • _memset.LIBCMT ref: 00F78353
                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00F783A5
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F783B6
                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F783CD
                                                                                  • GetProcessWindowStation.USER32 ref: 00F783E6
                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 00F783F0
                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F7840A
                                                                                    • Part of subcall function 00F781CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F78309), ref: 00F781E0
                                                                                    • Part of subcall function 00F781CB: CloseHandle.KERNEL32(?,?,00F78309), ref: 00F781F2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                  • String ID: $default$winsta0
                                                                                  • API String ID: 2063423040-1027155976
                                                                                  • Opcode ID: e901f4d01a3bf7bc5f181bbecbeb3c4038fc8dd0faae64d530fe2eddb135f343
                                                                                  • Instruction ID: b22c9e5b73916deed2d5c683400ffc471b1c981d41f01ac5adc2319716966a9a
                                                                                  • Opcode Fuzzy Hash: e901f4d01a3bf7bc5f181bbecbeb3c4038fc8dd0faae64d530fe2eddb135f343
                                                                                  • Instruction Fuzzy Hash: B28191B1C4020DAFDF11DFA4CC49AEE7B79EF04364F18806AF818A6261DB358E15EB11
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F8C78D
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8C7E1
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F8C806
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F8C81D
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F8C844
                                                                                  • __swprintf.LIBCMT ref: 00F8C890
                                                                                  • __swprintf.LIBCMT ref: 00F8C8D3
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • __swprintf.LIBCMT ref: 00F8C927
                                                                                    • Part of subcall function 00F43698: __woutput_l.LIBCMT ref: 00F436F1
                                                                                  • __swprintf.LIBCMT ref: 00F8C975
                                                                                    • Part of subcall function 00F43698: __flsbuf.LIBCMT ref: 00F43713
                                                                                    • Part of subcall function 00F43698: __flsbuf.LIBCMT ref: 00F4372B
                                                                                  • __swprintf.LIBCMT ref: 00F8C9C4
                                                                                  • __swprintf.LIBCMT ref: 00F8CA13
                                                                                  • __swprintf.LIBCMT ref: 00F8CA62
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                  • API String ID: 3953360268-2428617273
                                                                                  • Opcode ID: 278821226e7dd89082e8348eb781b82d49e93edcef9d3ef7ad493369e68f0bc6
                                                                                  • Instruction ID: 60fec12469dabfbc21b0e864ca454ca4bb1a501fdab8d47e283e31e1eb3e94a1
                                                                                  • Opcode Fuzzy Hash: 278821226e7dd89082e8348eb781b82d49e93edcef9d3ef7ad493369e68f0bc6
                                                                                  • Instruction Fuzzy Hash: 8DA12BB2408315ABC704EFA4DC86DAFB7ECBF95700F400929F58587191EB78DA48DB62
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F8EFB6
                                                                                  • _wcscmp.LIBCMT ref: 00F8EFCB
                                                                                  • _wcscmp.LIBCMT ref: 00F8EFE2
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00F8EFF4
                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00F8F00E
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F8F026
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F031
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00F8F04D
                                                                                  • _wcscmp.LIBCMT ref: 00F8F074
                                                                                  • _wcscmp.LIBCMT ref: 00F8F08B
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8F09D
                                                                                  • SetCurrentDirectoryW.KERNEL32(00FD8920), ref: 00F8F0BB
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F8F0C5
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F0D2
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F0E4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1803514871-438819550
                                                                                  • Opcode ID: acfa6ab76ac80dbeaa6f79845d7d29391bf2316026503adbef4068d604623c45
                                                                                  • Instruction ID: 6ee319be5fffb52015b28890b0017ff1dfa02476a60d40864a7f5ee7d56b64f7
                                                                                  • Opcode Fuzzy Hash: acfa6ab76ac80dbeaa6f79845d7d29391bf2316026503adbef4068d604623c45
                                                                                  • Instruction Fuzzy Hash: 5731E27290020D6EDB14ABA4DC48BEE77EC9F49360F140276E841E21A1DB70DA88EB61
                                                                                  APIs
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FA0953
                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FAF910,00000000,?,00000000,?,?), ref: 00FA09C1
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00FA0A09
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00FA0A92
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00FA0DB2
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00FA0DBF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectCreateRegistryValue
                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                  • API String ID: 536824911-966354055
                                                                                  • Opcode ID: 6fc8e3e4ac2f6ccdcf25883b1648e40021d10f7682018c46143965ccda922922
                                                                                  • Instruction ID: a74a0b6c75f24dec4adf2550e0bdfb61331f84172ab444a818abdec7b4fba347
                                                                                  • Opcode Fuzzy Hash: 6fc8e3e4ac2f6ccdcf25883b1648e40021d10f7682018c46143965ccda922922
                                                                                  • Instruction Fuzzy Hash: CE0280756046119FCB14EF14D841E6AB7E5FF8A320F08846CF8899B362DB78ED45EB81
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F8F113
                                                                                  • _wcscmp.LIBCMT ref: 00F8F128
                                                                                  • _wcscmp.LIBCMT ref: 00F8F13F
                                                                                    • Part of subcall function 00F84385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F843A0
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F8F16E
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F179
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00F8F195
                                                                                  • _wcscmp.LIBCMT ref: 00F8F1BC
                                                                                  • _wcscmp.LIBCMT ref: 00F8F1D3
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8F1E5
                                                                                  • SetCurrentDirectoryW.KERNEL32(00FD8920), ref: 00F8F203
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F8F20D
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F21A
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F22C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1824444939-438819550
                                                                                  • Opcode ID: 5d5188e52c5e97c7e4fc1e40bd9730bea98f28cc7d85a746a510e8d8e506676c
                                                                                  • Instruction ID: 1f8946d12b70cb4c50bb079f2ae78c0864673860ca9497be603c3bf0173d450b
                                                                                  • Opcode Fuzzy Hash: 5d5188e52c5e97c7e4fc1e40bd9730bea98f28cc7d85a746a510e8d8e506676c
                                                                                  • Instruction Fuzzy Hash: 0631E77690021E6EDF10BBA4EC59BEE77AC9F45370F140171E800E61A0DB30DE89EB65
                                                                                  APIs
                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F8A20F
                                                                                  • __swprintf.LIBCMT ref: 00F8A231
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F8A26E
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F8A293
                                                                                  • _memset.LIBCMT ref: 00F8A2B2
                                                                                  • _wcsncpy.LIBCMT ref: 00F8A2EE
                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F8A323
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F8A32E
                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00F8A337
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F8A341
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                  • String ID: :$\$\??\%s
                                                                                  • API String ID: 2733774712-3457252023
                                                                                  • Opcode ID: a4c0ca40a08546dc1b64a7bbba0f51a4ffe1ec6ffb6847c31e034da786e9a635
                                                                                  • Instruction ID: bd842af9427f43700e0da1b6cc3f96f4dcb62bd59935e06bfbd2e4a45340c753
                                                                                  • Opcode Fuzzy Hash: a4c0ca40a08546dc1b64a7bbba0f51a4ffe1ec6ffb6847c31e034da786e9a635
                                                                                  • Instruction Fuzzy Hash: 2F31C5B1900209ABEB21DFA0DC49FEB37BCEF89750F1041B6FA09D6160EB7597449B25
                                                                                  APIs
                                                                                    • Part of subcall function 00F78202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F7821E
                                                                                    • Part of subcall function 00F78202: GetLastError.KERNEL32(?,00F77CE2,?,?,?), ref: 00F78228
                                                                                    • Part of subcall function 00F78202: GetProcessHeap.KERNEL32(00000008,?,?,00F77CE2,?,?,?), ref: 00F78237
                                                                                    • Part of subcall function 00F78202: HeapAlloc.KERNEL32(00000000,?,00F77CE2,?,?,?), ref: 00F7823E
                                                                                    • Part of subcall function 00F78202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F78255
                                                                                    • Part of subcall function 00F7829F: GetProcessHeap.KERNEL32(00000008,00F77CF8,00000000,00000000,?,00F77CF8,?), ref: 00F782AB
                                                                                    • Part of subcall function 00F7829F: HeapAlloc.KERNEL32(00000000,?,00F77CF8,?), ref: 00F782B2
                                                                                    • Part of subcall function 00F7829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00F77CF8,?), ref: 00F782C3
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F77D13
                                                                                  • _memset.LIBCMT ref: 00F77D28
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F77D47
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F77D58
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00F77D95
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F77DB1
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F77DCE
                                                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00F77DDD
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00F77DE4
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F77E05
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00F77E0C
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F77E3D
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F77E63
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F77E77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3996160137-0
                                                                                  • Opcode ID: 76b2520324400d1b081eff8b062129e6b306a1444ac057bb4c6e5ad2d9c91ca6
                                                                                  • Instruction ID: c295b94ed745e517a12fb88a733fe0be1e3923d7cc06324ac0d980476269e488
                                                                                  • Opcode Fuzzy Hash: 76b2520324400d1b081eff8b062129e6b306a1444ac057bb4c6e5ad2d9c91ca6
                                                                                  • Instruction Fuzzy Hash: 26616D71900209AFDF10DFA0DC44AEEBB79FF05310F04C16AF819AB291DB359A15EB61
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                                                  • API String ID: 0-4052911093
                                                                                  • Opcode ID: 2682425fb2d8b3e145c6fc6064691a6879c8ef2dfd8580c355902ea9dcccaef8
                                                                                  • Instruction ID: 56b84d628fc48fa74b194127e9236b4b2347c78e4e4daec40138b0ccca2b9188
                                                                                  • Opcode Fuzzy Hash: 2682425fb2d8b3e145c6fc6064691a6879c8ef2dfd8580c355902ea9dcccaef8
                                                                                  • Instruction Fuzzy Hash: A7726171E00219DBDF24CF58C8807AEB7B5FF48720F24C16AE849EB291DB749945EB91
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 00F80097
                                                                                  • SetKeyboardState.USER32(?), ref: 00F80102
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00F80122
                                                                                  • GetKeyState.USER32(000000A0), ref: 00F80139
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00F80168
                                                                                  • GetKeyState.USER32(000000A1), ref: 00F80179
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00F801A5
                                                                                  • GetKeyState.USER32(00000011), ref: 00F801B3
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00F801DC
                                                                                  • GetKeyState.USER32(00000012), ref: 00F801EA
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00F80213
                                                                                  • GetKeyState.USER32(0000005B), ref: 00F80221
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: 4b2d1fc1c04607bf6c510b10124ee169458c035b0e7137864bc33c6f1780cde0
                                                                                  • Instruction ID: fe87d7e031d8639df942ccc3d8dddcbbdeab0faac9bfbd506e90393ba4486172
                                                                                  • Opcode Fuzzy Hash: 4b2d1fc1c04607bf6c510b10124ee169458c035b0e7137864bc33c6f1780cde0
                                                                                  • Instruction Fuzzy Hash: 8A51EE20E047881DFB75FBA088557EABFB49F023A0F88459DD5C15A1C3DEA49B8CE761
                                                                                  APIs
                                                                                    • Part of subcall function 00FA0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9FDAD,?,?), ref: 00FA0E31
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FA04AC
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00FA054B
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00FA05E3
                                                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00FA0822
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00FA082F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1240663315-0
                                                                                  • Opcode ID: 609214dd39175cacc8116ab3c6a1a629cd91f1f7da36dc4b119191f746903795
                                                                                  • Instruction ID: 8661a4d7ff9a50ec8a18d8af56cfdcbdf585c8fca131845610eb21b0fcd71b8f
                                                                                  • Opcode Fuzzy Hash: 609214dd39175cacc8116ab3c6a1a629cd91f1f7da36dc4b119191f746903795
                                                                                  • Instruction Fuzzy Hash: 1BE17E71604214AFCB14DF24DC85E6ABBE4FF8A314F04856DF84ADB261DA34EC05DB92
                                                                                  APIs
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • CoInitialize.OLE32 ref: 00F98403
                                                                                  • CoUninitialize.OLE32 ref: 00F9840E
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00FB2BEC,?), ref: 00F9846E
                                                                                  • IIDFromString.OLE32(?,?), ref: 00F984E1
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F9857B
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F985DC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                  • API String ID: 834269672-1287834457
                                                                                  • Opcode ID: 908276cb0fea627d17ea557a0a3a7ff5b4d829b265a26c5db56d02412c40ac4d
                                                                                  • Instruction ID: 95796a2143633e00e18e266b8d6edfe73f9759f2880c1bc09756a8a06aa10dca
                                                                                  • Opcode Fuzzy Hash: 908276cb0fea627d17ea557a0a3a7ff5b4d829b265a26c5db56d02412c40ac4d
                                                                                  • Instruction Fuzzy Hash: E26125716083129FEB10DF24C844F5EB7E4AF4A7A4F04441DF9859B291CB74ED4AEB92
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1737998785-0
                                                                                  • Opcode ID: b7d1085e2a51d433451025f06725d470eb8bedd613b95f8838dd3f6f480d15b7
                                                                                  • Instruction ID: 57b4108e4eeba433a9747610e2efcc48f47176486f334d8103664dc2eae6867e
                                                                                  • Opcode Fuzzy Hash: b7d1085e2a51d433451025f06725d470eb8bedd613b95f8838dd3f6f480d15b7
                                                                                  • Instruction Fuzzy Hash: 3F21D1756006149FEB11AFA0EC09F6D7BA8FF55720F14802AF946DB2A1CB74AC42EB44
                                                                                  APIs
                                                                                    • Part of subcall function 00F24750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F24743,?,?,00F237AE,?), ref: 00F24770
                                                                                    • Part of subcall function 00F84A31: GetFileAttributesW.KERNEL32(?,00F8370B), ref: 00F84A32
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F838A3
                                                                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00F8394B
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F8395E
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00F8397B
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F8399D
                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00F839B9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 4002782344-1173974218
                                                                                  • Opcode ID: ec4c3ab8fdd3dfd87654535f8912b6fe0f4a0396221fa3f2af126ae09a7aa16b
                                                                                  • Instruction ID: ec8d5f85b45945a92fa2a71ba4676fda641483996e5b44aab6bcb7e012f0e67a
                                                                                  • Opcode Fuzzy Hash: ec4c3ab8fdd3dfd87654535f8912b6fe0f4a0396221fa3f2af126ae09a7aa16b
                                                                                  • Instruction Fuzzy Hash: F651903180515DAACF05FBA0ED929EDB779AF11310F600069E402B71A1EF796F0DEB61
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00F8F440
                                                                                  • Sleep.KERNEL32(0000000A), ref: 00F8F470
                                                                                  • _wcscmp.LIBCMT ref: 00F8F484
                                                                                  • _wcscmp.LIBCMT ref: 00F8F49F
                                                                                  • FindNextFileW.KERNEL32(?,?), ref: 00F8F53D
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8F553
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                  • String ID: *.*
                                                                                  • API String ID: 713712311-438819550
                                                                                  • Opcode ID: d29239ab2b4abc430c2c7123944440f43456ebedfe1377b2a105abba20d71cf5
                                                                                  • Instruction ID: e0793d0f67e1d8e7b582705adbd3864f0c78f10d86066d5682a3fc2edef50713
                                                                                  • Opcode Fuzzy Hash: d29239ab2b4abc430c2c7123944440f43456ebedfe1377b2a105abba20d71cf5
                                                                                  • Instruction Fuzzy Hash: A5417E71D0021A9FCF14EFA4DC45AEEBBB4FF05320F14446AE815A7191DB349A89EB50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 97439f99cd0adbccb6b6a9730678095c21a2cc1978a92e54bcae5a4ee577267f
                                                                                  • Instruction ID: 279a4cd9304e542fe8dbff8b234f1e1058c2b6c3072353f2021a6382d107b55e
                                                                                  • Opcode Fuzzy Hash: 97439f99cd0adbccb6b6a9730678095c21a2cc1978a92e54bcae5a4ee577267f
                                                                                  • Instruction Fuzzy Hash: 5812AE70E00619DFCF04DFA4D981AAEB7F5FF88310F10852AE806A7250EB39A915EB51
                                                                                  APIs
                                                                                    • Part of subcall function 00F24750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F24743,?,?,00F237AE,?), ref: 00F24770
                                                                                    • Part of subcall function 00F84A31: GetFileAttributesW.KERNEL32(?,00F8370B), ref: 00F84A32
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F83B89
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F83BD9
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F83BEA
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F83C01
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F83C0A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 2649000838-1173974218
                                                                                  • Opcode ID: 09afd596098fb3366349b624311542488962b84f8a110655982f21f8fb758aaa
                                                                                  • Instruction ID: c64fe2b74daa3c34a1a299c3a6744a9bd59c630378d3efb35c7553de7b1898e2
                                                                                  • Opcode Fuzzy Hash: 09afd596098fb3366349b624311542488962b84f8a110655982f21f8fb758aaa
                                                                                  • Instruction Fuzzy Hash: EA317C710083959BC700FF64EC919EFB7E8AE92710F44092DF4D5961A1EB24DA0DEB62
                                                                                  APIs
                                                                                    • Part of subcall function 00F787E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7882B
                                                                                    • Part of subcall function 00F787E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F78858
                                                                                    • Part of subcall function 00F787E1: GetLastError.KERNEL32 ref: 00F78865
                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00F851F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                  • String ID: $@$SeShutdownPrivilege
                                                                                  • API String ID: 2234035333-194228
                                                                                  • Opcode ID: 7e9b284406a2cd7f42ec1df3233df70ddee3823171d22e4b575a5050ba7185d8
                                                                                  • Instruction ID: cf4c40b1b1d9aeed8633505282044dbeccbbe1d5fbb56a9809b66cb35cab6c07
                                                                                  • Opcode Fuzzy Hash: 7e9b284406a2cd7f42ec1df3233df70ddee3823171d22e4b575a5050ba7185d8
                                                                                  • Instruction Fuzzy Hash: 94017B32B916156BFB2872689C8BFFB7258EB05F90F240461F803E60D2DE501C05B390
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F962DC
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F962EB
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00F96307
                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00F96316
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F96330
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00F96344
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                  • String ID:
                                                                                  • API String ID: 1279440585-0
                                                                                  • Opcode ID: 83b03de094a2209663d5c5a24d48fbd6fef4d2510904f71611cefc511edb99a4
                                                                                  • Instruction ID: 373a4ad4df688be1ff84eccf335ee0d487a632875a61a27431b6893b9f5d8669
                                                                                  • Opcode Fuzzy Hash: 83b03de094a2209663d5c5a24d48fbd6fef4d2510904f71611cefc511edb99a4
                                                                                  • Instruction Fuzzy Hash: 4921DB71600214AFDF10AFA4DC85E6EB7A8EF49720F188169E816EB3D1CB74AD05EB51
                                                                                  APIs
                                                                                    • Part of subcall function 00F40DB6: std::exception::exception.LIBCMT ref: 00F40DEC
                                                                                    • Part of subcall function 00F40DB6: __CxxThrowException@8.LIBCMT ref: 00F40E01
                                                                                  • _memmove.LIBCMT ref: 00F70258
                                                                                  • _memmove.LIBCMT ref: 00F7036D
                                                                                  • _memmove.LIBCMT ref: 00F70414
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 1300846289-0
                                                                                  • Opcode ID: 66c6ac0e7655596e5f6dff9508b8d4c5b2c07a6a10cf8a13fed0ee3e4c90fbbb
                                                                                  • Instruction ID: 9b5169ad92ea7070e583757dca3a731821c8e7ba83929860d531edc8ee5ccf36
                                                                                  • Opcode Fuzzy Hash: 66c6ac0e7655596e5f6dff9508b8d4c5b2c07a6a10cf8a13fed0ee3e4c90fbbb
                                                                                  • Instruction Fuzzy Hash: 3E02B0B1E00209DBCF04DF64D981AAEBBB5EF84310F54C06AE80ADB255EF35D954EB91
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F219FA
                                                                                  • GetSysColor.USER32(0000000F), ref: 00F21A4E
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00F21A61
                                                                                    • Part of subcall function 00F21290: DefDlgProcW.USER32(?,00000020,?), ref: 00F212D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorProc$LongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3744519093-0
                                                                                  • Opcode ID: 52e2fc4fdaebfd24b7c65bc65c084427b3d3aea0fd87cb8c077ce9075f25031b
                                                                                  • Instruction ID: b843ac8ffadef114fc8f528d2e17b49df55cea69e5cd6c3edb8709b8c8985776
                                                                                  • Opcode Fuzzy Hash: 52e2fc4fdaebfd24b7c65bc65c084427b3d3aea0fd87cb8c077ce9075f25031b
                                                                                  • Instruction Fuzzy Hash: B3A1AFB2502579BEE7389B286C44F7F355CFF62362B140119FA02D5192CB2E9D01FAB9
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F8BCE6
                                                                                  • _wcscmp.LIBCMT ref: 00F8BD16
                                                                                  • _wcscmp.LIBCMT ref: 00F8BD2B
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F8BD3C
                                                                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00F8BD6C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File_wcscmp$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 2387731787-0
                                                                                  • Opcode ID: 9682f4c52f4d3941dcfcb3d67d03f2a96b0e0919b28c4d4a1b805ca5638fd15a
                                                                                  • Instruction ID: df4b9a8eed5ba242f2f53b0be4bf47b00983e31bcec0dfc305fe6f84368b84f7
                                                                                  • Opcode Fuzzy Hash: 9682f4c52f4d3941dcfcb3d67d03f2a96b0e0919b28c4d4a1b805ca5638fd15a
                                                                                  • Instruction Fuzzy Hash: 3E51A076A04702AFC714EF68D890EDAB7E4EF49320F04461DE9568B3A1DB34ED05EB91
                                                                                  APIs
                                                                                    • Part of subcall function 00F97D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00F97DB6
                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F9679E
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F967C7
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00F96800
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F9680D
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00F96821
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 99427753-0
                                                                                  • Opcode ID: 4b61939dac6fc9721685a798e3ed3960845f463d9a6d3003ce19dc49baede24e
                                                                                  • Instruction ID: 3f1ba5061cb0eb9198e8071e7f34a831b694e11102f8c8824c9d8426a5f88ed7
                                                                                  • Opcode Fuzzy Hash: 4b61939dac6fc9721685a798e3ed3960845f463d9a6d3003ce19dc49baede24e
                                                                                  • Instruction Fuzzy Hash: 7841E575A00224AFEB10BF649C86F7E77A8DF05754F44845CF915AB3C2CA789D01A791
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                  • String ID:
                                                                                  • API String ID: 292994002-0
                                                                                  • Opcode ID: e400c1719eb26ddf84d0fc137a5e120f6aec7273c4acb4e5540e215507aae324
                                                                                  • Instruction ID: c4ca0d6a94a7026567d5e5e16731d5fbd315de283b27989d4fa6744ed2cda2fc
                                                                                  • Opcode Fuzzy Hash: e400c1719eb26ddf84d0fc137a5e120f6aec7273c4acb4e5540e215507aae324
                                                                                  • Instruction Fuzzy Hash: 1D1127B2B00A256FDF205F66DC44B6E7B9DFF86BA1B444038F845D7241CBB4DC01A6A0
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F780C0
                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F780CA
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F780D9
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F780E0
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F780F6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: 888de06b6de3beb5a78099284189a681d4a63a740281d7e0d33d0714531bb119
                                                                                  • Instruction ID: 445e9324317b1d1a9f7cac6b9d0da6e0266497e467b6db3a8fc1745bd83e852f
                                                                                  • Opcode Fuzzy Hash: 888de06b6de3beb5a78099284189a681d4a63a740281d7e0d33d0714531bb119
                                                                                  • Instruction Fuzzy Hash: 16F06271240308AFEB100FA5EC8DE673BACEF4A7A5B404026F949CA150CBA19C46EA61
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00F24AD0), ref: 00F24B45
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F24B57
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                  • API String ID: 2574300362-192647395
                                                                                  • Opcode ID: 6b46dc9997c96479b77d2b7f429eb5a79c0663bd5c5497dd076d8dcfabe631a3
                                                                                  • Instruction ID: db4497f2dc6be9650829d4a2afbe8599a34488979be3a4f1d12e60e204290f78
                                                                                  • Opcode Fuzzy Hash: 6b46dc9997c96479b77d2b7f429eb5a79c0663bd5c5497dd076d8dcfabe631a3
                                                                                  • Instruction Fuzzy Hash: CED02BB4E10327CFC7209FB1EC18B0272E4AF82390B10C83ED4C2CA150D7B0E484EA24
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 674341424-0
                                                                                  • Opcode ID: 3f57fec65c8bd254178ede153fadb64a9469a5d6f4f21b20447efe7c108546ae
                                                                                  • Instruction ID: 6abd226df5d5a0cec386ec2b2e67c9094653dc43c7910486290f3df8cb4891af
                                                                                  • Opcode Fuzzy Hash: 3f57fec65c8bd254178ede153fadb64a9469a5d6f4f21b20447efe7c108546ae
                                                                                  • Instruction Fuzzy Hash: AD22BE72A083109FC724DF24D881B6FB7E4BF84720F14492DF89A97291DB75E944EB92
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00F9EE3D
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00F9EE4B
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00F9EF0B
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00F9EF1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2576544623-0
                                                                                  • Opcode ID: 4a333aafc36e342039511a0c67db26c8b0b68828140a413718d26463439eb139
                                                                                  • Instruction ID: da23091962ed2c9583ace763e9f842101a837a44dfc68524abce32a1d6767e35
                                                                                  • Opcode Fuzzy Hash: 4a333aafc36e342039511a0c67db26c8b0b68828140a413718d26463439eb139
                                                                                  • Instruction Fuzzy Hash: 9951AF71508315AFD710EF20DC82EABB7E8EF95710F40482DF595972A2EB74E908DB92
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F7E628
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen
                                                                                  • String ID: ($|
                                                                                  • API String ID: 1659193697-1631851259
                                                                                  • Opcode ID: d3998763eda6d735a0b99cf1472eb42f04b3b8a40f1e87e64b50f1f8d40f6330
                                                                                  • Instruction ID: 650161fca60246141556b53e098da69c98b1c72cf069390959cc7a9d84b00eaf
                                                                                  • Opcode Fuzzy Hash: d3998763eda6d735a0b99cf1472eb42f04b3b8a40f1e87e64b50f1f8d40f6330
                                                                                  • Instruction Fuzzy Hash: 20321575A007059FD728CF19C481A6AB7F1FF48320B15C4AFE99ADB3A1EB70A941DB41
                                                                                  APIs
                                                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F9180A,00000000), ref: 00F923E1
                                                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00F92418
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                                                  • String ID:
                                                                                  • API String ID: 599397726-0
                                                                                  • Opcode ID: cb4ba1db892d481a793fa1aba1eefbd56e2c24e9e4b8ece9f92d98147ce1e02d
                                                                                  • Instruction ID: 3391c8f0adbb050ad8de4b8f9b8aa74aa710a79caa0e65d183e738fcb15178ff
                                                                                  • Opcode Fuzzy Hash: cb4ba1db892d481a793fa1aba1eefbd56e2c24e9e4b8ece9f92d98147ce1e02d
                                                                                  • Instruction Fuzzy Hash: 3D41D372904209FFFF60DE99DC81FBBB7BCEB40724F10402AFA45A6141DA759E41BA60
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F8B40B
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F8B465
                                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00F8B4B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID:
                                                                                  • API String ID: 1682464887-0
                                                                                  • Opcode ID: 3432b51d1bb88b7ab2661c898fa5f57cbc991c458c949c93f1d09da666b843c3
                                                                                  • Instruction ID: a49555a3b03f1eb840da8cd46a826b59dedc55b822de1c16e11e4ade56da0c9b
                                                                                  • Opcode Fuzzy Hash: 3432b51d1bb88b7ab2661c898fa5f57cbc991c458c949c93f1d09da666b843c3
                                                                                  • Instruction Fuzzy Hash: 1A21A175A00118EFCB00EFA5EC81AEDBBB8FF49310F1480AAE905EB361CB359915DB50
                                                                                  APIs
                                                                                    • Part of subcall function 00F40DB6: std::exception::exception.LIBCMT ref: 00F40DEC
                                                                                    • Part of subcall function 00F40DB6: __CxxThrowException@8.LIBCMT ref: 00F40E01
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7882B
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F78858
                                                                                  • GetLastError.KERNEL32 ref: 00F78865
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 1922334811-0
                                                                                  • Opcode ID: 5eeb51f0b8377aeab4d37f3c41aea37c3f66da53de13516957b3baea18795136
                                                                                  • Instruction ID: 3af6b87ccd1fd56771b706c06c3e5ad667c5210ce7ba3ab78fa3d60b0a3480db
                                                                                  • Opcode Fuzzy Hash: 5eeb51f0b8377aeab4d37f3c41aea37c3f66da53de13516957b3baea18795136
                                                                                  • Instruction Fuzzy Hash: AA119DB2814204AFE718DFA4DC89D2BBBB8EB05350B20C52EE45987201EE30AC059B61
                                                                                  APIs
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F78774
                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F7878B
                                                                                  • FreeSid.ADVAPI32(?), ref: 00F7879B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                  • String ID:
                                                                                  • API String ID: 3429775523-0
                                                                                  • Opcode ID: b0cb2cb67e6e5c9a0898ecf271971554faac007f9689f3c1c4b94440115367ac
                                                                                  • Instruction ID: db791f2f7af8fc3e59bceeaa7c45b01b88344d23c37a81e26c73eb43ee982429
                                                                                  • Opcode Fuzzy Hash: b0cb2cb67e6e5c9a0898ecf271971554faac007f9689f3c1c4b94440115367ac
                                                                                  • Instruction Fuzzy Hash: 43F04F7595130CBFDF04DFF4DC89AAEB7BCEF08311F108469A501E6181E6715A089B50
                                                                                  APIs
                                                                                  • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00F84CB3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: mouse_event
                                                                                  • String ID: DOWN
                                                                                  • API String ID: 2434400541-711622031
                                                                                  • Opcode ID: eab23cf47b921a8af90ed7a4f807b9d2d23e4b8e1bd847d7008308dc1555026c
                                                                                  • Instruction ID: 90d913ca6ca3704e70b4a37eaad0c108d67ea32ff201e76aa084ba190a3ba5ae
                                                                                  • Opcode Fuzzy Hash: eab23cf47b921a8af90ed7a4f807b9d2d23e4b8e1bd847d7008308dc1555026c
                                                                                  • Instruction Fuzzy Hash: 73E046665997223DA9482918BC07EF72A8C8B13331B550216FC10E55C1EE94BC8236B9
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F8C6FB
                                                                                  • FindClose.KERNEL32(00000000), ref: 00F8C72B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID:
                                                                                  • API String ID: 2295610775-0
                                                                                  • Opcode ID: ef771f65ef5c88eb0028425af1d3f9c03a900715f09c3f539469e7e7d7174ed1
                                                                                  • Instruction ID: 4889df333f1d185553aa24f3effc3dc8f784dd68b207ae420b93f6346f08db87
                                                                                  • Opcode Fuzzy Hash: ef771f65ef5c88eb0028425af1d3f9c03a900715f09c3f539469e7e7d7174ed1
                                                                                  • Instruction Fuzzy Hash: 8F118E726046049FDB10EF29DC45A6AF7E8EF85324F04851EF8AACB290DB74AC05DB91
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00F99468,?,00FAFB84,?), ref: 00F8A097
                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00F99468,?,00FAFB84,?), ref: 00F8A0A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 3479602957-0
                                                                                  • Opcode ID: a332bf6a7591f80724618dc42b4c8e39d64d4f0889cabd8ca268c492ba4b036a
                                                                                  • Instruction ID: 5c58dfe13c99532ca052c401b5cd07ac30b3a5bc31d8ba5b805a9e5799855ef6
                                                                                  • Opcode Fuzzy Hash: a332bf6a7591f80724618dc42b4c8e39d64d4f0889cabd8ca268c492ba4b036a
                                                                                  • Instruction Fuzzy Hash: 1AF0E23610422DABDB20AFA4CC49FEA736CFF09362F004166F908D6180D630A904DBA1
                                                                                  APIs
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F78309), ref: 00F781E0
                                                                                  • CloseHandle.KERNEL32(?,?,00F78309), ref: 00F781F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                  • String ID:
                                                                                  • API String ID: 81990902-0
                                                                                  • Opcode ID: ec7beeaf85e402ad1018e2e3b01ae8ea7e966bee9a85e26fa17d1d1959eea4fc
                                                                                  • Instruction ID: c18903d4ce0201495effc92cb3ff67f633b760b4276d58e546201233fc7d7578
                                                                                  • Opcode Fuzzy Hash: ec7beeaf85e402ad1018e2e3b01ae8ea7e966bee9a85e26fa17d1d1959eea4fc
                                                                                  • Instruction Fuzzy Hash: 57E0EC76010611AFEB252B61EC09D777BEEEF04361714C92DF9A684470DB76ACA1EB10
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00F48D57,?,?,?,00000001), ref: 00F4A15A
                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00F4A163
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: fa74ac5cc1ea0c61e317eb2ce11f9446103b56a4e3c3914b004e2acb3b72b1a0
                                                                                  • Instruction ID: 643fa0f9b326218c407c3d6f0842ff21c94da5a8835f60af4fe11f689f181ce6
                                                                                  • Opcode Fuzzy Hash: fa74ac5cc1ea0c61e317eb2ce11f9446103b56a4e3c3914b004e2acb3b72b1a0
                                                                                  • Instruction Fuzzy Hash: 76B0927505430CABCF002BD1EC59B883F68EB46AA2F404020F60D88060CBA25454AA91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 37151cef7fd2fe39ad7e5f140dcb289fe048f547f964478f90990aff33c87b01
                                                                                  • Instruction ID: 16c30021069663d222251002db04c3b5f6c0e68f9d3b210a9fe3783a681dc566
                                                                                  • Opcode Fuzzy Hash: 37151cef7fd2fe39ad7e5f140dcb289fe048f547f964478f90990aff33c87b01
                                                                                  • Instruction Fuzzy Hash: 3032F322D29F054DDB239634DCA2335A648AFF73D4F15D737EC1AB59AAEB28C4836500
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 262a18bc9e9986582f89867f3a29354ec16422deceed94033acc75674612620a
                                                                                  • Instruction ID: ff2832aa45e30c7cd395f38759e1a920b39f5bb25c31a00d7e74249c580a6b79
                                                                                  • Opcode Fuzzy Hash: 262a18bc9e9986582f89867f3a29354ec16422deceed94033acc75674612620a
                                                                                  • Instruction Fuzzy Hash: 21B10230E2AF444DD32396398871336BA9CAFBB2D5F55D71BFC2670D22EB2285836541
                                                                                  APIs
                                                                                  • __time64.LIBCMT ref: 00F8889B
                                                                                    • Part of subcall function 00F4520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00F88F6E,00000000,?,?,?,?,00F8911F,00000000,?), ref: 00F45213
                                                                                    • Part of subcall function 00F4520A: __aulldiv.LIBCMT ref: 00F45233
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$FileSystem__aulldiv__time64
                                                                                  • String ID:
                                                                                  • API String ID: 2893107130-0
                                                                                  • Opcode ID: c6cbb490d38ff04b652fbf91749a9561b05f3900b97a4a8e3adc370a8ac7bc0d
                                                                                  • Instruction ID: 52f55ed3aee2054a2d73d2702fc1f12dc5f69f797dd43b53e5b9b785ac0b441c
                                                                                  • Opcode Fuzzy Hash: c6cbb490d38ff04b652fbf91749a9561b05f3900b97a4a8e3adc370a8ac7bc0d
                                                                                  • Instruction Fuzzy Hash: F421B432A356148BC729CF25D881A92B3E1EFA5321B688E6CD1F5CF2D0CB74B905DB54
                                                                                  APIs
                                                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00F78389), ref: 00F787D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LogonUser
                                                                                  • String ID:
                                                                                  • API String ID: 1244722697-0
                                                                                  • Opcode ID: 86e095a651ff71abbf44ca03665f6390f638aa3467b8ef7a661bbb79112fe874
                                                                                  • Instruction ID: 4f91b27d977764da0f1c24cc08dacaa73b1002abf02f7cd186ba5dd5785196b8
                                                                                  • Opcode Fuzzy Hash: 86e095a651ff71abbf44ca03665f6390f638aa3467b8ef7a661bbb79112fe874
                                                                                  • Instruction Fuzzy Hash: 41D05E322A050EABEF018EA4DC01EAE3B69EB04B01F40C111FE15C50A1C775D835AB60
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00F4A12A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: 7cb2c4d247dfffaa79dde1946eeeb76003b2bfa205871bc937836e0ff40ee971
                                                                                  • Instruction ID: 55719b4cf4560e1f0d296f8555da48c5ef775f3a9481120a3c7a938d082283f0
                                                                                  • Opcode Fuzzy Hash: 7cb2c4d247dfffaa79dde1946eeeb76003b2bfa205871bc937836e0ff40ee971
                                                                                  • Instruction Fuzzy Hash: CDA0113000020CAB8F002B82EC08888BFACEA022A0B008020F80C880228B32A820AA80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e8575dff8759557118a6eca048f912c28048ace92fe2acb9120953f6f77449a4
                                                                                  • Instruction ID: 08780a3171d5816ba8d0f80d46de1668c9ae270c6dfec58212795ae1fc325e5c
                                                                                  • Opcode Fuzzy Hash: e8575dff8759557118a6eca048f912c28048ace92fe2acb9120953f6f77449a4
                                                                                  • Instruction Fuzzy Hash: 32224831D0434ADBCF288A24C49477C77A1BB01BB4F24806BF54ACB592DBBC9D92F652
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                  • Instruction ID: 65de15032a1a9519c43cf0bddade5d2834f8d49b91f699cbbd0ffc5eb0844cb8
                                                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                  • Instruction Fuzzy Hash: 35C19672A050930ADF6D8639843413EFEB16EA27B135A077DECB3CB1D5EE10C965E620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                  • Instruction ID: c9aa65240430b80156cb60e0b542f35ce6da220c03519136d979de4fcdaab076
                                                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                  • Instruction Fuzzy Hash: 3EC19473A0519309DF6D463A843413EBEA16EA27F135A077DECB2DB1D4EE20C964F620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                  • Instruction ID: 457cfbbacbb604626c25d754bd6ad713e3f773ad209cc29662764ae619798618
                                                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                  • Instruction Fuzzy Hash: 3CC17272A4519309DF2D4639C47417EBFA16EA27B131A076DDCB2CB2D4FE20C9A5E620
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 00F9785B
                                                                                  • DeleteObject.GDI32(00000000), ref: 00F9786D
                                                                                  • DestroyWindow.USER32 ref: 00F9787B
                                                                                  • GetDesktopWindow.USER32 ref: 00F97895
                                                                                  • GetWindowRect.USER32(00000000), ref: 00F9789C
                                                                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00F979DD
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00F979ED
                                                                                  • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97A35
                                                                                  • GetClientRect.USER32(00000000,?), ref: 00F97A41
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F97A7B
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97A9D
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97AB0
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97ABB
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F97AC4
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97AD3
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F97ADC
                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97AE3
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00F97AEE
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97B00
                                                                                  • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00FB2CAC,00000000), ref: 00F97B16
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00F97B26
                                                                                  • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00F97B4C
                                                                                  • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00F97B6B
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97B8D
                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F97D7A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                  • API String ID: 2211948467-2373415609
                                                                                  • Opcode ID: 1921982947d263551c8cd1f6c851e9e3dcc19e5073519ce6a65366672779f8f8
                                                                                  • Instruction ID: 84a2c6d214e2af3c5a65001ed0567f06228a14c717bf16a33c5b89a23d2998ba
                                                                                  • Opcode Fuzzy Hash: 1921982947d263551c8cd1f6c851e9e3dcc19e5073519ce6a65366672779f8f8
                                                                                  • Instruction Fuzzy Hash: 27027BB1910219EFDF14DFA4DC89EAE7BB9EF49310F148158F905AB2A1C774AD01EB60
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?,00FAF910), ref: 00FA3627
                                                                                  • IsWindowVisible.USER32(?), ref: 00FA364B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpperVisibleWindow
                                                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                  • API String ID: 4105515805-45149045
                                                                                  • Opcode ID: 25e7e7ce5d809bac47964652419a6cefe899da99458c5b467accc759a073cdeb
                                                                                  • Instruction ID: ea9ec73f8d311fa8f38daf53102ec9bbe8acff2d5938dd8134a075671aa89ae7
                                                                                  • Opcode Fuzzy Hash: 25e7e7ce5d809bac47964652419a6cefe899da99458c5b467accc759a073cdeb
                                                                                  • Instruction Fuzzy Hash: 1CD1B6712083119BCB04EF10C855A6E7BA2AF96354F184459F8865B3A3CF79DE0AFB81
                                                                                  APIs
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00FAA630
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00FAA661
                                                                                  • GetSysColor.USER32(0000000F), ref: 00FAA66D
                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 00FAA687
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00FAA696
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00FAA6C1
                                                                                  • GetSysColor.USER32(00000010), ref: 00FAA6C9
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00FAA6D0
                                                                                  • FrameRect.USER32(?,?,00000000), ref: 00FAA6DF
                                                                                  • DeleteObject.GDI32(00000000), ref: 00FAA6E6
                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00FAA731
                                                                                  • FillRect.USER32(?,?,00000000), ref: 00FAA763
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FAA78E
                                                                                    • Part of subcall function 00FAA8CA: GetSysColor.USER32(00000012), ref: 00FAA903
                                                                                    • Part of subcall function 00FAA8CA: SetTextColor.GDI32(?,?), ref: 00FAA907
                                                                                    • Part of subcall function 00FAA8CA: GetSysColorBrush.USER32(0000000F), ref: 00FAA91D
                                                                                    • Part of subcall function 00FAA8CA: GetSysColor.USER32(0000000F), ref: 00FAA928
                                                                                    • Part of subcall function 00FAA8CA: GetSysColor.USER32(00000011), ref: 00FAA945
                                                                                    • Part of subcall function 00FAA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FAA953
                                                                                    • Part of subcall function 00FAA8CA: SelectObject.GDI32(?,00000000), ref: 00FAA964
                                                                                    • Part of subcall function 00FAA8CA: SetBkColor.GDI32(?,00000000), ref: 00FAA96D
                                                                                    • Part of subcall function 00FAA8CA: SelectObject.GDI32(?,?), ref: 00FAA97A
                                                                                    • Part of subcall function 00FAA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00FAA999
                                                                                    • Part of subcall function 00FAA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FAA9B0
                                                                                    • Part of subcall function 00FAA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00FAA9C5
                                                                                    • Part of subcall function 00FAA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FAA9ED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                  • String ID:
                                                                                  • API String ID: 3521893082-0
                                                                                  • Opcode ID: 4a8c71d342106af5bc4090fb5dae0d379762027ce3c7ea7560da371eee6ae84e
                                                                                  • Instruction ID: c60bd833bebb39ae19b997f863758997283a8b71423779d4b7988e3509c25423
                                                                                  • Opcode Fuzzy Hash: 4a8c71d342106af5bc4090fb5dae0d379762027ce3c7ea7560da371eee6ae84e
                                                                                  • Instruction Fuzzy Hash: 279181B2408305EFC7109FA4DC08A5B7BA9FF4A331F144B29F962DA1A0D735D948EB52
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?,?), ref: 00F22CA2
                                                                                  • DeleteObject.GDI32(00000000), ref: 00F22CE8
                                                                                  • DeleteObject.GDI32(00000000), ref: 00F22CF3
                                                                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 00F22CFE
                                                                                  • DestroyWindow.USER32(00000000,?,?,?), ref: 00F22D09
                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F5C43B
                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F5C474
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F5C89D
                                                                                    • Part of subcall function 00F21B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F22036,?,00000000,?,?,?,?,00F216CB,00000000,?), ref: 00F21B9A
                                                                                  • SendMessageW.USER32(?,00001053), ref: 00F5C8DA
                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F5C8F1
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F5C907
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F5C912
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                  • String ID: 0
                                                                                  • API String ID: 464785882-4108050209
                                                                                  • Opcode ID: 7df8996cdf8de4195f3ff3ee5683587db4c71de74ecdd83426ba58c975a2b85d
                                                                                  • Instruction ID: 81836462ab0a29ca11cbe3df6672acc61a0b3a751910964ccd616447a4424acc
                                                                                  • Opcode Fuzzy Hash: 7df8996cdf8de4195f3ff3ee5683587db4c71de74ecdd83426ba58c975a2b85d
                                                                                  • Instruction Fuzzy Hash: 5C129130904311EFDB14CF24D884B69B7E1FF09322F584569FA96DB662C731E84AEB91
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(00000000), ref: 00F974DE
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F9759D
                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00F975DB
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00F975ED
                                                                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00F97633
                                                                                  • GetClientRect.USER32(00000000,?), ref: 00F9763F
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00F97683
                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F97692
                                                                                  • GetStockObject.GDI32(00000011), ref: 00F976A2
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F976A6
                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00F976B6
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F976BF
                                                                                  • DeleteDC.GDI32(00000000), ref: 00F976C8
                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F976F4
                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F9770B
                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00F97746
                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F9775A
                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F9776B
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00F9779B
                                                                                  • GetStockObject.GDI32(00000011), ref: 00F977A6
                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F977B1
                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00F977BB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                  • API String ID: 2910397461-517079104
                                                                                  • Opcode ID: 560ebf8fbde9b42c1ea098e836bb8705e727144cd325543f5bb93b92a306650f
                                                                                  • Instruction ID: 0c8fec539a6ea76939c96a86b1b2d04a9fc3ac05f7e7acc383c86dc22b73dba7
                                                                                  • Opcode Fuzzy Hash: 560ebf8fbde9b42c1ea098e836bb8705e727144cd325543f5bb93b92a306650f
                                                                                  • Instruction Fuzzy Hash: 20A190B1A00619BFEB14DBA4DC4AFAE7BB9EF09714F044114FA15AB2E0C774AD04DB64
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F8AD1E
                                                                                  • GetDriveTypeW.KERNEL32(?,00FAFAC0,?,\\.\,00FAF910), ref: 00F8ADFB
                                                                                  • SetErrorMode.KERNEL32(00000000,00FAFAC0,?,\\.\,00FAF910), ref: 00F8AF59
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DriveType
                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                  • API String ID: 2907320926-4222207086
                                                                                  • Opcode ID: 024c55109d2250d4d1e972ecadc897afd342ade09e193735012944970c53961a
                                                                                  • Instruction ID: be9e884fe95d271a98655cd5573ec9b94175d85900309331fffe7f44b5edcc40
                                                                                  • Opcode Fuzzy Hash: 024c55109d2250d4d1e972ecadc897afd342ade09e193735012944970c53961a
                                                                                  • Instruction Fuzzy Hash: E451C2B1A48209AB9B00FB10CD82DFD73A2EB48750B284457E507AB394DAB4DD02FB43
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                  • API String ID: 1038674560-86951937
                                                                                  • Opcode ID: 292e2405b7d16bdf2079c2254a607805d4344ac4aec91771af9f74f95a3d8ee2
                                                                                  • Instruction ID: f80beb729e74e6cdc3d8b507b29c352316f2e9ebce336ee9b15d726cbd364c05
                                                                                  • Opcode Fuzzy Hash: 292e2405b7d16bdf2079c2254a607805d4344ac4aec91771af9f74f95a3d8ee2
                                                                                  • Instruction Fuzzy Hash: B9813BB1A002156ACB15AF60FC83FAF3B68AF05710F044025FD45EB192EB79DE49F661
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00FA9AD2
                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00FA9B8B
                                                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 00FA9BA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window
                                                                                  • String ID: 0
                                                                                  • API String ID: 2326795674-4108050209
                                                                                  • Opcode ID: 50f27171c8532b8ebb0314ccd53d96b75778c12c1c5dcfbf128f734cf46293df
                                                                                  • Instruction ID: 73c99848287ee4d0a6d985341a2ef4fc169c3b66d03e054d3511e5cd3df01c25
                                                                                  • Opcode Fuzzy Hash: 50f27171c8532b8ebb0314ccd53d96b75778c12c1c5dcfbf128f734cf46293df
                                                                                  • Instruction Fuzzy Hash: 4002E2B1508301AFDB25CF14CC88BAABBE5FF86324F04852DF995DA2A1C7B4D944EB51
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000012), ref: 00FAA903
                                                                                  • SetTextColor.GDI32(?,?), ref: 00FAA907
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00FAA91D
                                                                                  • GetSysColor.USER32(0000000F), ref: 00FAA928
                                                                                  • CreateSolidBrush.GDI32(?), ref: 00FAA92D
                                                                                  • GetSysColor.USER32(00000011), ref: 00FAA945
                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FAA953
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00FAA964
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00FAA96D
                                                                                  • SelectObject.GDI32(?,?), ref: 00FAA97A
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00FAA999
                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FAA9B0
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00FAA9C5
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FAA9ED
                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00FAAA14
                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00FAAA32
                                                                                  • DrawFocusRect.USER32(?,?), ref: 00FAAA3D
                                                                                  • GetSysColor.USER32(00000011), ref: 00FAAA4B
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00FAAA53
                                                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00FAAA67
                                                                                  • SelectObject.GDI32(?,00FAA5FA), ref: 00FAAA7E
                                                                                  • DeleteObject.GDI32(?), ref: 00FAAA89
                                                                                  • SelectObject.GDI32(?,?), ref: 00FAAA8F
                                                                                  • DeleteObject.GDI32(?), ref: 00FAAA94
                                                                                  • SetTextColor.GDI32(?,?), ref: 00FAAA9A
                                                                                  • SetBkColor.GDI32(?,?), ref: 00FAAAA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                  • String ID:
                                                                                  • API String ID: 1996641542-0
                                                                                  • Opcode ID: 358f589efce3e345f2979abdf1c7cfabe1bbe32b9a67213f625b4dbb36e23998
                                                                                  • Instruction ID: 5b836c60ab90bed90ab0dd22c45adf9c4660dbd66c77e16cabc86dbc53eb14b2
                                                                                  • Opcode Fuzzy Hash: 358f589efce3e345f2979abdf1c7cfabe1bbe32b9a67213f625b4dbb36e23998
                                                                                  • Instruction Fuzzy Hash: A1513DB1D00208FFDB119FA4DC48EAE7BB9EF0A320F154625F911AB2A1D7759944EF90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00FA8AC1
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FA8AD2
                                                                                  • CharNextW.USER32(0000014E), ref: 00FA8B01
                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00FA8B42
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00FA8B58
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FA8B69
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00FA8B86
                                                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00FA8BD8
                                                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00FA8BEE
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FA8C1F
                                                                                  • _memset.LIBCMT ref: 00FA8C44
                                                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00FA8C8D
                                                                                  • _memset.LIBCMT ref: 00FA8CEC
                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00FA8D16
                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00FA8D6E
                                                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00FA8E1B
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00FA8E3D
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FA8E87
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FA8EB4
                                                                                  • DrawMenuBar.USER32(?), ref: 00FA8EC3
                                                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00FA8EEB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                  • String ID: 0
                                                                                  • API String ID: 1073566785-4108050209
                                                                                  • Opcode ID: 24efd96c69525f7a7ecf1a188e07b6e3cb90ce6ab3c4c46ee696fbe79eded42a
                                                                                  • Instruction ID: 09098b20235f20c0e9c7358f0e00a9c7286ddb28aa39974320ffe38468da4a2c
                                                                                  • Opcode Fuzzy Hash: 24efd96c69525f7a7ecf1a188e07b6e3cb90ce6ab3c4c46ee696fbe79eded42a
                                                                                  • Instruction Fuzzy Hash: D0E183B1900209AFDF20DF50CC84EEE7B79EF06760F148156F915AB290DBB49A85EF60
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 00FA49CA
                                                                                  • GetDesktopWindow.USER32 ref: 00FA49DF
                                                                                  • GetWindowRect.USER32(00000000), ref: 00FA49E6
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FA4A48
                                                                                  • DestroyWindow.USER32(?), ref: 00FA4A74
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FA4A9D
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FA4ABB
                                                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00FA4AE1
                                                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00FA4AF6
                                                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00FA4B09
                                                                                  • IsWindowVisible.USER32(?), ref: 00FA4B29
                                                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00FA4B44
                                                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00FA4B58
                                                                                  • GetWindowRect.USER32(?,?), ref: 00FA4B70
                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00FA4B96
                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00FA4BB0
                                                                                  • CopyRect.USER32(?,?), ref: 00FA4BC7
                                                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00FA4C32
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                  • String ID: ($0$tooltips_class32
                                                                                  • API String ID: 698492251-4156429822
                                                                                  • Opcode ID: 0d094906ddc8408b4b0d0e8ac24adc51d2287392611e0af17c5ce748c3461bb8
                                                                                  • Instruction ID: 9298115bcfd8a8d465860a99c17ba82731f77fd1cf08b7d8c30752aada8b9096
                                                                                  • Opcode Fuzzy Hash: 0d094906ddc8408b4b0d0e8ac24adc51d2287392611e0af17c5ce748c3461bb8
                                                                                  • Instruction Fuzzy Hash: 76B18BB1608350AFDB04DF64D844B6BBBE4BF8A314F00891CF5999B2A1D7B4EC05EB95
                                                                                  APIs
                                                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00F844AC
                                                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00F844D2
                                                                                  • _wcscpy.LIBCMT ref: 00F84500
                                                                                  • _wcscmp.LIBCMT ref: 00F8450B
                                                                                  • _wcscat.LIBCMT ref: 00F84521
                                                                                  • _wcsstr.LIBCMT ref: 00F8452C
                                                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00F84548
                                                                                  • _wcscat.LIBCMT ref: 00F84591
                                                                                  • _wcscat.LIBCMT ref: 00F84598
                                                                                  • _wcsncpy.LIBCMT ref: 00F845C3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                  • API String ID: 699586101-1459072770
                                                                                  • Opcode ID: ae852877b5d5d5852b6776791d332788d5c1146c826f90307beb3aebefada8b0
                                                                                  • Instruction ID: cd61e46c692194ceb95fa8c35843f0c75edf6fb3fd2d39ba6c9835c08edbab34
                                                                                  • Opcode Fuzzy Hash: ae852877b5d5d5852b6776791d332788d5c1146c826f90307beb3aebefada8b0
                                                                                  • Instruction Fuzzy Hash: 3241B872A002057BD710BAB48C47EFF7B7CDF42720F04046AFD05E6182EA38EA11B6A5
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F228BC
                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00F228C4
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F228EF
                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00F228F7
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00F2291C
                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F22939
                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F22949
                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F2297C
                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F22990
                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00F229AE
                                                                                  • GetStockObject.GDI32(00000011), ref: 00F229CA
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F229D5
                                                                                    • Part of subcall function 00F22344: GetCursorPos.USER32(?), ref: 00F22357
                                                                                    • Part of subcall function 00F22344: ScreenToClient.USER32(00FE57B0,?), ref: 00F22374
                                                                                    • Part of subcall function 00F22344: GetAsyncKeyState.USER32(00000001), ref: 00F22399
                                                                                    • Part of subcall function 00F22344: GetAsyncKeyState.USER32(00000002), ref: 00F223A7
                                                                                  • SetTimer.USER32(00000000,00000000,00000028,00F21256), ref: 00F229FC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                  • String ID: AutoIt v3 GUI
                                                                                  • API String ID: 1458621304-248962490
                                                                                  • Opcode ID: 4dc08b69649aa19a53f2d5c1f80e776dae1b95381544feb2e582c045c0e26472
                                                                                  • Instruction ID: 5e4273cf77f9aff3a76aa96eadc884be397d59d8d7d1ceb1f442375c585fb5d7
                                                                                  • Opcode Fuzzy Hash: 4dc08b69649aa19a53f2d5c1f80e776dae1b95381544feb2e582c045c0e26472
                                                                                  • Instruction Fuzzy Hash: 26B19071A0021AEFDB14DFA8DC85BAD7BB4FB08715F104229FA16EB290DB74D854EB50
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00F7A47A
                                                                                  • __swprintf.LIBCMT ref: 00F7A51B
                                                                                  • _wcscmp.LIBCMT ref: 00F7A52E
                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F7A583
                                                                                  • _wcscmp.LIBCMT ref: 00F7A5BF
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00F7A5F6
                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F7A648
                                                                                  • GetWindowRect.USER32(?,?), ref: 00F7A67E
                                                                                  • GetParent.USER32(?), ref: 00F7A69C
                                                                                  • ScreenToClient.USER32(00000000), ref: 00F7A6A3
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00F7A71D
                                                                                  • _wcscmp.LIBCMT ref: 00F7A731
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00F7A757
                                                                                  • _wcscmp.LIBCMT ref: 00F7A76B
                                                                                    • Part of subcall function 00F4362C: _iswctype.LIBCMT ref: 00F43634
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                  • String ID: %s%u
                                                                                  • API String ID: 3744389584-679674701
                                                                                  • Opcode ID: cf81fe767297b27c9eef1d70a6bf20f49a3ed1638e01fbe7e0b41025006b28cb
                                                                                  • Instruction ID: b6d6881223808541a1f6767dcb5e01105774954676b6a2a3166a780f12d5d426
                                                                                  • Opcode Fuzzy Hash: cf81fe767297b27c9eef1d70a6bf20f49a3ed1638e01fbe7e0b41025006b28cb
                                                                                  • Instruction Fuzzy Hash: 30A1D371604206ABC718DF64C884FAEB7E8FF84320F05862AF99DC6150D734E956EB93
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 00F7AF18
                                                                                  • _wcscmp.LIBCMT ref: 00F7AF29
                                                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 00F7AF51
                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00F7AF6E
                                                                                  • _wcscmp.LIBCMT ref: 00F7AF8C
                                                                                  • _wcsstr.LIBCMT ref: 00F7AF9D
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00F7AFD5
                                                                                  • _wcscmp.LIBCMT ref: 00F7AFE5
                                                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 00F7B00C
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00F7B055
                                                                                  • _wcscmp.LIBCMT ref: 00F7B065
                                                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 00F7B08D
                                                                                  • GetWindowRect.USER32(00000004,?), ref: 00F7B0F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                  • String ID: @$ThumbnailClass
                                                                                  • API String ID: 1788623398-1539354611
                                                                                  • Opcode ID: 0ed70b3e95fd36fb2fb1fca1485e91f02f972eff31739c3385d30c0c0e65d50b
                                                                                  • Instruction ID: 6ed7cf83e1ddad1ff50ef7a97db34d547671de90b1417f347b948679d2f3c9d6
                                                                                  • Opcode Fuzzy Hash: 0ed70b3e95fd36fb2fb1fca1485e91f02f972eff31739c3385d30c0c0e65d50b
                                                                                  • Instruction Fuzzy Hash: B681B1715083099BDB04DF10C885FAA7BE8EF85724F04C46AFD898A096DB34DD49EB62
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                  • API String ID: 1038674560-1810252412
                                                                                  • Opcode ID: bdba824e0814a3d9f2870a3fb4a638a32a1a80f7f056aa7cf5790b147616f44c
                                                                                  • Instruction ID: 4c8fb23ce46ba3696631fa769917dbf49af87a40bd667800e3c4c26d073a7e24
                                                                                  • Opcode Fuzzy Hash: bdba824e0814a3d9f2870a3fb4a638a32a1a80f7f056aa7cf5790b147616f44c
                                                                                  • Instruction Fuzzy Hash: 5C31D031948319BADB11FA60ED03EAE7765AB10720F64402AF805791E5FA69EF04B653
                                                                                  APIs
                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00F95013
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00F9501E
                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00F95029
                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00F95034
                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00F9503F
                                                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 00F9504A
                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00F95055
                                                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00F95060
                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 00F9506B
                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00F95076
                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00F95081
                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 00F9508C
                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00F95097
                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00F950A2
                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00F950AD
                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00F950B8
                                                                                  • GetCursorInfo.USER32(?), ref: 00F950C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$Load$Info
                                                                                  • String ID:
                                                                                  • API String ID: 2577412497-0
                                                                                  • Opcode ID: 770d74529191e0d3f0b7cc591d97d8cb248d9899f3078056eabdd47173413097
                                                                                  • Instruction ID: ddf025af31afebcce869ed98940e7b1b215da9ea47a2e90ed5586621efe7b69a
                                                                                  • Opcode Fuzzy Hash: 770d74529191e0d3f0b7cc591d97d8cb248d9899f3078056eabdd47173413097
                                                                                  • Instruction Fuzzy Hash: 7E3115B1D0831E6ADF119FB68C8999FBFE8FF04750F50452AE50CE7280DA78A5049F91
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00FAA259
                                                                                  • DestroyWindow.USER32(?,?), ref: 00FAA2D3
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FAA34D
                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FAA36F
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FAA382
                                                                                  • DestroyWindow.USER32(00000000), ref: 00FAA3A4
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F20000,00000000), ref: 00FAA3DB
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FAA3F4
                                                                                  • GetDesktopWindow.USER32 ref: 00FAA40D
                                                                                  • GetWindowRect.USER32(00000000), ref: 00FAA414
                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FAA42C
                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FAA444
                                                                                    • Part of subcall function 00F225DB: GetWindowLongW.USER32(?,000000EB), ref: 00F225EC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                  • String ID: 0$tooltips_class32
                                                                                  • API String ID: 1297703922-3619404913
                                                                                  • Opcode ID: 224dce6202061203cd9b44d7c3de864bfe23119d4534ab6b72f7c8eb139b1e4b
                                                                                  • Instruction ID: 625f57886465376db6b4968e9d29bea74edbe3561d1b0dfb6205e01f6546b709
                                                                                  • Opcode Fuzzy Hash: 224dce6202061203cd9b44d7c3de864bfe23119d4534ab6b72f7c8eb139b1e4b
                                                                                  • Instruction Fuzzy Hash: EB71BEB1540344AFD720DF28CC48F6A77E6FB8A714F04451DF9858B2A0C775E90AEB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 00FAC627
                                                                                    • Part of subcall function 00FAAB37: ClientToScreen.USER32(?,?), ref: 00FAAB60
                                                                                    • Part of subcall function 00FAAB37: GetWindowRect.USER32(?,?), ref: 00FAABD6
                                                                                    • Part of subcall function 00FAAB37: PtInRect.USER32(?,?,00FAC014), ref: 00FAABE6
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00FAC690
                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FAC69B
                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FAC6BE
                                                                                  • _wcscat.LIBCMT ref: 00FAC6EE
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FAC705
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00FAC71E
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00FAC735
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00FAC757
                                                                                  • DragFinish.SHELL32(?), ref: 00FAC75E
                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00FAC851
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                  • API String ID: 169749273-3440237614
                                                                                  • Opcode ID: acaa07479b31e7af8845c7cbc0b7c5177ca98ebf060379da8fce62a1af47a4c5
                                                                                  • Instruction ID: 414b1509445d62960dffbf34e1dca431ffa011e478f07ae50b6a68ba8425644f
                                                                                  • Opcode Fuzzy Hash: acaa07479b31e7af8845c7cbc0b7c5177ca98ebf060379da8fce62a1af47a4c5
                                                                                  • Instruction Fuzzy Hash: 5961A071108304AFC701EF64DC85D9FBBE8EF89750F04092EF595962A1DB70A949EB92
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00FA4424
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FA446F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharMessageSendUpper
                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                  • API String ID: 3974292440-4258414348
                                                                                  • Opcode ID: b2fbf53f49a9523b2fff4cfb8a77b03351c426b4f0639a3f911fcb3a2ba00de6
                                                                                  • Instruction ID: 0d6c0dd3962f2b2597d8b09c1b44c8a14a0cd75796f90ea2e508eab7e553cbca
                                                                                  • Opcode Fuzzy Hash: b2fbf53f49a9523b2fff4cfb8a77b03351c426b4f0639a3f911fcb3a2ba00de6
                                                                                  • Instruction Fuzzy Hash: 699182716047119FCB04EF10C851A6EB7A1AF96350F48846DFC965B3A2CBB8FD09EB91
                                                                                  APIs
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FAB8B4
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00FA91C2), ref: 00FAB910
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FAB949
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FAB98C
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FAB9C3
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00FAB9CF
                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FAB9DF
                                                                                  • DestroyIcon.USER32(?,?,?,?,?,00FA91C2), ref: 00FAB9EE
                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FABA0B
                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FABA17
                                                                                    • Part of subcall function 00F42EFD: __wcsicmp_l.LIBCMT ref: 00F42F86
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                  • String ID: .dll$.exe$.icl
                                                                                  • API String ID: 1212759294-1154884017
                                                                                  • Opcode ID: 61f21eb9bf84252cbb118b094fb86039ec530163c1858cdd8d9684ac15bdd422
                                                                                  • Instruction ID: 0c76b94b5ba203fa1df19ee58292e2abfce62d102fb68049732e06997cf687d1
                                                                                  • Opcode Fuzzy Hash: 61f21eb9bf84252cbb118b094fb86039ec530163c1858cdd8d9684ac15bdd422
                                                                                  • Instruction Fuzzy Hash: 6C61F1B1900219BAEB14DF64CC41FBE7BACEF0A721F104116FD15DA1D2DB789A90E7A0
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?), ref: 00F8DCDC
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F8DCEC
                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F8DCF8
                                                                                  • __wsplitpath.LIBCMT ref: 00F8DD56
                                                                                  • _wcscat.LIBCMT ref: 00F8DD6E
                                                                                  • _wcscat.LIBCMT ref: 00F8DD80
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F8DD95
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8DDA9
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8DDDB
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8DDFC
                                                                                  • _wcscpy.LIBCMT ref: 00F8DE08
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F8DE47
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                  • String ID: *.*
                                                                                  • API String ID: 3566783562-438819550
                                                                                  • Opcode ID: 38d16b5f96e37479ee8bda89239fc11ec5f7675d00750ac91386388ee1f96947
                                                                                  • Instruction ID: 627edf0a0abc9eb0e842e8feed2d263e586ec84a83e2896d5d785a981609923d
                                                                                  • Opcode Fuzzy Hash: 38d16b5f96e37479ee8bda89239fc11ec5f7675d00750ac91386388ee1f96947
                                                                                  • Instruction Fuzzy Hash: 72618C725082059FCB10EF60D844AEEB3E8FF89320F04492DF989C7291DB79E945DB92
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00F89C7F
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00F89CA0
                                                                                  • __swprintf.LIBCMT ref: 00F89CF9
                                                                                  • __swprintf.LIBCMT ref: 00F89D12
                                                                                  • _wprintf.LIBCMT ref: 00F89DB9
                                                                                  • _wprintf.LIBCMT ref: 00F89DD7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 311963372-3080491070
                                                                                  • Opcode ID: 8836f8d94766e7fcc28ae3e8978d539965adf5efff0668f5cd98aa5bb2a8b539
                                                                                  • Instruction ID: 695d604a32ccfd4003a7efc1fe4f763ce0e111956a8b1318da57b50167e07344
                                                                                  • Opcode Fuzzy Hash: 8836f8d94766e7fcc28ae3e8978d539965adf5efff0668f5cd98aa5bb2a8b539
                                                                                  • Instruction Fuzzy Hash: F951D43290061AAACF14FBE0ED46EEEB778AF04300F540065F50576161EB396F49FB61
                                                                                  APIs
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00F8A3CB
                                                                                  • GetDriveTypeW.KERNEL32 ref: 00F8A418
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F8A460
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F8A497
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F8A4C5
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                  • API String ID: 2698844021-4113822522
                                                                                  • Opcode ID: d8f138040bdd515ababe6e43f625a2086947bc12e516270ddf1c4974ebab5937
                                                                                  • Instruction ID: 53805285490749cc4a71eb3c17c64b8a1ea2b9bf355174b60558b7bd11762aea
                                                                                  • Opcode Fuzzy Hash: d8f138040bdd515ababe6e43f625a2086947bc12e516270ddf1c4974ebab5937
                                                                                  • Instruction Fuzzy Hash: C9519E711083159FC700EF20DC919AAB3E4EF84758F04882EF88A57261DB35ED0AEB82
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F5E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00F7F8DF
                                                                                  • LoadStringW.USER32(00000000,?,00F5E029,00000001), ref: 00F7F8E8
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00FE5310,?,00000FFF,?,?,00F5E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00F7F90A
                                                                                  • LoadStringW.USER32(00000000,?,00F5E029,00000001), ref: 00F7F90D
                                                                                  • __swprintf.LIBCMT ref: 00F7F95D
                                                                                  • __swprintf.LIBCMT ref: 00F7F96E
                                                                                  • _wprintf.LIBCMT ref: 00F7FA17
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F7FA2E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                  • API String ID: 984253442-2268648507
                                                                                  • Opcode ID: 0dc5b04cb2d71078059f383ab8275335b4884de1494815a25dd49c332ae96917
                                                                                  • Instruction ID: 0c3193ee6db92b575963e444d76fc0788128e82a14bf8fb53fe74a7e803641b7
                                                                                  • Opcode Fuzzy Hash: 0dc5b04cb2d71078059f383ab8275335b4884de1494815a25dd49c332ae96917
                                                                                  • Instruction Fuzzy Hash: 8C41307280421DAACF04FFE0ED86DEE7778AF54340F500065B509B6192EA396F4DEB61
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00FA9207,?,?), ref: 00FABA56
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABA6D
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABA78
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABA85
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00FABA8E
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABA9D
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00FABAA6
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABAAD
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FA9207,?,?,00000000,?), ref: 00FABABE
                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FB2CAC,?), ref: 00FABAD7
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00FABAE7
                                                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00FABB0B
                                                                                  • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00FABB36
                                                                                  • DeleteObject.GDI32(00000000), ref: 00FABB5E
                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FABB74
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 3840717409-0
                                                                                  • Opcode ID: 578604257eab56d5de5fcb99cfd86647e2c3c8fb6756d469aaaf230704cd124e
                                                                                  • Instruction ID: e4f1079d76331e442e54f43258df606a80bfdd04cd12b96d22623cc5e63e5f73
                                                                                  • Opcode Fuzzy Hash: 578604257eab56d5de5fcb99cfd86647e2c3c8fb6756d469aaaf230704cd124e
                                                                                  • Instruction Fuzzy Hash: 49413DB5600208EFDB119FA5DC48EAB7BB8FF8A721F104068F906DB261D7349D05EB60
                                                                                  APIs
                                                                                  • __wsplitpath.LIBCMT ref: 00F8DA10
                                                                                  • _wcscat.LIBCMT ref: 00F8DA28
                                                                                  • _wcscat.LIBCMT ref: 00F8DA3A
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F8DA4F
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8DA63
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00F8DA7B
                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F8DA95
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8DAA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                  • String ID: *.*
                                                                                  • API String ID: 34673085-438819550
                                                                                  • Opcode ID: 3b6322d8c22d1b621faf7b1ef07811179a21d89a74fb53ff401601f7f352504c
                                                                                  • Instruction ID: 3ecf7fb7fa48c5802e67bfdd6ce18ca99bc438b156de47dc4c5eeb574d650e85
                                                                                  • Opcode Fuzzy Hash: 3b6322d8c22d1b621faf7b1ef07811179a21d89a74fb53ff401601f7f352504c
                                                                                  • Instruction Fuzzy Hash: A28184729042459FCB24EF64C845AEAB7E4BF85324F18482EF889C7291E734DD45EB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FAC1FC
                                                                                  • GetFocus.USER32 ref: 00FAC20C
                                                                                  • GetDlgCtrlID.USER32(00000000), ref: 00FAC217
                                                                                  • _memset.LIBCMT ref: 00FAC342
                                                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00FAC36D
                                                                                  • GetMenuItemCount.USER32(?), ref: 00FAC38D
                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00FAC3A0
                                                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00FAC3D4
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00FAC41C
                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FAC454
                                                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00FAC489
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 1296962147-4108050209
                                                                                  • Opcode ID: b7812d316589713c80da19d40d37efdbcbdbf8aa490c96beaee31bb6f880d99d
                                                                                  • Instruction ID: 14d2a7f99dbf6fed66d3f729d377d5d0449035ee87e92f9015d48a4fde0d22e0
                                                                                  • Opcode Fuzzy Hash: b7812d316589713c80da19d40d37efdbcbdbf8aa490c96beaee31bb6f880d99d
                                                                                  • Instruction Fuzzy Hash: 1881B1B1A083059FDB10CF54C894A7BBBE8FF8A724F00492DF99597291C730D905EBA2
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 00F9738F
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00F9739B
                                                                                  • CreateCompatibleDC.GDI32(?), ref: 00F973A7
                                                                                  • SelectObject.GDI32(00000000,?), ref: 00F973B4
                                                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00F97408
                                                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00F97444
                                                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00F97468
                                                                                  • SelectObject.GDI32(00000006,?), ref: 00F97470
                                                                                  • DeleteObject.GDI32(?), ref: 00F97479
                                                                                  • DeleteDC.GDI32(00000006), ref: 00F97480
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00F9748B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                  • String ID: (
                                                                                  • API String ID: 2598888154-3887548279
                                                                                  • Opcode ID: e70c68882b4482d0da072b948b2a99cbf9dd44b770fcf6a791c2768f9c4fbd71
                                                                                  • Instruction ID: ed8b6267649a6441d262c3f642db6dd621893a4cf68e00d7eeff4e1e1c4b264c
                                                                                  • Opcode Fuzzy Hash: e70c68882b4482d0da072b948b2a99cbf9dd44b770fcf6a791c2768f9c4fbd71
                                                                                  • Instruction Fuzzy Hash: 50515CB5904309EFDB14DFA9CC84EAEBBB9EF49310F14842DF95A97211C731A944DB50
                                                                                  APIs
                                                                                    • Part of subcall function 00F40957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F26B0C,?,00008000), ref: 00F40973
                                                                                    • Part of subcall function 00F24750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F24743,?,?,00F237AE,?), ref: 00F24770
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F26BAD
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F26CFA
                                                                                    • Part of subcall function 00F2586D: _wcscpy.LIBCMT ref: 00F258A5
                                                                                    • Part of subcall function 00F4363D: _iswctype.LIBCMT ref: 00F43645
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                  • API String ID: 537147316-1018226102
                                                                                  • Opcode ID: c8e0cbb72b2928584f180bedc7dae6fd30d867f1526c9d0e24398b4978013215
                                                                                  • Instruction ID: f7aa308ca019ae3264b16e41a9ec06037f89a28cda5196290cf4ce4473c933e5
                                                                                  • Opcode Fuzzy Hash: c8e0cbb72b2928584f180bedc7dae6fd30d867f1526c9d0e24398b4978013215
                                                                                  • Instruction Fuzzy Hash: 1B02ED315083419FC714EF20DC81AAFBBE5EF99354F14482DF989972A1DB38DA49EB42
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F82D50
                                                                                  • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00F82DDD
                                                                                  • GetMenuItemCount.USER32(00FE5890), ref: 00F82E66
                                                                                  • DeleteMenu.USER32(00FE5890,00000005,00000000,000000F5,?,?), ref: 00F82EF6
                                                                                  • DeleteMenu.USER32(00FE5890,00000004,00000000), ref: 00F82EFE
                                                                                  • DeleteMenu.USER32(00FE5890,00000006,00000000), ref: 00F82F06
                                                                                  • DeleteMenu.USER32(00FE5890,00000003,00000000), ref: 00F82F0E
                                                                                  • GetMenuItemCount.USER32(00FE5890), ref: 00F82F16
                                                                                  • SetMenuItemInfoW.USER32(00FE5890,00000004,00000000,00000030), ref: 00F82F4C
                                                                                  • GetCursorPos.USER32(?), ref: 00F82F56
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00F82F5F
                                                                                  • TrackPopupMenuEx.USER32(00FE5890,00000000,?,00000000,00000000,00000000), ref: 00F82F72
                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F82F7E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3993528054-0
                                                                                  • Opcode ID: 0dbef6b81b930748dd03a1e1fd3b30fadfd4b47e278b5852d2b18f3b69628ae6
                                                                                  • Instruction ID: edf1227bf9d6409af4ddf1268c7ec38deceec1ce82cf18657558e24773f481d1
                                                                                  • Opcode Fuzzy Hash: 0dbef6b81b930748dd03a1e1fd3b30fadfd4b47e278b5852d2b18f3b69628ae6
                                                                                  • Instruction Fuzzy Hash: 9771D271A00209BEEB61AF54DC89FEABF64FF05724F140216F625AA1E1C7B17810FB94
                                                                                  APIs
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  • _memset.LIBCMT ref: 00F7786B
                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F778A0
                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F778BC
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F778D8
                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F77902
                                                                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00F7792A
                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F77935
                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F7793A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                  • API String ID: 1411258926-22481851
                                                                                  • Opcode ID: 86e5fb359d9775b4aaa628dd8ad7eb405e150344f4f281f85df83564731c6030
                                                                                  • Instruction ID: 3928328abe9da5821228182095fccfbbd6894ae7f6a6b4407c48bba5b494d1cd
                                                                                  • Opcode Fuzzy Hash: 86e5fb359d9775b4aaa628dd8ad7eb405e150344f4f281f85df83564731c6030
                                                                                  • Instruction Fuzzy Hash: 74410872C1422DABCF11FFA4EC85DEEB778BF04710F44442AE905A7261EA349D08EB91
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9FDAD,?,?), ref: 00FA0E31
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                  • API String ID: 3964851224-909552448
                                                                                  • Opcode ID: c73b06763563606eb2aaf137b3db5f8bedd3da9c6cce855de4ca04424eb1d628
                                                                                  • Instruction ID: 1d19fbaf6f7f04da10e9617f98dee2cd007002b2808b430ea6d420ce5d7937fb
                                                                                  • Opcode Fuzzy Hash: c73b06763563606eb2aaf137b3db5f8bedd3da9c6cce855de4ca04424eb1d628
                                                                                  • Instruction Fuzzy Hash: 97416A7254424A8FCF10EF50ECA1AEE3765EF12350F184415FC552B292DF78A91AFBA0
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F5E2A0,00000010,?,Bad directive syntax error,00FAF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F7F7C2
                                                                                  • LoadStringW.USER32(00000000,?,00F5E2A0,00000010), ref: 00F7F7C9
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • _wprintf.LIBCMT ref: 00F7F7FC
                                                                                  • __swprintf.LIBCMT ref: 00F7F81E
                                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F7F88D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                  • API String ID: 1506413516-4153970271
                                                                                  • Opcode ID: f95d5df408de0806af6466dbc95871a7f97edae2cc1e8a4b042485c22291d770
                                                                                  • Instruction ID: a648f9d78355a1e8712225f1b21bc53c57dd36d621f5569c6d77ba6dbbea7645
                                                                                  • Opcode Fuzzy Hash: f95d5df408de0806af6466dbc95871a7f97edae2cc1e8a4b042485c22291d770
                                                                                  • Instruction Fuzzy Hash: 0D21803294021EEBCF11EFA0DC4AEEE7739BF18300F044466F509661A1EA75A61CFB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                    • Part of subcall function 00F27924: _memmove.LIBCMT ref: 00F279AD
                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F85330
                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F85346
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F85357
                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F85369
                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F8537A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$_memmove
                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                  • API String ID: 2279737902-1007645807
                                                                                  • Opcode ID: 147ed119f808204509e159e814a05c5aacaaad517fe5c99ab01b953f3da2d375
                                                                                  • Instruction ID: 088939a52b70d15f158be8d986f8d46fbe3ac2b81c16d3a01226090cb227caf0
                                                                                  • Opcode Fuzzy Hash: 147ed119f808204509e159e814a05c5aacaaad517fe5c99ab01b953f3da2d375
                                                                                  • Instruction Fuzzy Hash: 2B119431E5022D7AD720B775DC4ADFF7B7DEB92F90F04042AB401A21D1DEA08D45E6A1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                  • String ID: 0.0.0.0
                                                                                  • API String ID: 208665112-3771769585
                                                                                  • Opcode ID: efff43e7c104766a82db75ac984d91b0860e2a28aa4988457172d501dee9c842
                                                                                  • Instruction ID: fcf8ce577f857dd1d718e1961e7ebfd966e5606c1068b5561aadc3efbbbebb53
                                                                                  • Opcode Fuzzy Hash: efff43e7c104766a82db75ac984d91b0860e2a28aa4988457172d501dee9c842
                                                                                  • Instruction Fuzzy Hash: EB11D571D001196BCB20BB709C4AEEE7BBCEF02721F0401B6F94596091EF789985AB55
                                                                                  APIs
                                                                                  • timeGetTime.WINMM ref: 00F84F7A
                                                                                    • Part of subcall function 00F4049F: timeGetTime.WINMM(?,75A8B400,00F30E7B), ref: 00F404A3
                                                                                  • Sleep.KERNEL32(0000000A), ref: 00F84FA6
                                                                                  • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00F84FCA
                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F84FEC
                                                                                  • SetActiveWindow.USER32 ref: 00F8500B
                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F85019
                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F85038
                                                                                  • Sleep.KERNEL32(000000FA), ref: 00F85043
                                                                                  • IsWindow.USER32 ref: 00F8504F
                                                                                  • EndDialog.USER32(00000000), ref: 00F85060
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                  • String ID: BUTTON
                                                                                  • API String ID: 1194449130-3405671355
                                                                                  • Opcode ID: 058c9b6f548a7fa431260393041882b539ae13a9d5581d7e38353d8570b06c39
                                                                                  • Instruction ID: 5e2d09e6b0b4d2140a057ceb96d097de92ece91e3779588a9c63eaea95daa285
                                                                                  • Opcode Fuzzy Hash: 058c9b6f548a7fa431260393041882b539ae13a9d5581d7e38353d8570b06c39
                                                                                  • Instruction Fuzzy Hash: E521A7B0A0074EAFE7106F60ECC9B763BA9EB15B95F0C1029F102CA2B5DB719D04B761
                                                                                  APIs
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • CoInitialize.OLE32(00000000), ref: 00F8D5EA
                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F8D67D
                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00F8D691
                                                                                  • CoCreateInstance.OLE32(00FB2D7C,00000000,00000001,00FD8C1C,?), ref: 00F8D6DD
                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F8D74C
                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00F8D7A4
                                                                                  • _memset.LIBCMT ref: 00F8D7E1
                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00F8D81D
                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F8D840
                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00F8D847
                                                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00F8D87E
                                                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 00F8D880
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1246142700-0
                                                                                  • Opcode ID: 7f524925c6a66a4aea1efcc4ad37744d9989c9a4b7eb3dfdbc0ae1e8cb81fa20
                                                                                  • Instruction ID: b96148f142b1755b682e0ed628ad04aec3041f22b816922ab2c59bffcec8504e
                                                                                  • Opcode Fuzzy Hash: 7f524925c6a66a4aea1efcc4ad37744d9989c9a4b7eb3dfdbc0ae1e8cb81fa20
                                                                                  • Instruction Fuzzy Hash: EEB10975A00119AFDB04EFA4CC88DAEBBB9FF49314F148069E909EB261DB34ED45DB50
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00F7C283
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F7C295
                                                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00F7C2F3
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00F7C2FE
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F7C310
                                                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00F7C364
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00F7C372
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F7C383
                                                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00F7C3C6
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00F7C3D4
                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F7C3F1
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00F7C3FE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                  • String ID:
                                                                                  • API String ID: 3096461208-0
                                                                                  • Opcode ID: d62a840b8a52bbb55c249faef55824f19376e8cc29a2b3b4a63904f9a3c860f4
                                                                                  • Instruction ID: f413bc29111624c4bf2133dddaf3c6ad9a817b088a4a884a2338bc749675843c
                                                                                  • Opcode Fuzzy Hash: d62a840b8a52bbb55c249faef55824f19376e8cc29a2b3b4a63904f9a3c860f4
                                                                                  • Instruction Fuzzy Hash: 715153B1F00209AFDB18CFA9DD85A6DBBB6EF88310F14812DF519D7290D7709D049B50
                                                                                  APIs
                                                                                    • Part of subcall function 00F21B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F22036,?,00000000,?,?,?,?,00F216CB,00000000,?), ref: 00F21B9A
                                                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F220D3
                                                                                  • KillTimer.USER32(-00000001,?,?,?,?,00F216CB,00000000,?,?,00F21AE2,?,?), ref: 00F2216E
                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00F5BCA6
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F216CB,00000000,?,?,00F21AE2,?,?), ref: 00F5BCD7
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F216CB,00000000,?,?,00F21AE2,?,?), ref: 00F5BCEE
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F216CB,00000000,?,?,00F21AE2,?,?), ref: 00F5BD0A
                                                                                  • DeleteObject.GDI32(00000000), ref: 00F5BD1C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 641708696-0
                                                                                  • Opcode ID: 841e5687b2e3c22cc4e63d87dcb46208d51ccd2cac4bdfaeaa35ae568ded00dd
                                                                                  • Instruction ID: de94315261def64256cc3a1a822a4d541e186da57dd4dcda11b5b0d82e5e2f87
                                                                                  • Opcode Fuzzy Hash: 841e5687b2e3c22cc4e63d87dcb46208d51ccd2cac4bdfaeaa35ae568ded00dd
                                                                                  • Instruction Fuzzy Hash: 5561AF32900A64EFCB35DF14E988B25B7F1FF41726F108529EA424E570C774A994FB80
                                                                                  APIs
                                                                                    • Part of subcall function 00F225DB: GetWindowLongW.USER32(?,000000EB), ref: 00F225EC
                                                                                  • GetSysColor.USER32(0000000F), ref: 00F221D3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorLongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 259745315-0
                                                                                  • Opcode ID: 5c6615dea411bb451a3f0a963417dc3f99b3ae248814750bd70fb64743cd9a5e
                                                                                  • Instruction ID: dd85d5ae566cd4f7e9d808ea9b3d8385cf1962981b01b827f6ce7e012f36036b
                                                                                  • Opcode Fuzzy Hash: 5c6615dea411bb451a3f0a963417dc3f99b3ae248814750bd70fb64743cd9a5e
                                                                                  • Instruction Fuzzy Hash: 97419F31400554EBEB655F68EC88BB93B65EB06331F184365FE659E1E2C7328C46FB21
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?,00FAF910), ref: 00F8A90B
                                                                                  • GetDriveTypeW.KERNEL32(00000061,00FD89A0,00000061), ref: 00F8A9D5
                                                                                  • _wcscpy.LIBCMT ref: 00F8A9FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                  • API String ID: 2820617543-1000479233
                                                                                  • Opcode ID: 6968413e31efd21beef5b0e6f52187fb5d526b4b633375c8fb013f7ac604d7b1
                                                                                  • Instruction ID: 8fcca76723c78381b29312620de27b29112956506c05d9379fd9e3cc4dd2f3d1
                                                                                  • Opcode Fuzzy Hash: 6968413e31efd21beef5b0e6f52187fb5d526b4b633375c8fb013f7ac604d7b1
                                                                                  • Instruction Fuzzy Hash: 3451CC315083019BD304FF14DC92AAFB7A5EF84750F48482EF999572A2DB74D909EB93
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __i64tow__itow__swprintf
                                                                                  • String ID: %.15g$0x%p$False$True
                                                                                  • API String ID: 421087845-2263619337
                                                                                  • Opcode ID: 2ce99cbe5f6a8a9b94f63f27540916c27404b90ae24a9edcef7f9f5829e7144c
                                                                                  • Instruction ID: 548e6c4c23c7aa24c1649cda6d0ed0a4bd2836173f4919b58840e4f5337ad0f2
                                                                                  • Opcode Fuzzy Hash: 2ce99cbe5f6a8a9b94f63f27540916c27404b90ae24a9edcef7f9f5829e7144c
                                                                                  • Instruction Fuzzy Hash: 4241F532904205AFDB24DF34DC42EBA77E8EF05310F6844BEEA49D7291EA759949BB10
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00FA716A
                                                                                  • CreateMenu.USER32 ref: 00FA7185
                                                                                  • SetMenu.USER32(?,00000000), ref: 00FA7194
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FA7221
                                                                                  • IsMenu.USER32(?), ref: 00FA7237
                                                                                  • CreatePopupMenu.USER32 ref: 00FA7241
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FA726E
                                                                                  • DrawMenuBar.USER32 ref: 00FA7276
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                  • String ID: 0$F
                                                                                  • API String ID: 176399719-3044882817
                                                                                  • Opcode ID: 12c03ccc3771083b57676c02b48d518ef97370a657320e9f38f2597bdfbed4e4
                                                                                  • Instruction ID: bf3a504c2853fac65d8c95c761e181bd44f3dcf962f42ca0dc29f3825726a009
                                                                                  • Opcode Fuzzy Hash: 12c03ccc3771083b57676c02b48d518ef97370a657320e9f38f2597bdfbed4e4
                                                                                  • Instruction Fuzzy Hash: E84114B5A01209AFDB20EFA4DD84F9ABBF5FB4A310F144029F9459B361D731A914EF90
                                                                                  APIs
                                                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FA755E
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00FA7565
                                                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FA7578
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00FA7580
                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FA758B
                                                                                  • DeleteDC.GDI32(00000000), ref: 00FA7594
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00FA759E
                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00FA75B2
                                                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00FA75BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                  • String ID: static
                                                                                  • API String ID: 2559357485-2160076837
                                                                                  • Opcode ID: de3bc62de002b97bd98d0678fa8c20d6c6fd3703b6601169bac303cb6d1486dc
                                                                                  • Instruction ID: bcdc8068c9fe1231eb5327285629bb3844bb1a46f1289ae0270a680d3488cbb6
                                                                                  • Opcode Fuzzy Hash: de3bc62de002b97bd98d0678fa8c20d6c6fd3703b6601169bac303cb6d1486dc
                                                                                  • Instruction Fuzzy Hash: E9318FB2904218BFDF11AFA4DC08FDB3B69FF0A320F154224FA559A1A0C735D815EBA4
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F46E3E
                                                                                    • Part of subcall function 00F48B28: __getptd_noexit.LIBCMT ref: 00F48B28
                                                                                  • __gmtime64_s.LIBCMT ref: 00F46ED7
                                                                                  • __gmtime64_s.LIBCMT ref: 00F46F0D
                                                                                  • __gmtime64_s.LIBCMT ref: 00F46F2A
                                                                                  • __allrem.LIBCMT ref: 00F46F80
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F46F9C
                                                                                  • __allrem.LIBCMT ref: 00F46FB3
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F46FD1
                                                                                  • __allrem.LIBCMT ref: 00F46FE8
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F47006
                                                                                  • __invoke_watson.LIBCMT ref: 00F47077
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                  • String ID:
                                                                                  • API String ID: 384356119-0
                                                                                  • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                  • Instruction ID: 44f71f522405d168b39e5bae17931ce48c1ca162568e2640d5c397b04a30d1cb
                                                                                  • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                  • Instruction Fuzzy Hash: 16712476E00716ABE714AE6CCC41BAABBF8AF01374F144229FD14D6281F778ED44A791
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F82542
                                                                                  • GetMenuItemInfoW.USER32(00FE5890,000000FF,00000000,00000030), ref: 00F825A3
                                                                                  • SetMenuItemInfoW.USER32(00FE5890,00000004,00000000,00000030), ref: 00F825D9
                                                                                  • Sleep.KERNEL32(000001F4), ref: 00F825EB
                                                                                  • GetMenuItemCount.USER32(?), ref: 00F8262F
                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00F8264B
                                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00F82675
                                                                                  • GetMenuItemID.USER32(?,?), ref: 00F826BA
                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F82700
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F82714
                                                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F82735
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                  • String ID:
                                                                                  • API String ID: 4176008265-0
                                                                                  • Opcode ID: 7da5319d62de36cc08043c6864e94bdef228fdd0e8af8f92d9eda55577cd22ab
                                                                                  • Instruction ID: 3177cf605d2e65eada4683c86216f3194bea464b0ac4ec1d9f92c9b5b7323d35
                                                                                  • Opcode Fuzzy Hash: 7da5319d62de36cc08043c6864e94bdef228fdd0e8af8f92d9eda55577cd22ab
                                                                                  • Instruction Fuzzy Hash: 656190B1900249AFDF51EFA4DC88EFE7BB8EB01314F140059E842AB251E735BD05EB21
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FA6FA5
                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FA6FA8
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FA6FCC
                                                                                  • _memset.LIBCMT ref: 00FA6FDD
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FA6FEF
                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FA7067
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow_memset
                                                                                  • String ID:
                                                                                  • API String ID: 830647256-0
                                                                                  • Opcode ID: 20370b9d614205ccbce4728059010c1d4e8dc0fe76339b31b7d9b218136ecb90
                                                                                  • Instruction ID: 6928710658254dae7371647a7b05c6ceaeddf5250ebf8b1c88e3ee685ea13cb2
                                                                                  • Opcode Fuzzy Hash: 20370b9d614205ccbce4728059010c1d4e8dc0fe76339b31b7d9b218136ecb90
                                                                                  • Instruction Fuzzy Hash: AA61ACB5900248AFDB11DFA4CC81EEE77F8EB09710F144169FA04EB2A1C775AE45EB90
                                                                                  APIs
                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F76BBF
                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00F76C18
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F76C2A
                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F76C4A
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00F76C9D
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F76CB1
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F76CC6
                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00F76CD3
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F76CDC
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F76CEE
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F76CF9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                  • String ID:
                                                                                  • API String ID: 2706829360-0
                                                                                  • Opcode ID: 6ad2468c17ab87079141689dd5603c3f9a3f4e97a96e735abe933efc7c841eb9
                                                                                  • Instruction ID: 74ebd6ae8963fb196b20d35d61e4d068a0a056a5357e4286f6478ee7c30b0a93
                                                                                  • Opcode Fuzzy Hash: 6ad2468c17ab87079141689dd5603c3f9a3f4e97a96e735abe933efc7c841eb9
                                                                                  • Instruction Fuzzy Hash: 5B416071A0021D9FCF00DFA8DC449EEBBB9EF48350F00C069E955EB261DB35A949EB91
                                                                                  APIs
                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00F95793
                                                                                  • inet_addr.WSOCK32(?,?,?), ref: 00F957D8
                                                                                  • gethostbyname.WSOCK32(?), ref: 00F957E4
                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00F957F2
                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F95862
                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F95878
                                                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00F958ED
                                                                                  • WSACleanup.WSOCK32 ref: 00F958F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                  • String ID: Ping
                                                                                  • API String ID: 1028309954-2246546115
                                                                                  • Opcode ID: 03d53c393cc34095ea507dc26b2e6f6417c2634e64ee9183fcb8d2e9d188d07a
                                                                                  • Instruction ID: 3e8d267b1928df0795ddc9af623a83eb20a16c1c413e861cd1c7a887e805aa39
                                                                                  • Opcode Fuzzy Hash: 03d53c393cc34095ea507dc26b2e6f6417c2634e64ee9183fcb8d2e9d188d07a
                                                                                  • Instruction Fuzzy Hash: 1A51A171A04700DFEB11EF64DC45B2A77E4EF45B20F044929F956DB2A1DB74E904EB42
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F8B4D0
                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F8B546
                                                                                  • GetLastError.KERNEL32 ref: 00F8B550
                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00F8B5BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                  • API String ID: 4194297153-14809454
                                                                                  • Opcode ID: 6edb9ed45998b69fabed8012fc87f72bdddd07363bf6b4621da3dae190c9407d
                                                                                  • Instruction ID: df033936e670d3cf1c847d1404cfe4f05a8f67318c3c5ec819f02f630ea38b73
                                                                                  • Opcode Fuzzy Hash: 6edb9ed45998b69fabed8012fc87f72bdddd07363bf6b4621da3dae190c9407d
                                                                                  • Instruction Fuzzy Hash: E631AF75A002099FCB10FBA8DC85EEE7BB4FF49310F184026E505DB295DB749A46EB81
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00F79014
                                                                                  • GetDlgCtrlID.USER32 ref: 00F7901F
                                                                                  • GetParent.USER32 ref: 00F7903B
                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F7903E
                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F79047
                                                                                  • GetParent.USER32(?), ref: 00F79063
                                                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F79066
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 1536045017-1403004172
                                                                                  • Opcode ID: 89986cc3e0c8dcb2e09c2ca4fda3ae0321da3d8a2f8052c4469320ff48b64004
                                                                                  • Instruction ID: d0e6b2131598c77ecc6039100b6ce8d56514d3c09b7b5114540915b94f216e0a
                                                                                  • Opcode Fuzzy Hash: 89986cc3e0c8dcb2e09c2ca4fda3ae0321da3d8a2f8052c4469320ff48b64004
                                                                                  • Instruction Fuzzy Hash: E321F870A00208BBDF04ABB0CC85EFEBB75EF4A310F104116F925972A1DB799819FB61
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00F790FD
                                                                                  • GetDlgCtrlID.USER32 ref: 00F79108
                                                                                  • GetParent.USER32 ref: 00F79124
                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F79127
                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F79130
                                                                                  • GetParent.USER32(?), ref: 00F7914C
                                                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F7914F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 1536045017-1403004172
                                                                                  • Opcode ID: 65b50fcfd911281aad5b5242cfd22f28149ebc84e2449417e104882074e354ba
                                                                                  • Instruction ID: e194e45f2c2b1a9beb053413928a6ae02467a4957e9a682cd227b9d9f21f547c
                                                                                  • Opcode Fuzzy Hash: 65b50fcfd911281aad5b5242cfd22f28149ebc84e2449417e104882074e354ba
                                                                                  • Instruction Fuzzy Hash: 0B21F874A00208BBDF10ABA0CC85EFEBB78EF45300F504016B515972A1DB799419FB21
                                                                                  APIs
                                                                                  • GetParent.USER32 ref: 00F7916F
                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00F79184
                                                                                  • _wcscmp.LIBCMT ref: 00F79196
                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F79211
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameParentSend_wcscmp
                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                  • API String ID: 1704125052-3381328864
                                                                                  • Opcode ID: 3f08e47314108752691932db077db3bb9e3b6bef8dfc95b28139cedd4536c998
                                                                                  • Instruction ID: e026296899f76a85fdb8ce64634c70db29d1b002e745723921909ec4b0deee51
                                                                                  • Opcode Fuzzy Hash: 3f08e47314108752691932db077db3bb9e3b6bef8dfc95b28139cedd4536c998
                                                                                  • Instruction Fuzzy Hash: AE110A7768C307BAFA113624EC16EA73B9D9B15730B204027FD04E81D2FEE1A951B597
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F988D7
                                                                                  • CoInitialize.OLE32(00000000), ref: 00F98904
                                                                                  • CoUninitialize.OLE32 ref: 00F9890E
                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00F98A0E
                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F98B3B
                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00FB2C0C), ref: 00F98B6F
                                                                                  • CoGetObject.OLE32(?,00000000,00FB2C0C,?), ref: 00F98B92
                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00F98BA5
                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F98C25
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F98C35
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 2395222682-0
                                                                                  • Opcode ID: 022867290e95f89ca28c3afb234ad606bd3af93d2f46acc360e33abaf019e56d
                                                                                  • Instruction ID: b781549c47cc2671d3adae329e793b222ebc0172bce9aa8838659008e240c8ae
                                                                                  • Opcode Fuzzy Hash: 022867290e95f89ca28c3afb234ad606bd3af93d2f46acc360e33abaf019e56d
                                                                                  • Instruction Fuzzy Hash: 43C158B1608305AFDB00DF64C88492BB7E9FF8A388F04491DF8899B251DB75ED06DB52
                                                                                  APIs
                                                                                  • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00F87A6C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafeVartype
                                                                                  • String ID:
                                                                                  • API String ID: 1725837607-0
                                                                                  • Opcode ID: 2641ddce5357a92a5ae23ae768e4e828b98ee1ebc796a34f4db49eb5df236d0f
                                                                                  • Instruction ID: dbcc628473bed3e1300a381218cad54dcf9f39dbf1d352cc3cead61e71b3d668
                                                                                  • Opcode Fuzzy Hash: 2641ddce5357a92a5ae23ae768e4e828b98ee1ebc796a34f4db49eb5df236d0f
                                                                                  • Instruction Fuzzy Hash: 98B15E719082199FDB00FFA4C885BFEBBB5EF49321F244429E901EB251D778E945EB90
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F811F0
                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F80268,?,00000001), ref: 00F81204
                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00F8120B
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F80268,?,00000001), ref: 00F8121A
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F8122C
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F80268,?,00000001), ref: 00F81245
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F80268,?,00000001), ref: 00F81257
                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F80268,?,00000001), ref: 00F8129C
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F80268,?,00000001), ref: 00F812B1
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F80268,?,00000001), ref: 00F812BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                  • String ID:
                                                                                  • API String ID: 2156557900-0
                                                                                  • Opcode ID: 3dff9cf6a9def4f38974db2c6e8403e2882bbc4ec45f5fe16f021001ac6ac986
                                                                                  • Instruction ID: d8aa97e4606f4cb659e2956c6f8dd839553e97a1789000379bcdc718abdf3bff
                                                                                  • Opcode Fuzzy Hash: 3dff9cf6a9def4f38974db2c6e8403e2882bbc4ec45f5fe16f021001ac6ac986
                                                                                  • Instruction Fuzzy Hash: 223193B5A0024CFBDB60AF54EC88FA977AEFB65361F104215F904CA2A0E7B49D45AB50
                                                                                  APIs
                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F2FAA6
                                                                                  • OleUninitialize.OLE32(?,00000000), ref: 00F2FB45
                                                                                  • UnregisterHotKey.USER32(?), ref: 00F2FC9C
                                                                                  • DestroyWindow.USER32(?), ref: 00F645D6
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00F6463B
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F64668
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                  • String ID: close all
                                                                                  • API String ID: 469580280-3243417748
                                                                                  • Opcode ID: 1e594ebdf28672b8d09dceef625ede98224e962e264713fd006aae45c7ffd7f2
                                                                                  • Instruction ID: 46fdb008e793673ebf53be824ce6d40fb6af464a3c20aed801a9dbf063279d64
                                                                                  • Opcode Fuzzy Hash: 1e594ebdf28672b8d09dceef625ede98224e962e264713fd006aae45c7ffd7f2
                                                                                  • Instruction Fuzzy Hash: 53A18C31B01226CFCB19EF14D994A69F764BF05720F5442BDE80AAB261CB35ED1AEF50
                                                                                  APIs
                                                                                  • EnumChildWindows.USER32(?,00F7A439), ref: 00F7A377
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChildEnumWindows
                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                  • API String ID: 3555792229-1603158881
                                                                                  • Opcode ID: 220626e58e249e2d25636c602ee3d6506d1a8a602a2a816dda0018ade0ad59c8
                                                                                  • Instruction ID: 8629ea948f18bf92e837be205124aff02856f2e662afb9ffa8a496bf4b95041c
                                                                                  • Opcode Fuzzy Hash: 220626e58e249e2d25636c602ee3d6506d1a8a602a2a816dda0018ade0ad59c8
                                                                                  • Instruction Fuzzy Hash: 94910331A00606AACB08EFA0C841BEDFB75BF44310F55C11BE84DA7252DF356999FB92
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00F22EAE
                                                                                    • Part of subcall function 00F21DB3: GetClientRect.USER32(?,?), ref: 00F21DDC
                                                                                    • Part of subcall function 00F21DB3: GetWindowRect.USER32(?,?), ref: 00F21E1D
                                                                                    • Part of subcall function 00F21DB3: ScreenToClient.USER32(?,?), ref: 00F21E45
                                                                                  • GetDC.USER32 ref: 00F5CD32
                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F5CD45
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F5CD53
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F5CD68
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00F5CD70
                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F5CDFB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                  • String ID: U
                                                                                  • API String ID: 4009187628-3372436214
                                                                                  • Opcode ID: 89665e7084b83d94795ffadf77c8cbce871e920950a760f6e8eb4f869cae7399
                                                                                  • Instruction ID: b6f12209a1a8586c23cfbcf11360ca27b78c1c9f0e3a5b3b1cfb7fe26d0dd349
                                                                                  • Opcode Fuzzy Hash: 89665e7084b83d94795ffadf77c8cbce871e920950a760f6e8eb4f869cae7399
                                                                                  • Instruction Fuzzy Hash: A871C531900309EFCF218F64DC84AAA7BB5FF49365F14427AEE569A266C7309C45FB90
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F91A50
                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F91A7C
                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00F91ABE
                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F91AD3
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F91AE0
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00F91B10
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00F91B57
                                                                                    • Part of subcall function 00F92483: GetLastError.KERNEL32(?,?,00F91817,00000000,00000000,00000001), ref: 00F92498
                                                                                    • Part of subcall function 00F92483: SetEvent.KERNEL32(?,?,00F91817,00000000,00000000,00000001), ref: 00F924AD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                                  • String ID:
                                                                                  • API String ID: 2603140658-3916222277
                                                                                  • Opcode ID: 1b27c24d0acf8d4fe85336f5bcf6ae5016206d6bbffd8cd19c39326102cd383d
                                                                                  • Instruction ID: 27dad6667123578f4b44a11d2658cf92ce7ebc2f353fd70d090ca474ccc4f076
                                                                                  • Opcode Fuzzy Hash: 1b27c24d0acf8d4fe85336f5bcf6ae5016206d6bbffd8cd19c39326102cd383d
                                                                                  • Instruction Fuzzy Hash: CC4171B190121ABFFF118F50CC85FBA7BADFF49354F004126F9059A141E7749E44ABA0
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00FAF910), ref: 00F98D28
                                                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00FAF910), ref: 00F98D5C
                                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F98ED6
                                                                                  • SysFreeString.OLEAUT32(?), ref: 00F98F00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                  • String ID:
                                                                                  • API String ID: 560350794-0
                                                                                  • Opcode ID: 44089a24daccf94ffcdd0c85ac64ca2384a4c7c12105d0029c1cfea949efcc8e
                                                                                  • Instruction ID: d1a37f47126862dadba919a7a75ef99ccd9a22de39635eeb59e996eafde56d57
                                                                                  • Opcode Fuzzy Hash: 44089a24daccf94ffcdd0c85ac64ca2384a4c7c12105d0029c1cfea949efcc8e
                                                                                  • Instruction Fuzzy Hash: C0F16B71A00209EFEF04DFA4C884EAEB7B9FF49354F108458F915AB251DB71AE46EB50
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F9F6B5
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F9F848
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F9F86C
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F9F8AC
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F9F8CE
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F9FA4A
                                                                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00F9FA7C
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F9FAAB
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F9FB22
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                  • String ID:
                                                                                  • API String ID: 4090791747-0
                                                                                  • Opcode ID: 91b3034a0efea8b795bed614b5d1a61fd6f037a089c6cd31105c389d9a575435
                                                                                  • Instruction ID: 270ca4347268c6db236d608f04492f953325d76827f3c575d7fb38e713b4b1fd
                                                                                  • Opcode Fuzzy Hash: 91b3034a0efea8b795bed614b5d1a61fd6f037a089c6cd31105c389d9a575435
                                                                                  • Instruction Fuzzy Hash: 34E1D4316043019FDB14EF24CC81B6ABBE1EF85364F18856DF8998B2A1CB35DC49EB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F8466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F83697,?), ref: 00F8468B
                                                                                    • Part of subcall function 00F8466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F83697,?), ref: 00F846A4
                                                                                    • Part of subcall function 00F84A31: GetFileAttributesW.KERNEL32(?,00F8370B), ref: 00F84A32
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00F84D40
                                                                                  • _wcscmp.LIBCMT ref: 00F84D5A
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F84D75
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 793581249-0
                                                                                  • Opcode ID: 7688d130454d61fcd28ad746cd2371dfd27149a2170343e6a202a298fec88c51
                                                                                  • Instruction ID: 07250c56c298435a5b51d24df7a225f133edad95a11cfc7a3d4c2ea12a947a99
                                                                                  • Opcode Fuzzy Hash: 7688d130454d61fcd28ad746cd2371dfd27149a2170343e6a202a298fec88c51
                                                                                  • Instruction Fuzzy Hash: A25161B25083459BC724EBA0DC819DFB7ECAF85310F40092EB689D3151EF38B688D766
                                                                                  APIs
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FA86FF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 634782764-0
                                                                                  • Opcode ID: ca6572bf540eecfaf335f27d5a843979ab8adc6ab6dd6d3b15add1f0b9d734ba
                                                                                  • Instruction ID: d8fc057db104afab9bf9c0d54609cf71e8dec280460db3b7ef1c204796d5610d
                                                                                  • Opcode Fuzzy Hash: ca6572bf540eecfaf335f27d5a843979ab8adc6ab6dd6d3b15add1f0b9d734ba
                                                                                  • Instruction Fuzzy Hash: 6251D4B0900254BEEB249B64DC85FAD3B65EB077A0F600121F951D62E1CFF5AD81FB50
                                                                                  APIs
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F5C2F7
                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F5C319
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F5C331
                                                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F5C34F
                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F5C370
                                                                                  • DestroyIcon.USER32(00000000), ref: 00F5C37F
                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F5C39C
                                                                                  • DestroyIcon.USER32(?), ref: 00F5C3AB
                                                                                    • Part of subcall function 00FAA4AF: DeleteObject.GDI32(00000000), ref: 00FAA4E8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                  • String ID:
                                                                                  • API String ID: 2819616528-0
                                                                                  • Opcode ID: 0c3c9a171f6d48653321d675e12b2587eacc470556a3ab36de2186d2902f8ca0
                                                                                  • Instruction ID: 33356eb90a37a3a9f32f096276e58bfc80c1bba9745062cb103bf5dfa892e02e
                                                                                  • Opcode Fuzzy Hash: 0c3c9a171f6d48653321d675e12b2587eacc470556a3ab36de2186d2902f8ca0
                                                                                  • Instruction Fuzzy Hash: 4D516B71A00309EFDB20DF64DC45FAA3BB5EB48721F104529FA029B2A0DB74AD54FB90
                                                                                  APIs
                                                                                    • Part of subcall function 00F7A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F7A84C
                                                                                    • Part of subcall function 00F7A82C: GetCurrentThreadId.KERNEL32 ref: 00F7A853
                                                                                    • Part of subcall function 00F7A82C: AttachThreadInput.USER32(00000000,?,00F79683,?,00000001), ref: 00F7A85A
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F7968E
                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F796AB
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00F796AE
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F796B7
                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F796D5
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F796D8
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F796E1
                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F796F8
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F796FB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2014098862-0
                                                                                  • Opcode ID: 37b9e7ace8c085076e69cd81a1cce88e697b8e5a85de1f4993ef893a536ce5c4
                                                                                  • Instruction ID: 40b705720ee58a7156d4f7a0e69960e7e5895665bfafab15779f82fe97b79495
                                                                                  • Opcode Fuzzy Hash: 37b9e7ace8c085076e69cd81a1cce88e697b8e5a85de1f4993ef893a536ce5c4
                                                                                  • Instruction Fuzzy Hash: 5A11E1B1910618BEF6106FA0DC89F6A3B2DEB4D750F110426F248AF1E1C9F26C11EAA5
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00F7853C,00000B00,?,?), ref: 00F7892A
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00F7853C,00000B00,?,?), ref: 00F78931
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F7853C,00000B00,?,?), ref: 00F78946
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00F7853C,00000B00,?,?), ref: 00F7894E
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00F7853C,00000B00,?,?), ref: 00F78951
                                                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00F7853C,00000B00,?,?), ref: 00F78961
                                                                                  • GetCurrentProcess.KERNEL32(00F7853C,00000000,?,00F7853C,00000B00,?,?), ref: 00F78969
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00F7853C,00000B00,?,?), ref: 00F7896C
                                                                                  • CreateThread.KERNEL32(00000000,00000000,00F78992,00000000,00000000,00000000), ref: 00F78986
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                  • String ID:
                                                                                  • API String ID: 1957940570-0
                                                                                  • Opcode ID: e8c05f92bb1d343edae0a53a9b21491c575f9e1f53724c1420e1930bd98e13fb
                                                                                  • Instruction ID: 9dbb4030237b6015060ccfaebf0bf7a0ddaaf00304def1ff6cb01537af440c54
                                                                                  • Opcode Fuzzy Hash: e8c05f92bb1d343edae0a53a9b21491c575f9e1f53724c1420e1930bd98e13fb
                                                                                  • Instruction Fuzzy Hash: 0101BBB5240348FFE760ABA5DC4DF6B3BACEB89711F418421FA05DF1A1DA709804DB21
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                  • API String ID: 0-572801152
                                                                                  • Opcode ID: e54a46afa3f2575541de18ab4e1dd6ccdf5642acf8442654be182f996cf0ec4a
                                                                                  • Instruction ID: 86554ff11450dbd72ee28fa829d79ef819045c8c3642cbbd42ff09fcfccd5cb5
                                                                                  • Opcode Fuzzy Hash: e54a46afa3f2575541de18ab4e1dd6ccdf5642acf8442654be182f996cf0ec4a
                                                                                  • Instruction Fuzzy Hash: 19C19171E0420A9BEF14DF98D884BAEB7F5BB48314F15846DE905AB280E7B09D45DBA0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$_memset
                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                  • API String ID: 2862541840-625585964
                                                                                  • Opcode ID: d0ef15edc5bee421d1ff470d2539d54d0db830f34f8dd095ce019804aaf8b98d
                                                                                  • Instruction ID: f6b058691fba7214d2483406ec3c3bd49d00e140a980538cadd98243119a2d96
                                                                                  • Opcode Fuzzy Hash: d0ef15edc5bee421d1ff470d2539d54d0db830f34f8dd095ce019804aaf8b98d
                                                                                  • Instruction Fuzzy Hash: C4918F71E04215ABEF24DFA9CC48FAEB7B8EF45720F11811DF505AB280D7B09945DBA0
                                                                                  APIs
                                                                                    • Part of subcall function 00F7710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?,?,00F77455), ref: 00F77127
                                                                                    • Part of subcall function 00F7710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?), ref: 00F77142
                                                                                    • Part of subcall function 00F7710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?), ref: 00F77150
                                                                                    • Part of subcall function 00F7710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?), ref: 00F77160
                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00F99806
                                                                                  • _memset.LIBCMT ref: 00F99813
                                                                                  • _memset.LIBCMT ref: 00F99956
                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00F99982
                                                                                  • CoTaskMemFree.OLE32(?), ref: 00F9998D
                                                                                  Strings
                                                                                  • NULL Pointer assignment, xrefs: 00F999DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                  • String ID: NULL Pointer assignment
                                                                                  • API String ID: 1300414916-2785691316
                                                                                  • Opcode ID: 7b3dc9b4329f408c95b0c69083161a2dd867592b73bd7f4761665e0a6d3d31b1
                                                                                  • Instruction ID: 1c630de61d6ad6cfb4709c6669c30464efeb48b50964b85919d8fb73bb6ff477
                                                                                  • Opcode Fuzzy Hash: 7b3dc9b4329f408c95b0c69083161a2dd867592b73bd7f4761665e0a6d3d31b1
                                                                                  • Instruction Fuzzy Hash: 70912671D00229ABDF10DFA5DC40EDEBBB9EF09710F20416AF419A7291EB759A44DFA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00FA6E24
                                                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00FA6E38
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00FA6E52
                                                                                  • _wcscat.LIBCMT ref: 00FA6EAD
                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00FA6EC4
                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00FA6EF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window_wcscat
                                                                                  • String ID: SysListView32
                                                                                  • API String ID: 307300125-78025650
                                                                                  • Opcode ID: b3c27c3a6f96ea7ec63f1fd4332799648034460b1f53e0c325296a8a3fd9b0e1
                                                                                  • Instruction ID: c607b7a025651466a9f6702a2d18efe715c88d291087200e21174c621bc8174b
                                                                                  • Opcode Fuzzy Hash: b3c27c3a6f96ea7ec63f1fd4332799648034460b1f53e0c325296a8a3fd9b0e1
                                                                                  • Instruction Fuzzy Hash: BE41A1B1A00348AFDB219FA4CC85BEA77A9EF09360F14042AF544E7291D6759D84AB64
                                                                                  APIs
                                                                                    • Part of subcall function 00F83C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00F83C7A
                                                                                    • Part of subcall function 00F83C55: Process32FirstW.KERNEL32(00000000,?), ref: 00F83C88
                                                                                    • Part of subcall function 00F83C55: CloseHandle.KERNEL32(00000000), ref: 00F83D52
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F9E9A4
                                                                                  • GetLastError.KERNEL32 ref: 00F9E9B7
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F9E9E6
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F9EA63
                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F9EA6E
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F9EAA3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                  • String ID: SeDebugPrivilege
                                                                                  • API String ID: 2533919879-2896544425
                                                                                  • Opcode ID: 591c985d3095fda71aa765d773dcbcbe6fc059958ae8ee0ed6985915bf2d5a72
                                                                                  • Instruction ID: d22854cdaf5c13d28d7e6161899ab67c072db2afb7fdc87454e183ddeacbfa18
                                                                                  • Opcode Fuzzy Hash: 591c985d3095fda71aa765d773dcbcbe6fc059958ae8ee0ed6985915bf2d5a72
                                                                                  • Instruction Fuzzy Hash: 1041CE717042009FDB14EF54CC95FADB7A5AF41314F188419F9469F2D2CBB8E809EB92
                                                                                  APIs
                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00F83033
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoad
                                                                                  • String ID: blank$info$question$stop$warning
                                                                                  • API String ID: 2457776203-404129466
                                                                                  • Opcode ID: 731605b45219729645dba40291700889abed6029c5188a3c61114ce78246899a
                                                                                  • Instruction ID: 28a2df2b8596e486425497e3d8813301b315c7127adffe5c47689679453a006b
                                                                                  • Opcode Fuzzy Hash: 731605b45219729645dba40291700889abed6029c5188a3c61114ce78246899a
                                                                                  • Instruction Fuzzy Hash: 3A112B32748346BED714AB54DC42EEB7B9C9F15774B14002AFD00A6281EB74AF4077A5
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F84312
                                                                                  • LoadStringW.USER32(00000000), ref: 00F84319
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F8432F
                                                                                  • LoadStringW.USER32(00000000), ref: 00F84336
                                                                                  • _wprintf.LIBCMT ref: 00F8435C
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F8437A
                                                                                  Strings
                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00F84357
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                  • API String ID: 3648134473-3128320259
                                                                                  • Opcode ID: e99f92a77456692203f4bf59c288b6d3cac9a2763e94369ae6c3ba52839b4b8e
                                                                                  • Instruction ID: cbc4fa957607fbe3caac1030ae1bb5787281271862a72e3bb0f957cd1a9eefcb
                                                                                  • Opcode Fuzzy Hash: e99f92a77456692203f4bf59c288b6d3cac9a2763e94369ae6c3ba52839b4b8e
                                                                                  • Instruction Fuzzy Hash: B301A2F290020CBFE710A7E0DD89EE7776CDB09300F4000A1BB05E6111EA349E896B70
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00FAD47C
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00FAD49C
                                                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00FAD6D7
                                                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00FAD6F5
                                                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00FAD716
                                                                                  • ShowWindow.USER32(00000003,00000000), ref: 00FAD735
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00FAD75A
                                                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00FAD77D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                  • String ID:
                                                                                  • API String ID: 1211466189-0
                                                                                  • Opcode ID: 488b6874f930efb04ec0b05ea6a4d1edb085c37d0a41221ca62344f7ad93b008
                                                                                  • Instruction ID: b264c0da52c015b0987a5e831c572fdd34f505a482e246427fe5ec643ac449de
                                                                                  • Opcode Fuzzy Hash: 488b6874f930efb04ec0b05ea6a4d1edb085c37d0a41221ca62344f7ad93b008
                                                                                  • Instruction Fuzzy Hash: 92B1BCB5A00219EFDF18CF68C9C47AD3BB1BF09710F088069EC4A9F695D734A950EB90
                                                                                  APIs
                                                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F5C1C7,00000004,00000000,00000000,00000000), ref: 00F22ACF
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F5C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F22B17
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F5C1C7,00000004,00000000,00000000,00000000), ref: 00F5C21A
                                                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F5C1C7,00000004,00000000,00000000,00000000), ref: 00F5C286
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1268545403-0
                                                                                  • Opcode ID: 0b3dabf67819817472ec09bbb8d681f112a7d2b8d723f4a665297642879d38c8
                                                                                  • Instruction ID: f7ffcaad954b1ca74ea836d4f0d007dc912c9447dbcd99068ba4eef07e1b0269
                                                                                  • Opcode Fuzzy Hash: 0b3dabf67819817472ec09bbb8d681f112a7d2b8d723f4a665297642879d38c8
                                                                                  • Instruction Fuzzy Hash: 76414231A047D0BEC7B55F78EC8C76B7BD1AF86320F14842DE54786960C6799889FB50
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F870DD
                                                                                    • Part of subcall function 00F40DB6: std::exception::exception.LIBCMT ref: 00F40DEC
                                                                                    • Part of subcall function 00F40DB6: __CxxThrowException@8.LIBCMT ref: 00F40E01
                                                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00F87114
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00F87130
                                                                                  • _memmove.LIBCMT ref: 00F8717E
                                                                                  • _memmove.LIBCMT ref: 00F8719B
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00F871AA
                                                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00F871BF
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F871DE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 256516436-0
                                                                                  • Opcode ID: bee5fe171f374cec735615e32515952a4cc44e9c4535e3b411932f6bb9b5f4d8
                                                                                  • Instruction ID: b35a9afb4d806bd76238268fc86e4a0fc02cc720668d6b9f472720048e3818b1
                                                                                  • Opcode Fuzzy Hash: bee5fe171f374cec735615e32515952a4cc44e9c4535e3b411932f6bb9b5f4d8
                                                                                  • Instruction Fuzzy Hash: A4317071900205EBCB10EFA4DC89AAEBBB8EF45710F2441B5ED04AB256DB34DE14EB60
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 00FA61EB
                                                                                  • GetDC.USER32(00000000), ref: 00FA61F3
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FA61FE
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00FA620A
                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FA6246
                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FA6257
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FA902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00FA6291
                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FA62B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3864802216-0
                                                                                  • Opcode ID: b0ef8349b02b87df3959cae4cd09ac6f98ff2e19235ef8c3119c17c23cfc5044
                                                                                  • Instruction ID: 9adadd11c32d1d0c42bca0dd5522a4f4e2ebea7bb0581eedf56c0d713f254ad0
                                                                                  • Opcode Fuzzy Hash: b0ef8349b02b87df3959cae4cd09ac6f98ff2e19235ef8c3119c17c23cfc5044
                                                                                  • Instruction Fuzzy Hash: F5316DB2101214BFEF118F50CC8AFEA3BA9EF4A765F084065FE08DE291C6759841DB64
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: 10c4d81fe22442429d07a9b1719e1173ccd109cde86f7268b1680a6486c34ec0
                                                                                  • Instruction ID: bd89f6cbe566b1d3673fab7185446805b9c4c9dfaa96d03966492032ab8eae8f
                                                                                  • Opcode Fuzzy Hash: 10c4d81fe22442429d07a9b1719e1173ccd109cde86f7268b1680a6486c34ec0
                                                                                  • Instruction Fuzzy Hash: B721FC616012057BE205B615DD42FFB7B5DAE53368F04C022FD0C56647EB18DE11B5A3
                                                                                  APIs
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                    • Part of subcall function 00F3FC86: _wcscpy.LIBCMT ref: 00F3FCA9
                                                                                  • _wcstok.LIBCMT ref: 00F8EC94
                                                                                  • _wcscpy.LIBCMT ref: 00F8ED23
                                                                                  • _memset.LIBCMT ref: 00F8ED56
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                  • String ID: X
                                                                                  • API String ID: 774024439-3081909835
                                                                                  • Opcode ID: 34455eb820161053145743299aadbca52853f66c8db2e8371ee8335b2f55aef3
                                                                                  • Instruction ID: fbd00f83a4f1bd626c02210f7e5892ef7bdc92c845e2c957e6ded2ad5584d99e
                                                                                  • Opcode Fuzzy Hash: 34455eb820161053145743299aadbca52853f66c8db2e8371ee8335b2f55aef3
                                                                                  • Instruction Fuzzy Hash: D7C191719087119FC754FF24D881A9AB7E0FF85310F04492DF8999B2A2DB74ED49EB42
                                                                                  APIs
                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F96C00
                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F96C21
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F96C34
                                                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 00F96CEA
                                                                                  • inet_ntoa.WSOCK32(?), ref: 00F96CA7
                                                                                    • Part of subcall function 00F7A7E9: _strlen.LIBCMT ref: 00F7A7F3
                                                                                    • Part of subcall function 00F7A7E9: _memmove.LIBCMT ref: 00F7A815
                                                                                  • _strlen.LIBCMT ref: 00F96D44
                                                                                  • _memmove.LIBCMT ref: 00F96DAD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                  • String ID:
                                                                                  • API String ID: 3619996494-0
                                                                                  • Opcode ID: db7f2a1df58f0e05f10944ad60ae6e1842a7c71e87626236096da37e19a8135b
                                                                                  • Instruction ID: 278ad0019d5db78446096cec9c69e84de740ee585c066c8079d1454af09c5a47
                                                                                  • Opcode Fuzzy Hash: db7f2a1df58f0e05f10944ad60ae6e1842a7c71e87626236096da37e19a8135b
                                                                                  • Instruction Fuzzy Hash: 5F811272608300ABDB10EF24DC82F6AB7A8AFC4724F40491DF555DB2D2DA78DD05EB52
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8e2a22066df4185512bbdb4915d635a09ef0b41f5328b3881b54b787b48b9249
                                                                                  • Instruction ID: 4be7b7481fce7844eb6bc3e8519d75e2e7c6e78e4771f3dad6b9cf600dca84bc
                                                                                  • Opcode Fuzzy Hash: 8e2a22066df4185512bbdb4915d635a09ef0b41f5328b3881b54b787b48b9249
                                                                                  • Instruction Fuzzy Hash: 9571BE31900119EFCB04DF98DC49ABEBB79FF86320F248149F915AA251C734AA11EF64
                                                                                  APIs
                                                                                  • IsWindow.USER32(01466898), ref: 00FAB3EB
                                                                                  • IsWindowEnabled.USER32(01466898), ref: 00FAB3F7
                                                                                  • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00FAB4DB
                                                                                  • SendMessageW.USER32(01466898,000000B0,?,?), ref: 00FAB512
                                                                                  • IsDlgButtonChecked.USER32(?,?), ref: 00FAB54F
                                                                                  • GetWindowLongW.USER32(01466898,000000EC), ref: 00FAB571
                                                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FAB589
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                  • String ID:
                                                                                  • API String ID: 4072528602-0
                                                                                  • Opcode ID: a7fb12d491009976a5eba96b2dbd5067b47178e6974d3b75df068a88de229653
                                                                                  • Instruction ID: 71010201b95fe68bc15e854f372733bf885ee26f969a7b9714396189b365a196
                                                                                  • Opcode Fuzzy Hash: a7fb12d491009976a5eba96b2dbd5067b47178e6974d3b75df068a88de229653
                                                                                  • Instruction Fuzzy Hash: E0717CB4A04348EFDB20DF95C894FBA7BA9EF0B320F144059E955972A3C736A950FB50
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F9F448
                                                                                  • _memset.LIBCMT ref: 00F9F511
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00F9F556
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                    • Part of subcall function 00F3FC86: _wcscpy.LIBCMT ref: 00F3FCA9
                                                                                  • GetProcessId.KERNEL32(00000000), ref: 00F9F5CD
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F9F5FC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                  • String ID: @
                                                                                  • API String ID: 3522835683-2766056989
                                                                                  • Opcode ID: 22eb102671502908104f306aa6f855c8dd637180ab085349d591e4647332bc82
                                                                                  • Instruction ID: dfe830e33b71de8865db25434110752f10f3d8beb592611ba128ed741e77eab2
                                                                                  • Opcode Fuzzy Hash: 22eb102671502908104f306aa6f855c8dd637180ab085349d591e4647332bc82
                                                                                  • Instruction Fuzzy Hash: D8619F75A006299FCF04DFA4C8819AEBBF5FF49320F188069E855AB351CB34AD45EF90
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 00F80F8C
                                                                                  • GetKeyboardState.USER32(?), ref: 00F80FA1
                                                                                  • SetKeyboardState.USER32(?), ref: 00F81002
                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F81030
                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F8104F
                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F81095
                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F810B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: fbd363c0ddbd205bacf62204c2a5a3f2799ab869f489d9ab6e8ce899c2f0cf82
                                                                                  • Instruction ID: 1f8e4e05332027ee66140b94f2728bb469eb586cf3eaf5e0c5eb38aa7411bfc7
                                                                                  • Opcode Fuzzy Hash: fbd363c0ddbd205bacf62204c2a5a3f2799ab869f489d9ab6e8ce899c2f0cf82
                                                                                  • Instruction Fuzzy Hash: 7551D4A09047D53DFB3662348C09BF6BEAD6B06314F088689E2D9858D3C699DCCAF751
                                                                                  APIs
                                                                                  • GetParent.USER32(00000000), ref: 00F80DA5
                                                                                  • GetKeyboardState.USER32(?), ref: 00F80DBA
                                                                                  • SetKeyboardState.USER32(?), ref: 00F80E1B
                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F80E47
                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F80E64
                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F80EA8
                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F80EC9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: fc9165702bb4b5ac380ec80ca1a71c93b3a2a8e2f8bd49d1047306da1b191baa
                                                                                  • Instruction ID: 0498ad4e0698cc70201247d8c130ffad156d13ce7972cdd2fc800d22b47624ae
                                                                                  • Opcode Fuzzy Hash: fc9165702bb4b5ac380ec80ca1a71c93b3a2a8e2f8bd49d1047306da1b191baa
                                                                                  • Instruction Fuzzy Hash: 1C5107A19047D53DFB7263748C45BFB7EA96B06310F488989F1D48A4C2CB95AC8DF750
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsncpy$LocalTime
                                                                                  • String ID:
                                                                                  • API String ID: 2945705084-0
                                                                                  • Opcode ID: 93ba6e5663b7868d9153d267785e8fb6f0e75a15817e0d07e5593d686821ef5d
                                                                                  • Instruction ID: 8921f04987789884dc62ba60c74a8b5d59f3ecc311c077bac2cefdebac2c5c15
                                                                                  • Opcode Fuzzy Hash: 93ba6e5663b7868d9153d267785e8fb6f0e75a15817e0d07e5593d686821ef5d
                                                                                  • Instruction Fuzzy Hash: 8141B565C1061876CB11FBF48C46ACFBBB89F04710F508966F909E3221FB38A755E7A6
                                                                                  APIs
                                                                                    • Part of subcall function 00F8466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F83697,?), ref: 00F8468B
                                                                                    • Part of subcall function 00F8466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F83697,?), ref: 00F846A4
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00F836B7
                                                                                  • _wcscmp.LIBCMT ref: 00F836D3
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F836EB
                                                                                  • _wcscat.LIBCMT ref: 00F83733
                                                                                  • SHFileOperationW.SHELL32(?), ref: 00F8379F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 1377345388-1173974218
                                                                                  • Opcode ID: f17a71f71f2e9f80b998d3548d422b90f9e3e7ab2e00b811dc42288962f0e29c
                                                                                  • Instruction ID: 3cbcd1fee0d4098a3eda2e6cc5daa2b89c5d0997b61c04a8aef7d1643e70e962
                                                                                  • Opcode Fuzzy Hash: f17a71f71f2e9f80b998d3548d422b90f9e3e7ab2e00b811dc42288962f0e29c
                                                                                  • Instruction Fuzzy Hash: A741B1B1508345AEC751FF64C841ADFB7E8AF89790F40082EF48AC7261EA38D689D752
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00FA72AA
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FA7351
                                                                                  • IsMenu.USER32(?), ref: 00FA7369
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FA73B1
                                                                                  • DrawMenuBar.USER32 ref: 00FA73C4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 3866635326-4108050209
                                                                                  • Opcode ID: afbea60df9bae5c9d8a67fa6ae7ebe75cfd494d6d72046265bb4ee8a8b1466ea
                                                                                  • Instruction ID: b336a39deb79e4a05dda6e83d885fdaa4535edc1b0efe2dd066df3e9fe99484d
                                                                                  • Opcode Fuzzy Hash: afbea60df9bae5c9d8a67fa6ae7ebe75cfd494d6d72046265bb4ee8a8b1466ea
                                                                                  • Instruction Fuzzy Hash: B74116B5A04308AFDF20EF50D884E9ABBB8FF06324F158429FD059B250D730AD54EB50
                                                                                  APIs
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00FA0FD4
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FA0FFE
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00FA10B5
                                                                                    • Part of subcall function 00FA0FA5: RegCloseKey.ADVAPI32(?), ref: 00FA101B
                                                                                    • Part of subcall function 00FA0FA5: FreeLibrary.KERNEL32(?), ref: 00FA106D
                                                                                    • Part of subcall function 00FA0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00FA1090
                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FA1058
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                  • String ID:
                                                                                  • API String ID: 395352322-0
                                                                                  • Opcode ID: d50034092995dff085f5f176ade50fb805c451bf2ed07411529a66837449f46a
                                                                                  • Instruction ID: 9449bc869c2c6fa290e17dccbec853d983b203e5035ae385751102fd607635be
                                                                                  • Opcode Fuzzy Hash: d50034092995dff085f5f176ade50fb805c451bf2ed07411529a66837449f46a
                                                                                  • Instruction Fuzzy Hash: 0E312DB1D00109BFDB159F90DC89EFFB7BCEF09310F004169E502E6141EA749E89AAA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00FA62EC
                                                                                  • GetWindowLongW.USER32(01466898,000000F0), ref: 00FA631F
                                                                                  • GetWindowLongW.USER32(01466898,000000F0), ref: 00FA6354
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00FA6386
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00FA63B0
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00FA63C1
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00FA63DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 2178440468-0
                                                                                  • Opcode ID: f14131f8caec1f3cec1d81d7c5664f2df057776350cfa06aa95e2a2118e69c2c
                                                                                  • Instruction ID: 827ec24ea4137a311993dc067825d8d83baae6de19547190c6dd0b901238c7bc
                                                                                  • Opcode Fuzzy Hash: f14131f8caec1f3cec1d81d7c5664f2df057776350cfa06aa95e2a2118e69c2c
                                                                                  • Instruction Fuzzy Hash: F8310FB5A40284EFEB208F58DC84F5537E1FB4A724F1901A4F551CF3B2CB61A845AB50
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F7DB2E
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F7DB54
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00F7DB57
                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F7DB75
                                                                                  • SysFreeString.OLEAUT32(?), ref: 00F7DB7E
                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00F7DBA3
                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F7DBB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                  • String ID:
                                                                                  • API String ID: 3761583154-0
                                                                                  • Opcode ID: a99ef1485ca21f8c835489f02fff1e036bad768cde21de950ab5bb91781688d0
                                                                                  • Instruction ID: 90590df3bb4a4234dec67e9d3dcfe09e811ae569db0b78f88d6957e0bc1bcca1
                                                                                  • Opcode Fuzzy Hash: a99ef1485ca21f8c835489f02fff1e036bad768cde21de950ab5bb91781688d0
                                                                                  • Instruction Fuzzy Hash: E0218076A01219AFDB10DFB8DC84CAB77BCEF49360B418126FD18DB250D6749C45A761
                                                                                  APIs
                                                                                    • Part of subcall function 00F97D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00F97DB6
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F961C6
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F961D5
                                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F9620E
                                                                                  • connect.WSOCK32(00000000,?,00000010), ref: 00F96217
                                                                                  • WSAGetLastError.WSOCK32 ref: 00F96221
                                                                                  • closesocket.WSOCK32(00000000), ref: 00F9624A
                                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F96263
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 910771015-0
                                                                                  • Opcode ID: d965e584a6cce12402a6293df401661b19510238d5a4955e42db85365e56db82
                                                                                  • Instruction ID: 3be999133fd8607638e387e430b551a960a9eedf210872ae639b5818624a8aa7
                                                                                  • Opcode Fuzzy Hash: d965e584a6cce12402a6293df401661b19510238d5a4955e42db85365e56db82
                                                                                  • Instruction Fuzzy Hash: 0031B371600218AFEF10AF64DC85BBE77ACEF45760F044029FD05EB291DB78AD44ABA1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                  • API String ID: 1038674560-2734436370
                                                                                  • Opcode ID: 54e48b9a9d2916453fffbadfd069110407ea9d9c7eed64428d09a2abce510abc
                                                                                  • Instruction ID: a84b3079f2698e370520bcb8942828fa50f25bd47e5c93bde2893695a93d1cec
                                                                                  • Opcode Fuzzy Hash: 54e48b9a9d2916453fffbadfd069110407ea9d9c7eed64428d09a2abce510abc
                                                                                  • Instruction Fuzzy Hash: 6021467261421166D324AA34AC02FA773D8EF55360F10C03BF98AC7091EB689E5AF297
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F7DC09
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F7DC2F
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00F7DC32
                                                                                  • SysAllocString.OLEAUT32 ref: 00F7DC53
                                                                                  • SysFreeString.OLEAUT32 ref: 00F7DC5C
                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00F7DC76
                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F7DC84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                  • String ID:
                                                                                  • API String ID: 3761583154-0
                                                                                  • Opcode ID: 80ab45a803ba33486dbaecf65c90caea302605b7aed77a99e70f99c4a088297d
                                                                                  • Instruction ID: 05dbaaea0194ef3439280866fd9acdd669832f0dddc5cc21ae87bf6961c1f07f
                                                                                  • Opcode Fuzzy Hash: 80ab45a803ba33486dbaecf65c90caea302605b7aed77a99e70f99c4a088297d
                                                                                  • Instruction Fuzzy Hash: 88213E76604208AF9B11DBE8DC88DAA77BCEF09360B50C126F918CB261DAB49C45E765
                                                                                  APIs
                                                                                    • Part of subcall function 00F21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F21D73
                                                                                    • Part of subcall function 00F21D35: GetStockObject.GDI32(00000011), ref: 00F21D87
                                                                                    • Part of subcall function 00F21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F21D91
                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00FA7632
                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00FA763F
                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00FA764A
                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00FA7659
                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00FA7665
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                  • String ID: Msctls_Progress32
                                                                                  • API String ID: 1025951953-3636473452
                                                                                  • Opcode ID: d1ddcec7a3b2927b4448003df835ea23eb56a5b4a4ed8eb94ffad163f3597f88
                                                                                  • Instruction ID: f26cb34b8c35d7bdad3be44ee84aecf453056f54e8ead8dddd451703f24cd66f
                                                                                  • Opcode Fuzzy Hash: d1ddcec7a3b2927b4448003df835ea23eb56a5b4a4ed8eb94ffad163f3597f88
                                                                                  • Instruction Fuzzy Hash: EC11B6B251021DBFEF119F64CC85EE77F6DEF09798F014115B604A6150CA729C21EBA4
                                                                                  APIs
                                                                                  • __init_pointers.LIBCMT ref: 00F49AE6
                                                                                    • Part of subcall function 00F43187: EncodePointer.KERNEL32(00000000), ref: 00F4318A
                                                                                    • Part of subcall function 00F43187: __initp_misc_winsig.LIBCMT ref: 00F431A5
                                                                                    • Part of subcall function 00F43187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F49EA0
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00F49EB4
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00F49EC7
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00F49EDA
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00F49EED
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00F49F00
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00F49F13
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00F49F26
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00F49F39
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00F49F4C
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00F49F5F
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00F49F72
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00F49F85
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00F49F98
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00F49FAB
                                                                                    • Part of subcall function 00F43187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00F49FBE
                                                                                  • __mtinitlocks.LIBCMT ref: 00F49AEB
                                                                                  • __mtterm.LIBCMT ref: 00F49AF4
                                                                                    • Part of subcall function 00F49B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00F49AF9,00F47CD0,00FDA0B8,00000014), ref: 00F49C56
                                                                                    • Part of subcall function 00F49B5C: _free.LIBCMT ref: 00F49C5D
                                                                                    • Part of subcall function 00F49B5C: DeleteCriticalSection.KERNEL32(00FDEC00,?,?,00F49AF9,00F47CD0,00FDA0B8,00000014), ref: 00F49C7F
                                                                                  • __calloc_crt.LIBCMT ref: 00F49B19
                                                                                  • __initptd.LIBCMT ref: 00F49B3B
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F49B42
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                  • String ID:
                                                                                  • API String ID: 3567560977-0
                                                                                  • Opcode ID: b4be91ff31c80a6107a1fedd1afa11b960448fc25ca8bda01909ad9a2a9467f2
                                                                                  • Instruction ID: 9df20b88d54cde454340737d3bd8add35a1455cb445c5d6938002d902710dba2
                                                                                  • Opcode Fuzzy Hash: b4be91ff31c80a6107a1fedd1afa11b960448fc25ca8bda01909ad9a2a9467f2
                                                                                  • Instruction Fuzzy Hash: 57F06D32B1E7115AE634B674BC03A4B3EA1DF42734B200A1AFC60891D2FEA8954171A1
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00F43F85), ref: 00F44085
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00F4408C
                                                                                  • EncodePointer.KERNEL32(00000000), ref: 00F44097
                                                                                  • DecodePointer.KERNEL32(00F43F85), ref: 00F440B2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoUninitialize$combase.dll
                                                                                  • API String ID: 3489934621-2819208100
                                                                                  • Opcode ID: 2cde8e73eb0426a679a79b2b41b1c0f811fb2f6d35afa1d39ebbd479f878f14f
                                                                                  • Instruction ID: 27731b8c3dafd9f8ebbe3870ddb81603066acf37e0fb1877c54b6a73a52d80ba
                                                                                  • Opcode Fuzzy Hash: 2cde8e73eb0426a679a79b2b41b1c0f811fb2f6d35afa1d39ebbd479f878f14f
                                                                                  • Instruction Fuzzy Hash: 88E0BFB0941348EFEB50AFA2EC4DB453AA4B715742F10442DF501EA0A0CB7A9604FE15
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3253778849-0
                                                                                  • Opcode ID: 9d80155e7f2a53e1e73f8c24d63cc00193ec6995be1ce472b138d7b8ebbb779b
                                                                                  • Instruction ID: dada10fc8514ab830dc301d144322ace7fc88ebd20f469c94b2db0a84890f153
                                                                                  • Opcode Fuzzy Hash: 9d80155e7f2a53e1e73f8c24d63cc00193ec6995be1ce472b138d7b8ebbb779b
                                                                                  • Instruction Fuzzy Hash: A0619C3190429A9BCF01FF60CC82EFE3BA5AF05308F484519FD599B292EB7C9955EB50
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00FA0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9FDAD,?,?), ref: 00FA0E31
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FA02BD
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FA02FD
                                                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00FA0320
                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00FA0349
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FA038C
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00FA0399
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4046560759-0
                                                                                  • Opcode ID: a3dfc560d017a0841da4c24ac865f40ecbfb0a1e81b56edef2b568a640a42494
                                                                                  • Instruction ID: 5525664a2090cf627777050033ae345767c81747f6a7bf205ac331fe6127d299
                                                                                  • Opcode Fuzzy Hash: a3dfc560d017a0841da4c24ac865f40ecbfb0a1e81b56edef2b568a640a42494
                                                                                  • Instruction Fuzzy Hash: A4513871508304AFCB14EF64DC85E6ABBE8FF86314F04491DF5458B2A2DB35E909EB52
                                                                                  APIs
                                                                                  • GetMenu.USER32(?), ref: 00FA57FB
                                                                                  • GetMenuItemCount.USER32(00000000), ref: 00FA5832
                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FA585A
                                                                                  • GetMenuItemID.USER32(?,?), ref: 00FA58C9
                                                                                  • GetSubMenu.USER32(?,?), ref: 00FA58D7
                                                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00FA5928
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountMessagePostString
                                                                                  • String ID:
                                                                                  • API String ID: 650687236-0
                                                                                  • Opcode ID: eb9ae31bfc88120d833393303fb4c59ced01e4174067e5812a0c95e729d9c5fa
                                                                                  • Instruction ID: b3c42847888c74c9e0f1a6e05cc35a46b6931ec0130285b3ffb557a1ee579f65
                                                                                  • Opcode Fuzzy Hash: eb9ae31bfc88120d833393303fb4c59ced01e4174067e5812a0c95e729d9c5fa
                                                                                  • Instruction Fuzzy Hash: FC515D75E00615AFCF11EFA4C845AAEBBB4EF49720F144069EC41BB351CB78AE41AB90
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F7EF06
                                                                                  • VariantClear.OLEAUT32(00000013), ref: 00F7EF78
                                                                                  • VariantClear.OLEAUT32(00000000), ref: 00F7EFD3
                                                                                  • _memmove.LIBCMT ref: 00F7EFFD
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F7F04A
                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F7F078
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1101466143-0
                                                                                  • Opcode ID: ca5fa5abb0d0ed9a4d2b6388daa65ee43a1e2d7f638161765ba951d0727b5c7e
                                                                                  • Instruction ID: 95732b8bb10c6d3cc0582967998e2c04c87e3267f859424b16e3ff50834a8b92
                                                                                  • Opcode Fuzzy Hash: ca5fa5abb0d0ed9a4d2b6388daa65ee43a1e2d7f638161765ba951d0727b5c7e
                                                                                  • Instruction Fuzzy Hash: 6D5168B5A00209EFCB14CF58C884AAAB7B8FF4D314B15856AED59DB305E334E915CFA1
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F82258
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F822A3
                                                                                  • IsMenu.USER32(00000000), ref: 00F822C3
                                                                                  • CreatePopupMenu.USER32 ref: 00F822F7
                                                                                  • GetMenuItemCount.USER32(000000FF), ref: 00F82355
                                                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00F82386
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3311875123-0
                                                                                  • Opcode ID: b7d3a44687aeffb1c101d95c234cb5e20dac210b7040fe0ecd6910ff4ef2eb6c
                                                                                  • Instruction ID: 84a4fbf7a0f06b81539d37d53476e1901f84ec479b54c9dff9dedf52f84be8ea
                                                                                  • Opcode Fuzzy Hash: b7d3a44687aeffb1c101d95c234cb5e20dac210b7040fe0ecd6910ff4ef2eb6c
                                                                                  • Instruction Fuzzy Hash: 2651D270A00209DFDF61EF68D898BEDBBF5FF06324F144129E8559B290D778A904EB51
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F2179A
                                                                                  • GetWindowRect.USER32(?,?), ref: 00F217FE
                                                                                  • ScreenToClient.USER32(?,?), ref: 00F2181B
                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F2182C
                                                                                  • EndPaint.USER32(?,?), ref: 00F21876
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                  • String ID:
                                                                                  • API String ID: 1827037458-0
                                                                                  • Opcode ID: 9b6292f9134be949bb004e1b8100f972d719d023045225329351ca9da7dc8a5f
                                                                                  • Instruction ID: fe8b2efd612c9a90d0293922c4dae98cbb92a3b9332ec60de9c2b07037b630f6
                                                                                  • Opcode Fuzzy Hash: 9b6292f9134be949bb004e1b8100f972d719d023045225329351ca9da7dc8a5f
                                                                                  • Instruction Fuzzy Hash: DE41CC71504754AFC710DF24DCC4FBA7BE8FB5A724F140228FAA48B2A1C7309949EB62
                                                                                  APIs
                                                                                  • ShowWindow.USER32(00FE57B0,00000000,01466898,?,?,00FE57B0,?,00FAB5A8,?,?), ref: 00FAB712
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00FAB736
                                                                                  • ShowWindow.USER32(00FE57B0,00000000,01466898,?,?,00FE57B0,?,00FAB5A8,?,?), ref: 00FAB796
                                                                                  • ShowWindow.USER32(00000000,00000004,?,00FAB5A8,?,?), ref: 00FAB7A8
                                                                                  • EnableWindow.USER32(00000000,00000001), ref: 00FAB7CC
                                                                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00FAB7EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 642888154-0
                                                                                  • Opcode ID: 769722182a8e160464e1b358ac2f685b7119b5c79c3a0ebe76915a025927d38e
                                                                                  • Instruction ID: b2d45ef2d2b6b6a109ed07908af941686131a1667fafa6238fa625b3f2e39e5a
                                                                                  • Opcode Fuzzy Hash: 769722182a8e160464e1b358ac2f685b7119b5c79c3a0ebe76915a025927d38e
                                                                                  • Instruction Fuzzy Hash: A74173B4A00244AFDB26CF24C499B947BE1FF46320F1841B9F9488F6A3C771AC56EB51
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,00F94E41,?,?,00000000,00000001), ref: 00F970AC
                                                                                    • Part of subcall function 00F939A0: GetWindowRect.USER32(?,?), ref: 00F939B3
                                                                                  • GetDesktopWindow.USER32 ref: 00F970D6
                                                                                  • GetWindowRect.USER32(00000000), ref: 00F970DD
                                                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00F9710F
                                                                                    • Part of subcall function 00F85244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F852BC
                                                                                  • GetCursorPos.USER32(?), ref: 00F9713B
                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F97199
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                  • String ID:
                                                                                  • API String ID: 4137160315-0
                                                                                  • Opcode ID: bf7ce2b1ebac70eb50d428ee5856202f928a91846ca2bcef0ce2973092be2d5a
                                                                                  • Instruction ID: bdefaf14b6a7f09fce18e319e17db71cd0308aed84c225a2f2cb412cf3fc51ad
                                                                                  • Opcode Fuzzy Hash: bf7ce2b1ebac70eb50d428ee5856202f928a91846ca2bcef0ce2973092be2d5a
                                                                                  • Instruction Fuzzy Hash: 0D31D272509309AFDB20EF54CC49B9BB7EAFF89314F000919F58597191CB34EA49DB92
                                                                                  APIs
                                                                                    • Part of subcall function 00F780A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F780C0
                                                                                    • Part of subcall function 00F780A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F780CA
                                                                                    • Part of subcall function 00F780A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F780D9
                                                                                    • Part of subcall function 00F780A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F780E0
                                                                                    • Part of subcall function 00F780A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F780F6
                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00F7842F), ref: 00F788CA
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F788D6
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00F788DD
                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F788F6
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00F7842F), ref: 00F7890A
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F78911
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                  • String ID:
                                                                                  • API String ID: 3008561057-0
                                                                                  • Opcode ID: 50935f48329f06c7de89a5991535f6d6195a00516d47f64389dfbab4b9b92cba
                                                                                  • Instruction ID: a74886ece0df29703acd094755f86836d8453ec994708f8a37998132e1c0a48a
                                                                                  • Opcode Fuzzy Hash: 50935f48329f06c7de89a5991535f6d6195a00516d47f64389dfbab4b9b92cba
                                                                                  • Instruction Fuzzy Hash: 6311B471A41209FFDB109F94DC09BBE7B78EB45361F10C02AE94997111CB329D05EB62
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F785E2
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00F785E9
                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F785F8
                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00F78603
                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F78632
                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F78646
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                  • String ID:
                                                                                  • API String ID: 1413079979-0
                                                                                  • Opcode ID: 5e92ef9a7aa6f2538549d200ed50054c6cf530aa03adc82d1b174d0df934c670
                                                                                  • Instruction ID: 77667cf9748b9cdb3d5c8e8e8482e5f87f93417d59a6e1a601af95a86cc8398e
                                                                                  • Opcode Fuzzy Hash: 5e92ef9a7aa6f2538549d200ed50054c6cf530aa03adc82d1b174d0df934c670
                                                                                  • Instruction Fuzzy Hash: 25115CB254020DABDF018FA4DD49BDE7BA9EF09354F048065FE05A6160C7718D65EB61
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 00F7B7B5
                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F7B7C6
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F7B7CD
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00F7B7D5
                                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F7B7EC
                                                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 00F7B7FE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDevice$Release
                                                                                  • String ID:
                                                                                  • API String ID: 1035833867-0
                                                                                  • Opcode ID: 2a2755be9436a8676fe8f3ee00f6c2e62733e27732b0e8eb669c433f57c92538
                                                                                  • Instruction ID: ed53a8ef14e24f60f53b8a9eaf69b79192e1e005c9f5cdaa1bb6d5b80a0118a9
                                                                                  • Opcode Fuzzy Hash: 2a2755be9436a8676fe8f3ee00f6c2e62733e27732b0e8eb669c433f57c92538
                                                                                  • Instruction Fuzzy Hash: 500175B5E00209BBEB105BE69C45A5ABFA8EB49321F008066FA08AB291D6709C00DF91
                                                                                  APIs
                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F40193
                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F4019B
                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F401A6
                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F401B1
                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F401B9
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F401C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 4278518827-0
                                                                                  • Opcode ID: 996521e29cd677699d667c631696cb72d7e3cac99f57e89b717177d821fc993f
                                                                                  • Instruction ID: 28ef2a0a41ba0148394e45b6955c62ba314cf17218137ec9a8af94a574f62da4
                                                                                  • Opcode Fuzzy Hash: 996521e29cd677699d667c631696cb72d7e3cac99f57e89b717177d821fc993f
                                                                                  • Instruction Fuzzy Hash: 97016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C4BA41C7F5A868CBE5
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F853F9
                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F8540F
                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00F8541E
                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F8542D
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F85437
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F8543E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 839392675-0
                                                                                  • Opcode ID: 94e9b7f4633f5b8b6ef529872522a2308157e2e84d49d09f29cef41ca0d7d7ba
                                                                                  • Instruction ID: ad7388bfa1f9f3bad8e771235f29ee45f3b12c96c73fcc30e6460a880d3c5350
                                                                                  • Opcode Fuzzy Hash: 94e9b7f4633f5b8b6ef529872522a2308157e2e84d49d09f29cef41ca0d7d7ba
                                                                                  • Instruction Fuzzy Hash: 07F06D7224115CBBE7205BE2DC0DEEB7A7CEBC7B11F000169FA04D515096A01A05A6B5
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,?), ref: 00F87243
                                                                                  • EnterCriticalSection.KERNEL32(?,?,00F30EE4,?,?), ref: 00F87254
                                                                                  • TerminateThread.KERNEL32(00000000,000001F6,?,00F30EE4,?,?), ref: 00F87261
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F30EE4,?,?), ref: 00F8726E
                                                                                    • Part of subcall function 00F86C35: CloseHandle.KERNEL32(00000000,?,00F8727B,?,00F30EE4,?,?), ref: 00F86C3F
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F87281
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,00F30EE4,?,?), ref: 00F87288
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 3495660284-0
                                                                                  • Opcode ID: da01b751f37bb04e5c15574ab9556e29442dd65b8003d8a72aefe519212ef921
                                                                                  • Instruction ID: a6da4ed81f03e44a995370f04553bd310f13c7e58f1458406704e63dd23ef96e
                                                                                  • Opcode Fuzzy Hash: da01b751f37bb04e5c15574ab9556e29442dd65b8003d8a72aefe519212ef921
                                                                                  • Instruction Fuzzy Hash: EDF0BEB6540216EBD7622BA4ED4CBEA7779EF07312B100131F103980A0CB765805EB50
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F7899D
                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00F789A9
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F789B2
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F789BA
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00F789C3
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F789CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                  • String ID:
                                                                                  • API String ID: 146765662-0
                                                                                  • Opcode ID: 659e19df5a668a31bacc5a39fe346846e8a1ab5c2b68204ea6682954ca900e88
                                                                                  • Instruction ID: 3a459874c8f4af6e345412489f6ba03243f9bbbd058d3ef11f056233ef82a429
                                                                                  • Opcode Fuzzy Hash: 659e19df5a668a31bacc5a39fe346846e8a1ab5c2b68204ea6682954ca900e88
                                                                                  • Instruction Fuzzy Hash: CFE052B6104509FFDB011FE5EC0C95ABB79FB8A762B508631F21989470CB329469EB50
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F98613
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00F98722
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F9889A
                                                                                    • Part of subcall function 00F87562: VariantInit.OLEAUT32(00000000), ref: 00F875A2
                                                                                    • Part of subcall function 00F87562: VariantCopy.OLEAUT32(00000000,?), ref: 00F875AB
                                                                                    • Part of subcall function 00F87562: VariantClear.OLEAUT32(00000000), ref: 00F875B7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                  • API String ID: 4237274167-1221869570
                                                                                  • Opcode ID: bff55633828637b407bd35290887e6ac2271b0046ca0d7c5fe86fd90b3905e13
                                                                                  • Instruction ID: 916dc9ece5af6c1c571f99d67e6cd587df027f45c778992d3e2e802cdf903794
                                                                                  • Opcode Fuzzy Hash: bff55633828637b407bd35290887e6ac2271b0046ca0d7c5fe86fd90b3905e13
                                                                                  • Instruction Fuzzy Hash: 88918071A083019FCB10DF24C88495ABBF4EF8A754F14892EF88A8B351DB35ED46DB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F3FC86: _wcscpy.LIBCMT ref: 00F3FCA9
                                                                                  • _memset.LIBCMT ref: 00F82B87
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F82BB6
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F82C69
                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F82C97
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                  • String ID: 0
                                                                                  • API String ID: 4152858687-4108050209
                                                                                  • Opcode ID: 60819808f4d023f462c7fdc213cd0a8b9f794ce7737721b5af3bebcfede78ac7
                                                                                  • Instruction ID: c376a6e61907506ea77979805be6756a88be0de6ba44f4ffc21f3d0291574c19
                                                                                  • Opcode Fuzzy Hash: 60819808f4d023f462c7fdc213cd0a8b9f794ce7737721b5af3bebcfede78ac7
                                                                                  • Instruction Fuzzy Hash: DC51BF71A093019ED7A4AE28D845ABFBBE4EF86330F040A2DF895D61D1DB74ED04B752
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F7D5D4
                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F7D60A
                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F7D61B
                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F7D69D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                  • String ID: DllGetClassObject
                                                                                  • API String ID: 753597075-1075368562
                                                                                  • Opcode ID: 163aa1e1923ddb7a686dd8514d8a350d5ca4389879b6b7338e263f4f8c992b97
                                                                                  • Instruction ID: a0d70eef84894e198f47cd759fb76ea48e871e112d0d4c65208ad68a2e36b836
                                                                                  • Opcode Fuzzy Hash: 163aa1e1923ddb7a686dd8514d8a350d5ca4389879b6b7338e263f4f8c992b97
                                                                                  • Instruction Fuzzy Hash: 0A418EB1600204EFDB15DF64CC84A9ABBB9EF84314F55C1AEAC0D9F206D7B1D944EBA1
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F827C0
                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F827DC
                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00F82822
                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FE5890,00000000), ref: 00F8286B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$InfoItem_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 1173514356-4108050209
                                                                                  • Opcode ID: 279647daec9e0b894273fb2f269a29551fa43ff09bc448a69d1205944ec1e3e6
                                                                                  • Instruction ID: b7b29eddf239820713f7afd9edc300e31d29ba258f6a05d42da736e21646c196
                                                                                  • Opcode Fuzzy Hash: 279647daec9e0b894273fb2f269a29551fa43ff09bc448a69d1205944ec1e3e6
                                                                                  • Instruction Fuzzy Hash: 7141BF71604301AFDB60EF24CC44B9ABBE8EF85324F04492EF8A597291D734F805DB52
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F9D7C5
                                                                                    • Part of subcall function 00F2784B: _memmove.LIBCMT ref: 00F27899
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharLower_memmove
                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                  • API String ID: 3425801089-567219261
                                                                                  • Opcode ID: 9e76ea3f31d2bdfe52bb2cbcffa011d87c0cf95fd44b2d50d3d0d9060d993fc1
                                                                                  • Instruction ID: 3cf81c1802189a271efea33afa522c50d81661f71f3f9c6dba4b2768ee510282
                                                                                  • Opcode Fuzzy Hash: 9e76ea3f31d2bdfe52bb2cbcffa011d87c0cf95fd44b2d50d3d0d9060d993fc1
                                                                                  • Instruction Fuzzy Hash: DB31B071904619ABDF00EF94CC519FEB7B5FF05320B10862AE829977D2DB75A905EB80
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F78F14
                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F78F27
                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F78F57
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_memmove$ClassName
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 365058703-1403004172
                                                                                  • Opcode ID: d3d1f51839b862f86dfd6315ead868e75ba308abadd7470e28611974a6c866ed
                                                                                  • Instruction ID: 2ad806faba1ac157db30ef7508bc8d1c4e9e56b8119d5ba8bb6606386d57cdfc
                                                                                  • Opcode Fuzzy Hash: d3d1f51839b862f86dfd6315ead868e75ba308abadd7470e28611974a6c866ed
                                                                                  • Instruction Fuzzy Hash: B8210471A40208BEDB14ABB0DC49DFFB769DF46360F14812AF829972E0DF39580AB651
                                                                                  APIs
                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F9184C
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F91872
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F918A2
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00F918E9
                                                                                    • Part of subcall function 00F92483: GetLastError.KERNEL32(?,?,00F91817,00000000,00000000,00000001), ref: 00F92498
                                                                                    • Part of subcall function 00F92483: SetEvent.KERNEL32(?,?,00F91817,00000000,00000000,00000001), ref: 00F924AD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                  • String ID:
                                                                                  • API String ID: 3113390036-3916222277
                                                                                  • Opcode ID: 906bc69c9984733b512c6e55ac9d971b9d7beef01115ca7ead6d7c3facacbca7
                                                                                  • Instruction ID: c42e406c1ad7c570b122b3dcba3f0f98a1d515b2aef405bb3a16f1716b636d02
                                                                                  • Opcode Fuzzy Hash: 906bc69c9984733b512c6e55ac9d971b9d7beef01115ca7ead6d7c3facacbca7
                                                                                  • Instruction Fuzzy Hash: 81217FB550020DBFFB129B649C85EBF76ADFB49754F10413AF80596140DA249D0977A1
                                                                                  APIs
                                                                                    • Part of subcall function 00F21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F21D73
                                                                                    • Part of subcall function 00F21D35: GetStockObject.GDI32(00000011), ref: 00F21D87
                                                                                    • Part of subcall function 00F21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F21D91
                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00FA6461
                                                                                  • LoadLibraryW.KERNEL32(?), ref: 00FA6468
                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00FA647D
                                                                                  • DestroyWindow.USER32(?), ref: 00FA6485
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                  • String ID: SysAnimate32
                                                                                  • API String ID: 4146253029-1011021900
                                                                                  • Opcode ID: 203de6a918ef41663fe3c06786b4e917cab3583174eb05f38fe7a2d238205f30
                                                                                  • Instruction ID: a9e31e0b4c3ca9bd1bef0f4854aca6620d7ea493994b0b809cdcbe0f00f3fd9a
                                                                                  • Opcode Fuzzy Hash: 203de6a918ef41663fe3c06786b4e917cab3583174eb05f38fe7a2d238205f30
                                                                                  • Instruction Fuzzy Hash: E3218BB2600209ABEF108FA4DC80EBA77A9EB5A738F184629FA10D6190D775DC51B760
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00F86DBC
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F86DEF
                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00F86E01
                                                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00F86E3B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandle$FilePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 4209266947-2873401336
                                                                                  • Opcode ID: ed69facce0338e19a995edc0b24331821b7550935b59f5aa2b7238d87f409cf0
                                                                                  • Instruction ID: 24edddc178c909686b569266306188a5b737e51b729252ffbba890aee8f31bd8
                                                                                  • Opcode Fuzzy Hash: ed69facce0338e19a995edc0b24331821b7550935b59f5aa2b7238d87f409cf0
                                                                                  • Instruction Fuzzy Hash: 1221A476A00209ABDB20AF69DC04BDA77F4EF45730F204619FCA1D72D0D7709955EB54
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00F86E89
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F86EBB
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00F86ECC
                                                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00F86F06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandle$FilePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 4209266947-2873401336
                                                                                  • Opcode ID: 2e9e761554ef588c7566bb962f47c6597e962537083d2541540e20add128ec53
                                                                                  • Instruction ID: 40f7621ecc6e7405b721166d9a6abdd3e2cb2451f11a44c4beddd7d4a949501c
                                                                                  • Opcode Fuzzy Hash: 2e9e761554ef588c7566bb962f47c6597e962537083d2541540e20add128ec53
                                                                                  • Instruction Fuzzy Hash: 1C2186759003059BDB20AF69DC04BDA77E8EF45730F200A19FDA1D72D0DB709855E755
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F8AC54
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F8ACA8
                                                                                  • __swprintf.LIBCMT ref: 00F8ACC1
                                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,00FAF910), ref: 00F8ACFF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                                                  • String ID: %lu
                                                                                  • API String ID: 3164766367-685833217
                                                                                  • Opcode ID: fe69a0d887fe7361d7dcab72e458719e76acefc46513e0ac911feea3f072133a
                                                                                  • Instruction ID: 7e6d9d442df1f1351f7131321c95681d4d450b25b1ba6899b726f1ff19d18c1f
                                                                                  • Opcode Fuzzy Hash: fe69a0d887fe7361d7dcab72e458719e76acefc46513e0ac911feea3f072133a
                                                                                  • Instruction Fuzzy Hash: 3E21B370A00109AFCB10EFA4DD45EEE7BB8FF49714B044069F909DB251DB75EA45EB21
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00F81B19
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                  • API String ID: 3964851224-769500911
                                                                                  • Opcode ID: 0c1d12f28f63120b5ac3cf47632555074f47a0b531a43c4916252c07ec42c3b1
                                                                                  • Instruction ID: 5701efc651b5f5dfeda2a0f6bf192e94cf2c558ba319c2bddf242e8323050bc0
                                                                                  • Opcode Fuzzy Hash: 0c1d12f28f63120b5ac3cf47632555074f47a0b531a43c4916252c07ec42c3b1
                                                                                  • Instruction Fuzzy Hash: 27117C709402089BCF00FF94E8519EEB7B4BF66314F1845A5D814A7292EB365906EB50
                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F9EC07
                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F9EC37
                                                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00F9ED6A
                                                                                  • CloseHandle.KERNEL32(?), ref: 00F9EDEB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                  • String ID:
                                                                                  • API String ID: 2364364464-0
                                                                                  • Opcode ID: f5a0e1ef781173378734dfd0a8c461158e97394e8b84040c5a979481a4868d2e
                                                                                  • Instruction ID: fab3182f6e1f6f60fc93ffc1d5c4aecb511df2932eac4615fea95b6e35a06fd6
                                                                                  • Opcode Fuzzy Hash: f5a0e1ef781173378734dfd0a8c461158e97394e8b84040c5a979481a4868d2e
                                                                                  • Instruction Fuzzy Hash: EA8191716043109FEB20EF28DC46F6AB7E5AF88720F44881DF999DB2D2D6B4AC45DB41
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00FA0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9FDAD,?,?), ref: 00FA0E31
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FA00FD
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FA013C
                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00FA0183
                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 00FA01AF
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00FA01BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 3440857362-0
                                                                                  • Opcode ID: a3faae06603fbe315bb4943452ea8013f4ef85146c587eaab32199e674ed3ddf
                                                                                  • Instruction ID: 1ed4382f5942010ac9f27ccddd8fb041c22a25d38ec2daeccd07bbdbf4ff0713
                                                                                  • Opcode Fuzzy Hash: a3faae06603fbe315bb4943452ea8013f4ef85146c587eaab32199e674ed3ddf
                                                                                  • Instruction Fuzzy Hash: C9518BB1608204AFC704EF54DC81EAAB7E8FF85314F44882DF5858B2A2DB35E904EB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F9D927
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00F9D9AA
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F9D9C6
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00F9DA07
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F9DA21
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F87896,?,?,00000000), ref: 00F25A2C
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F87896,?,?,00000000,?,?), ref: 00F25A50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 327935632-0
                                                                                  • Opcode ID: 43fd892341d1ef3cb6069407d580c0e3c89d7ccf001e7a22eb5fbfd512c0b28c
                                                                                  • Instruction ID: b1365bec6f55410e2099e6463412bd59f67c6f23f49a8d1bb9629e01b8e03315
                                                                                  • Opcode Fuzzy Hash: 43fd892341d1ef3cb6069407d580c0e3c89d7ccf001e7a22eb5fbfd512c0b28c
                                                                                  • Instruction Fuzzy Hash: 95514775A04219DFDB00EFA8D8849ADB7F4FF09320B148069E819AB312D738ED45EF90
                                                                                  APIs
                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F8E61F
                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00F8E648
                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F8E687
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F8E6AC
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F8E6B4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1389676194-0
                                                                                  • Opcode ID: 4c7266cf24df6ea6246e0e5cee406b2d8c0fa9772edf3b8a39c2406ab012607b
                                                                                  • Instruction ID: 36d453b8fdd715595c1366201928980099d81058b6c2ecec2aff31df61b633c1
                                                                                  • Opcode Fuzzy Hash: 4c7266cf24df6ea6246e0e5cee406b2d8c0fa9772edf3b8a39c2406ab012607b
                                                                                  • Instruction Fuzzy Hash: AB514D35A00115DFCB01EF64D981AADBBF5EF09314F1880A9E809AB361DB35ED11EF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b8013edf51351e6a96066b2cbef027b6e4625b78435a904a8c70d310eaab44dc
                                                                                  • Instruction ID: c154fe19c996038c97c0501cb639403c39c9baf2c239483c9c5ecd49836ffa3f
                                                                                  • Opcode Fuzzy Hash: b8013edf51351e6a96066b2cbef027b6e4625b78435a904a8c70d310eaab44dc
                                                                                  • Instruction Fuzzy Hash: 5A41A4B5D04108BFD720DF64CC88FA9BBA4EB0B320F144165F815AB2E1C730AD59FA51
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 00F22357
                                                                                  • ScreenToClient.USER32(00FE57B0,?), ref: 00F22374
                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 00F22399
                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 00F223A7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                  • String ID:
                                                                                  • API String ID: 4210589936-0
                                                                                  • Opcode ID: 03eeb608a7a975ea889da3b0e983fbb509229fd206598f510b3381d0e9bc39bb
                                                                                  • Instruction ID: 55da3c1d8a89361624433da7b53e62c58f306395f62b227250ff3d3168ad0df8
                                                                                  • Opcode Fuzzy Hash: 03eeb608a7a975ea889da3b0e983fbb509229fd206598f510b3381d0e9bc39bb
                                                                                  • Instruction Fuzzy Hash: FB416F75A04219FFCB159FA8CC44AE9BBB4BB05361F204319E92996290CB349D54EB91
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F763E7
                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00F76433
                                                                                  • TranslateMessage.USER32(?), ref: 00F7645C
                                                                                  • DispatchMessageW.USER32(?), ref: 00F76466
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F76475
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                  • String ID:
                                                                                  • API String ID: 2108273632-0
                                                                                  • Opcode ID: 281225008972e8d6be106f3e92098f291b2ce5a09dc7e0f174af00b48644097d
                                                                                  • Instruction ID: 48a19d36c35966f313cb6c1dc3376b61ff928d92765455f406802fac8b80d435
                                                                                  • Opcode Fuzzy Hash: 281225008972e8d6be106f3e92098f291b2ce5a09dc7e0f174af00b48644097d
                                                                                  • Instruction Fuzzy Hash: 6D31FD71D00A4AAFDB64CFB0CC84BB67BECAB01714F148177E519CA1A0D7359449F752
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00F78A30
                                                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00F78ADA
                                                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00F78AE2
                                                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 00F78AF0
                                                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00F78AF8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3382505437-0
                                                                                  • Opcode ID: 3163225f899aaa3a7829e8befefa82c1f0bc60b35e5b68233ba2d9a05e963b2a
                                                                                  • Instruction ID: 9ab63de986b8e7b20181fe23bdd1ecb9f0cbb91bfdffbe1ad63e61e56a86ed77
                                                                                  • Opcode Fuzzy Hash: 3163225f899aaa3a7829e8befefa82c1f0bc60b35e5b68233ba2d9a05e963b2a
                                                                                  • Instruction Fuzzy Hash: 07310471900219FBDF10CFA8DD4CA9E3BB5EB05325F10822AF829DB2D0C7749915EB91
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 00F7B204
                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F7B221
                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F7B259
                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F7B27F
                                                                                  • _wcsstr.LIBCMT ref: 00F7B289
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                  • String ID:
                                                                                  • API String ID: 3902887630-0
                                                                                  • Opcode ID: 1d2568ce51a8fb2c4554edfbd46c9c317b2f1f601d2f50d1048992cc840d8b9f
                                                                                  • Instruction ID: 5fe047d40d668d183b14150571c0a2c56ee0510b7f472fe0d5fc02605933e4c2
                                                                                  • Opcode Fuzzy Hash: 1d2568ce51a8fb2c4554edfbd46c9c317b2f1f601d2f50d1048992cc840d8b9f
                                                                                  • Instruction Fuzzy Hash: B521F5726052057AEB165B759C09F7F7BA8DF4A720F00813AFC08DA162EF659C40F2A1
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00FAB192
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00FAB1B7
                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FAB1CF
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00FAB1F8
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00F90E90,00000000), ref: 00FAB216
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$MetricsSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2294984445-0
                                                                                  • Opcode ID: 248cdddf89360a20ff4871075af275fd926346d247ba80e67412ca00b4415d59
                                                                                  • Instruction ID: 97ad49956b959c311143c45644796477e05ffa57fc15fbe642d06abac2e5983f
                                                                                  • Opcode Fuzzy Hash: 248cdddf89360a20ff4871075af275fd926346d247ba80e67412ca00b4415d59
                                                                                  • Instruction Fuzzy Hash: 222180B1910265AFCB109F78DC54B6A3BA4EB06731F144729B922D71E1E7309960EB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F79320
                                                                                    • Part of subcall function 00F27BCC: _memmove.LIBCMT ref: 00F27C06
                                                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F79352
                                                                                  • __itow.LIBCMT ref: 00F7936A
                                                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F79392
                                                                                  • __itow.LIBCMT ref: 00F793A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$__itow$_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2983881199-0
                                                                                  • Opcode ID: a3d046e68251f8c2e2fa4805aadf4e6c7f0b94f32f8516c0a23d4682c19bf41d
                                                                                  • Instruction ID: 53e0931bc758a572ac4782eed998044a38ebadf8565bd6b5644318a03c950af4
                                                                                  • Opcode Fuzzy Hash: a3d046e68251f8c2e2fa4805aadf4e6c7f0b94f32f8516c0a23d4682c19bf41d
                                                                                  • Instruction Fuzzy Hash: 08210A31B052086BDB10AEA09C85EEE3BADEB49720F048026FD08DB2D0D6F0DD45B793
                                                                                  APIs
                                                                                  • IsWindow.USER32(00000000), ref: 00F95A6E
                                                                                  • GetForegroundWindow.USER32 ref: 00F95A85
                                                                                  • GetDC.USER32(00000000), ref: 00F95AC1
                                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 00F95ACD
                                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 00F95B08
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ForegroundPixelRelease
                                                                                  • String ID:
                                                                                  • API String ID: 4156661090-0
                                                                                  • Opcode ID: c987a485663d52187dfcf9c882c10b3bf4577ce896446aba618248c8ff354960
                                                                                  • Instruction ID: 55c4722fe00bcfb79802eb0edba3fbd99ee899206d6957c954aaf4970e43e36b
                                                                                  • Opcode Fuzzy Hash: c987a485663d52187dfcf9c882c10b3bf4577ce896446aba618248c8ff354960
                                                                                  • Instruction Fuzzy Hash: 9B21C375A00108AFDB14EFA4DC84A9ABBF5EF49350F148079F809DB362CA74AD05EB90
                                                                                  APIs
                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F2134D
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00F2135C
                                                                                  • BeginPath.GDI32(?), ref: 00F21373
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00F2139C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                  • String ID:
                                                                                  • API String ID: 3225163088-0
                                                                                  • Opcode ID: 5abcdf99c9f21b267ff8754a7a5017209d7490d33a2eb864d89c85fafaa13628
                                                                                  • Instruction ID: 16d374ffbec65feb4c794c6394cbc89a8376bc2b52b7cfe7c230323606f36474
                                                                                  • Opcode Fuzzy Hash: 5abcdf99c9f21b267ff8754a7a5017209d7490d33a2eb864d89c85fafaa13628
                                                                                  • Instruction Fuzzy Hash: 0721897080065CEBDB10CF65EC847693BA9FB10B2AF148226E8109E1B0D3B19E95FF94
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: 01a96dabc3f425b64a9a41cfec89174b2f19b8a84e377d8bb0d6c3313e7ec21c
                                                                                  • Instruction ID: 28ce25741840932b9a721c866818cf50f812ffaa90e5aa346648c9a897a9cd68
                                                                                  • Opcode Fuzzy Hash: 01a96dabc3f425b64a9a41cfec89174b2f19b8a84e377d8bb0d6c3313e7ec21c
                                                                                  • Instruction Fuzzy Hash: 0001B5B26001097BD215AB129D42FFBBB5CEE533A8B04C022FD0996243EB54DE10B6A3
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F84ABA
                                                                                  • __beginthreadex.LIBCMT ref: 00F84AD8
                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00F84AED
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F84B03
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F84B0A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                  • String ID:
                                                                                  • API String ID: 3824534824-0
                                                                                  • Opcode ID: ea47997dad2824e7c26774a38c21874df90b2bb060f5cd8b0eb3e434b1feea98
                                                                                  • Instruction ID: 16bf2ae4209b4b12694b9c3bdc48d879d2fd498864e9a6a81e2bcab26bc37e04
                                                                                  • Opcode Fuzzy Hash: ea47997dad2824e7c26774a38c21874df90b2bb060f5cd8b0eb3e434b1feea98
                                                                                  • Instruction Fuzzy Hash: D21144B690424DBBCB00AFA8EC48ADB7FACEB85324F144269F914D7250D675D904ABA0
                                                                                  APIs
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F7821E
                                                                                  • GetLastError.KERNEL32(?,00F77CE2,?,?,?), ref: 00F78228
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00F77CE2,?,?,?), ref: 00F78237
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00F77CE2,?,?,?), ref: 00F7823E
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F78255
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 842720411-0
                                                                                  • Opcode ID: 8b4e3990f89a73a339dc6c737763b58cbe673c4b6eb6e67f3aa8b60a09dda2e9
                                                                                  • Instruction ID: 3eb07270f92aeac188a9335d8667f6e6ac98ca6894b8d45efc0289c339f81902
                                                                                  • Opcode Fuzzy Hash: 8b4e3990f89a73a339dc6c737763b58cbe673c4b6eb6e67f3aa8b60a09dda2e9
                                                                                  • Instruction Fuzzy Hash: 3B0162B1740208BFDB204FA5DC4CD677B6DEF867A57504469F809C6220DA318C05EA61
                                                                                  APIs
                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?,?,00F77455), ref: 00F77127
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?), ref: 00F77142
                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?), ref: 00F77150
                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?), ref: 00F77160
                                                                                  • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F77044,80070057,?,?), ref: 00F7716C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 3897988419-0
                                                                                  • Opcode ID: 520a1965b1df729776388e2a7dee7350d80f229835d3edbd76a1e6193645c0ae
                                                                                  • Instruction ID: 44d43f4a74e08fffef21a67188329a330dfe22945be68e9d77b9ff2f3f2cd24b
                                                                                  • Opcode Fuzzy Hash: 520a1965b1df729776388e2a7dee7350d80f229835d3edbd76a1e6193645c0ae
                                                                                  • Instruction Fuzzy Hash: 3A01D4B6610308BBCB105F64DC44BAA7BADEF49761F144175FD08D6220D7B1DD00A7A0
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F85260
                                                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F8526E
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F85276
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F85280
                                                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F852BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                  • String ID:
                                                                                  • API String ID: 2833360925-0
                                                                                  • Opcode ID: 63d3f1c478bb6233b4f2c2d2e2834a91e4f6e61cda9b7994a4824017cb7c75c4
                                                                                  • Instruction ID: b2c6adfaad52a32fcc81814806793463236b4cdf9ab1c08e39d449dfa0418857
                                                                                  • Opcode Fuzzy Hash: 63d3f1c478bb6233b4f2c2d2e2834a91e4f6e61cda9b7994a4824017cb7c75c4
                                                                                  • Instruction Fuzzy Hash: 2E011B71D01A1DDBCF00EFE4DC49AEDBB78BB09B11F400555E981B6141CF305554ABA1
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F78121
                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F7812B
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F7813A
                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F78141
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F78157
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: 51b754d05d1aca093e0de4318965bd144396a8c2d5b5ddcbd408bfc2a6265ffe
                                                                                  • Instruction ID: 09b83753a14c66ac3f151073b7821472737d595c28cfc189a5f4300f33429ba6
                                                                                  • Opcode Fuzzy Hash: 51b754d05d1aca093e0de4318965bd144396a8c2d5b5ddcbd408bfc2a6265ffe
                                                                                  • Instruction Fuzzy Hash: 9AF068B1740308AFDB110FA5DC8CE673BADFF467A5B404036F549C6150CFA19D46EA61
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00F7C1F7
                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F7C20E
                                                                                  • MessageBeep.USER32(00000000), ref: 00F7C226
                                                                                  • KillTimer.USER32(?,0000040A), ref: 00F7C242
                                                                                  • EndDialog.USER32(?,00000001), ref: 00F7C25C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3741023627-0
                                                                                  • Opcode ID: 7b3659c309ad96a6a4553dbe9dd0c0f5a87301f733e766e65083ed65721b3c4a
                                                                                  • Instruction ID: ad0402eb5eb82c43f9385398ef36d75864a4619f9e06ebcf08960229853affab
                                                                                  • Opcode Fuzzy Hash: 7b3659c309ad96a6a4553dbe9dd0c0f5a87301f733e766e65083ed65721b3c4a
                                                                                  • Instruction Fuzzy Hash: 7401A770804308ABEB205B90ED4EB967778BF01706F00426EE586A55E1DBE46948EB91
                                                                                  APIs
                                                                                  • EndPath.GDI32(?), ref: 00F213BF
                                                                                  • StrokeAndFillPath.GDI32(?,?,00F5B888,00000000,?), ref: 00F213DB
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00F213EE
                                                                                  • DeleteObject.GDI32 ref: 00F21401
                                                                                  • StrokePath.GDI32(?), ref: 00F2141C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                  • String ID:
                                                                                  • API String ID: 2625713937-0
                                                                                  • Opcode ID: 42c5ffe31d1d4b086453242cadd75a429bdb6b344d9a375404f68e2b66df1948
                                                                                  • Instruction ID: cd78694be74e5dd89f82599ab9094217e66c48e1c465e1310a35e91027aa2ddb
                                                                                  • Opcode Fuzzy Hash: 42c5ffe31d1d4b086453242cadd75a429bdb6b344d9a375404f68e2b66df1948
                                                                                  • Instruction Fuzzy Hash: 2BF0C970004A4CEBDB159F66EC8C7593BA5BB1272AF08C224E4698D0F1C7714A99FF54
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 00F8C432
                                                                                  • CoCreateInstance.OLE32(00FB2D6C,00000000,00000001,00FB2BDC,?), ref: 00F8C44A
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  • CoUninitialize.OLE32 ref: 00F8C6B7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 2683427295-24824748
                                                                                  • Opcode ID: 610ea01cc1d456c3b4445c8d6147eff97f28d53dabad3c67db97616f9e643c9f
                                                                                  • Instruction ID: d05db844ccce76df07cf2697484a3f29164cd7cb28886d36d6b719c213926335
                                                                                  • Opcode Fuzzy Hash: 610ea01cc1d456c3b4445c8d6147eff97f28d53dabad3c67db97616f9e643c9f
                                                                                  • Instruction Fuzzy Hash: 95A15CB1108205AFD300EF54DC81EABB7E8FF85354F40492CF5558B1A2EBB5EA49DB62
                                                                                  APIs
                                                                                    • Part of subcall function 00F40DB6: std::exception::exception.LIBCMT ref: 00F40DEC
                                                                                    • Part of subcall function 00F40DB6: __CxxThrowException@8.LIBCMT ref: 00F40E01
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F27A51: _memmove.LIBCMT ref: 00F27AAB
                                                                                  • __swprintf.LIBCMT ref: 00F32ECD
                                                                                  Strings
                                                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F32D66
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                  • API String ID: 1943609520-557222456
                                                                                  • Opcode ID: 72469017c12c9030373e2e67bb15c534a36743675be42f1efd848aa291a1e67d
                                                                                  • Instruction ID: fbc0542f10b1c0cc89138c26c4fbf18b59fad599227f0f8722d3546506e147ea
                                                                                  • Opcode Fuzzy Hash: 72469017c12c9030373e2e67bb15c534a36743675be42f1efd848aa291a1e67d
                                                                                  • Instruction Fuzzy Hash: E4915C715083119FC714EF24DC86D6EB7B8EF85720F00491DF9569B2A2DA38ED44EB52
                                                                                  APIs
                                                                                    • Part of subcall function 00F24750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F24743,?,?,00F237AE,?), ref: 00F24770
                                                                                  • CoInitialize.OLE32(00000000), ref: 00F8B9BB
                                                                                  • CoCreateInstance.OLE32(00FB2D6C,00000000,00000001,00FB2BDC,?), ref: 00F8B9D4
                                                                                  • CoUninitialize.OLE32 ref: 00F8B9F1
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 2126378814-24824748
                                                                                  • Opcode ID: e01735b5b0f4dcb7691320628869b4ecd8cf6f4643760484f7eb1a0386b0b9ba
                                                                                  • Instruction ID: b4359e0f6554cdfeeaca58235e13aa24d157137c1b768155788c43da636baa41
                                                                                  • Opcode Fuzzy Hash: e01735b5b0f4dcb7691320628869b4ecd8cf6f4643760484f7eb1a0386b0b9ba
                                                                                  • Instruction Fuzzy Hash: 2EA178756043159FCB04EF14C884DAABBE5FF89324F048998F8999B3A2CB35EC45DB91
                                                                                  APIs
                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00F450AD
                                                                                    • Part of subcall function 00F500F0: __87except.LIBCMT ref: 00F5012B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHandling__87except__start
                                                                                  • String ID: pow
                                                                                  • API String ID: 2905807303-2276729525
                                                                                  • Opcode ID: bc9fb46aca21e634668567b9ad82e03636cbcb2b52a5874886d869203f4715b5
                                                                                  • Instruction ID: ca113419b4c6e3209e71b2c1ae8445d4734f59dab8527d8a2ea7e9cca4b0eb73
                                                                                  • Opcode Fuzzy Hash: bc9fb46aca21e634668567b9ad82e03636cbcb2b52a5874886d869203f4715b5
                                                                                  • Instruction Fuzzy Hash: 84515C65D0CA0687DB117728CC4536E3F909B81B21F208D59EDD5862ABDE388DCCBA86
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$_memmove
                                                                                  • String ID: ERCP
                                                                                  • API String ID: 2532777613-1384759551
                                                                                  • Opcode ID: 510f58c946de3ee107eab1de51a3c4455db006a288b9f4d2e02817764c922518
                                                                                  • Instruction ID: cc687c5b5a326a9a28da588b5e31100a6aaeae0a7da8779a9402e56eb37159b8
                                                                                  • Opcode Fuzzy Hash: 510f58c946de3ee107eab1de51a3c4455db006a288b9f4d2e02817764c922518
                                                                                  • Instruction Fuzzy Hash: A951A171900705EBDB24CF95C841BABBBF5AF04324F20856EE94ACB241EB74E950EB41
                                                                                  APIs
                                                                                    • Part of subcall function 00F814BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F79296,?,?,00000034,00000800,?,00000034), ref: 00F814E6
                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F7983F
                                                                                    • Part of subcall function 00F81487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F792C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00F814B1
                                                                                    • Part of subcall function 00F813DE: GetWindowThreadProcessId.USER32(?,?), ref: 00F81409
                                                                                    • Part of subcall function 00F813DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F7925A,00000034,?,?,00001004,00000000,00000000), ref: 00F81419
                                                                                    • Part of subcall function 00F813DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F7925A,00000034,?,?,00001004,00000000,00000000), ref: 00F8142F
                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F798AC
                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F798F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                  • String ID: @
                                                                                  • API String ID: 4150878124-2766056989
                                                                                  • Opcode ID: ce4221f84ac8fed2043beb9de1d6617cc90118557e02a10571a25727dee57eee
                                                                                  • Instruction ID: 992734feaf54aa83a4ab9f603d85245652517c4415feb62361f11d86aaf1b734
                                                                                  • Opcode Fuzzy Hash: ce4221f84ac8fed2043beb9de1d6617cc90118557e02a10571a25727dee57eee
                                                                                  • Instruction Fuzzy Hash: 3541507690021CBFDB10EFA4CC41ADEBBB8EB09310F104159FA45B7141DA746E45DBA1
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00FAF910,00000000,?,?,?,?), ref: 00FA79DF
                                                                                  • GetWindowLongW.USER32 ref: 00FA79FC
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FA7A0C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long
                                                                                  • String ID: SysTreeView32
                                                                                  • API String ID: 847901565-1698111956
                                                                                  • Opcode ID: fe7261b9f521216f285b8c702d915ed535c8e365ed4d21af3c7caaaa11ff2b2b
                                                                                  • Instruction ID: df4003da677d0177fa05374d0643c1fc0f77040be0e03e51fe0609180a5e0852
                                                                                  • Opcode Fuzzy Hash: fe7261b9f521216f285b8c702d915ed535c8e365ed4d21af3c7caaaa11ff2b2b
                                                                                  • Instruction Fuzzy Hash: 7431BDB160420AABDB119E78DC41FEB77A9EB0A334F248725F875922E0D735ED50AB50
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00FA7461
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00FA7475
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FA7499
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window
                                                                                  • String ID: SysMonthCal32
                                                                                  • API String ID: 2326795674-1439706946
                                                                                  • Opcode ID: 7b462b9260f3013792fa8875613b97d7fcbb9d8bc8f17ad6922d9ea416262c9b
                                                                                  • Instruction ID: f5948ceada702d964929c070c1c72075e2bd5bdb5be6db5f6f31c1dbe5c8d4a2
                                                                                  • Opcode Fuzzy Hash: 7b462b9260f3013792fa8875613b97d7fcbb9d8bc8f17ad6922d9ea416262c9b
                                                                                  • Instruction Fuzzy Hash: 7421BF72500218ABDF11DEA4CC42FEA3B7AEB4D724F110214FE156B190DAB5AC51ABA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FA7C4A
                                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FA7C58
                                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FA7C5F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$DestroyWindow
                                                                                  • String ID: msctls_updown32
                                                                                  • API String ID: 4014797782-2298589950
                                                                                  • Opcode ID: 602207b6867f693265d15f0fb407722ae97c77da967a9c610af92902c4ac6fdf
                                                                                  • Instruction ID: c3691cab7a57c218a55d4f28bbc1331cb8e2a1d0cdd30cfa824efce181d5e137
                                                                                  • Opcode Fuzzy Hash: 602207b6867f693265d15f0fb407722ae97c77da967a9c610af92902c4ac6fdf
                                                                                  • Instruction Fuzzy Hash: 5B215EF5604208AFDB11EF64DCC1DA737EDEF5A7A4B140059FA019B3A1CB71EC11AAA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00FA6D3B
                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00FA6D4B
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00FA6D70
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$MoveWindow
                                                                                  • String ID: Listbox
                                                                                  • API String ID: 3315199576-2633736733
                                                                                  • Opcode ID: c80548eb55ef80e8d3997f65e3d7870b7a44cb21f97440da6b76bfe1210ba0cb
                                                                                  • Instruction ID: 35be8536c6c899745469920f66f638449325d8df7af8be7ed3673c7736eaf9ca
                                                                                  • Opcode Fuzzy Hash: c80548eb55ef80e8d3997f65e3d7870b7a44cb21f97440da6b76bfe1210ba0cb
                                                                                  • Instruction Fuzzy Hash: 1F21C672A10118BFDF118F54DC45FBB3BBAEF8A774F058124FA459B1A0CA719C51ABA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00FA7772
                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00FA7787
                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00FA7794
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: msctls_trackbar32
                                                                                  • API String ID: 3850602802-1010561917
                                                                                  • Opcode ID: 00b58b3b6f80aa8971a4167f51ab6fcad76a8c9dd637b6d83c9a9ad08f4321a9
                                                                                  • Instruction ID: 0073fdb8bc561fce929f8f6182d78a4c8e5b4ea89d94614cb0ccb80392acb67d
                                                                                  • Opcode Fuzzy Hash: 00b58b3b6f80aa8971a4167f51ab6fcad76a8c9dd637b6d83c9a9ad08f4321a9
                                                                                  • Instruction Fuzzy Hash: 29113AB2614308BFEF106F70CC01FD77769EF89B64F010118F64196090C671E811EB20
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00F24B83,?), ref: 00F24C44
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F24C56
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 2574300362-1355242751
                                                                                  • Opcode ID: 909ec9ce0c21d84bd70d24ea759c13af11fed956c4ea6ff16037626ebdbac594
                                                                                  • Instruction ID: 0793416f21003dde1f2b11ba8e772d42dcd96be1837655b4875881e1307a2ab3
                                                                                  • Opcode Fuzzy Hash: 909ec9ce0c21d84bd70d24ea759c13af11fed956c4ea6ff16037626ebdbac594
                                                                                  • Instruction Fuzzy Hash: 34D02B70910723CFC7205F75E80820673E4EF02355B14C83ED4E2DA160E7B0D480E610
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00F24BD0,?,00F24DEF,?,00FE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F24C11
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F24C23
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 2574300362-3689287502
                                                                                  • Opcode ID: 5729efc2592e6fc092749c60ec399ba3de1dec7227e24bf716921a32a7e4eb1c
                                                                                  • Instruction ID: a8042efbf00b2ed7b048fb44743f6d95fe6cc2777be77f583f416f33ea86afec
                                                                                  • Opcode Fuzzy Hash: 5729efc2592e6fc092749c60ec399ba3de1dec7227e24bf716921a32a7e4eb1c
                                                                                  • Instruction Fuzzy Hash: 7CD0C270910723CFC720AFB4EC08206B6E5EF0A356B048C3AD481CA250E6B0D480E611
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,00FA1039), ref: 00FA0DF5
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FA0E07
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                  • API String ID: 2574300362-4033151799
                                                                                  • Opcode ID: 0982f2332d42f5e27c7fe35f347e908cc99f2cd0d4630b8e45a514c68d8f93a4
                                                                                  • Instruction ID: f150622d1d7850b8863d4181dcea62db6b9c476d5d221286185259f95ae0191b
                                                                                  • Opcode Fuzzy Hash: 0982f2332d42f5e27c7fe35f347e908cc99f2cd0d4630b8e45a514c68d8f93a4
                                                                                  • Instruction Fuzzy Hash: A1D0C2B0850316CFC3205FB0E84834272D5AF12351F088C3ED481C6250DAB0D490E600
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00F98CF4,?,00FAF910), ref: 00F990EE
                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F99100
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                                                  • API String ID: 2574300362-199464113
                                                                                  • Opcode ID: 74bf1d99a1432ef64fc40322368946b0fa09d18bc138cdcb00f1387e1605a1c0
                                                                                  • Instruction ID: 11ff92075948252936c8a0893d726080d359c08101547c69fee449b5b9e614d9
                                                                                  • Opcode Fuzzy Hash: 74bf1d99a1432ef64fc40322368946b0fa09d18bc138cdcb00f1387e1605a1c0
                                                                                  • Instruction Fuzzy Hash: 51D0C274910313CFDB209F75C80810272E4AF02392B068C3ED482CA150E6B0C4C0EA90
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LocalTime__swprintf
                                                                                  • String ID: %.3d$WIN_XPe
                                                                                  • API String ID: 2070861257-2409531811
                                                                                  • Opcode ID: 326f64afaca9dd769c2ce7e69c14ccc4f7f4bb504a836d6a2e856c64c73fde32
                                                                                  • Instruction ID: cc89177936835a4705ff7a7d169e3a942afd22d4f99f8c147cdae9f120d3e224
                                                                                  • Opcode Fuzzy Hash: 326f64afaca9dd769c2ce7e69c14ccc4f7f4bb504a836d6a2e856c64c73fde32
                                                                                  • Instruction Fuzzy Hash: D0D01273804119EAC7009A909C88EB9777CBB09301F180462F806D2040E2259758FA21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a6a2e53310905a1db7fc60f55070bd2f2cf4e16dde5e4426d3587a42eb2f9107
                                                                                  • Instruction ID: 7d33c40a4be362e6ad393175de36e88f2efb41b012ebd7e963ae6889ab0586a4
                                                                                  • Opcode Fuzzy Hash: a6a2e53310905a1db7fc60f55070bd2f2cf4e16dde5e4426d3587a42eb2f9107
                                                                                  • Instruction Fuzzy Hash: ABC19175A14316EFCB14DFA4C884EAEBBB5FF48314B10859AE809EB251D730DD41EB91
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00F9E0BE
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00F9E101
                                                                                    • Part of subcall function 00F9D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F9D7C5
                                                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00F9E301
                                                                                  • _memmove.LIBCMT ref: 00F9E314
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 3659485706-0
                                                                                  • Opcode ID: d4f5b1d166b2e29e6d7d997cea2079a1037ba61247dda354bba7037ad21f63cb
                                                                                  • Instruction ID: 9514d495883d9b6fb9270af797e8c4a92eb4eba35f3ca293095239c10a471f47
                                                                                  • Opcode Fuzzy Hash: d4f5b1d166b2e29e6d7d997cea2079a1037ba61247dda354bba7037ad21f63cb
                                                                                  • Instruction Fuzzy Hash: 21C18C71A08311DFDB04DF28C880A6ABBE4FF89714F04896DF9999B351D731E945DB82
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 00F980C3
                                                                                  • CoUninitialize.OLE32 ref: 00F980CE
                                                                                    • Part of subcall function 00F7D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F7D5D4
                                                                                  • VariantInit.OLEAUT32(?), ref: 00F980D9
                                                                                  • VariantClear.OLEAUT32(?), ref: 00F983AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 780911581-0
                                                                                  • Opcode ID: ca2ca5ee189ce90fa9e1f8459bec4d86b040994c6afb5ad1e19b697c4be37405
                                                                                  • Instruction ID: d97edc61045947504436427ec6ebb613e291823e697c8dae4b23827b81214442
                                                                                  • Opcode Fuzzy Hash: ca2ca5ee189ce90fa9e1f8459bec4d86b040994c6afb5ad1e19b697c4be37405
                                                                                  • Instruction Fuzzy Hash: 85A18C756087119FDB00DF64C881B6AB7E4BF8A364F08440CF9969B3A1CB78EC45EB46
                                                                                  APIs
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FB2C7C,?), ref: 00F776EA
                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FB2C7C,?), ref: 00F77702
                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,00FAFB80,000000FF,?,00000000,00000800,00000000,?,00FB2C7C,?), ref: 00F77727
                                                                                  • _memcmp.LIBCMT ref: 00F77748
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 314563124-0
                                                                                  • Opcode ID: 0d40b0737f3afecc771d22219fe7374c437ad80b6e8cdd6cd214e92b75ba1c24
                                                                                  • Instruction ID: 2c7a3c802daf88733910b53d5d04ed392bb640a7d636aeb6f2532867981ec3cc
                                                                                  • Opcode Fuzzy Hash: 0d40b0737f3afecc771d22219fe7374c437ad80b6e8cdd6cd214e92b75ba1c24
                                                                                  • Instruction Fuzzy Hash: 7D814C71A10209EFCB04DFE4C984EEEB7B9FF89315F208159E505AB250DB71AE06DB61
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$AllocClearCopyInitString
                                                                                  • String ID:
                                                                                  • API String ID: 2808897238-0
                                                                                  • Opcode ID: 197ef76b1103411728a38402c61a2d546f7a60c0791e0793f855ffb293f72024
                                                                                  • Instruction ID: 8fec56331a512d77c8bef979fc41c2659fd7a696a4c76b2a0d419628ab210a24
                                                                                  • Opcode Fuzzy Hash: 197ef76b1103411728a38402c61a2d546f7a60c0791e0793f855ffb293f72024
                                                                                  • Instruction Fuzzy Hash: 8F51E775B04B019ADB20EF65D891B2AB3E5AF45310F20C81FE58EDB291DE78D840A702
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(0146F370,?), ref: 00FA9863
                                                                                  • ScreenToClient.USER32(00000002,00000002), ref: 00FA9896
                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00FA9903
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                  • String ID:
                                                                                  • API String ID: 3880355969-0
                                                                                  • Opcode ID: bc423f116bbfc2cad54c01f873bcb594c3ca9129829c77ce19fd5e2e88bb322a
                                                                                  • Instruction ID: ce72264e3f93baffb93463fe239dfe0fd8d1098de2d716a9ba319d0ec795fef6
                                                                                  • Opcode Fuzzy Hash: bc423f116bbfc2cad54c01f873bcb594c3ca9129829c77ce19fd5e2e88bb322a
                                                                                  • Instruction Fuzzy Hash: 88514074E04209EFCF10CF54C884AAE7BB5FF56360F548169F9659B2A0D770AD41EB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00F79AD2
                                                                                  • __itow.LIBCMT ref: 00F79B03
                                                                                    • Part of subcall function 00F79D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00F79DBE
                                                                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00F79B6C
                                                                                  • __itow.LIBCMT ref: 00F79BC3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$__itow
                                                                                  • String ID:
                                                                                  • API String ID: 3379773720-0
                                                                                  • Opcode ID: ddeb1d00a55aef9b5c21a444b367ed03e33094be1e0f2cfcea6bda5a73107663
                                                                                  • Instruction ID: 22ed019322953054411b49f10a4cf13d1482436565ea141339956317747e3a46
                                                                                  • Opcode Fuzzy Hash: ddeb1d00a55aef9b5c21a444b367ed03e33094be1e0f2cfcea6bda5a73107663
                                                                                  • Instruction Fuzzy Hash: 5A41B570A04318ABDF11EF54DC45FEE7BB9EF85720F00405AF909A7291DBB49A44EB92
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00F969D1
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F969E1
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F96A45
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F96A51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                                                  • String ID:
                                                                                  • API String ID: 2214342067-0
                                                                                  • Opcode ID: 133f0181b4dd3bebe68f055ddcd1ab97793e2ad30a1d22d3a97099c8d1c0ddd2
                                                                                  • Instruction ID: 29580e50436a5320ba35d5eca8ed0f3f005047c3ec4ace797e3209266589ea87
                                                                                  • Opcode Fuzzy Hash: 133f0181b4dd3bebe68f055ddcd1ab97793e2ad30a1d22d3a97099c8d1c0ddd2
                                                                                  • Instruction Fuzzy Hash: 6C41B175740210AFEB60AF64DC86F7A77A49F05B14F44801CFA59EF2C2DAB89D01AB91
                                                                                  APIs
                                                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00FAF910), ref: 00F964A7
                                                                                  • _strlen.LIBCMT ref: 00F964D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen
                                                                                  • String ID:
                                                                                  • API String ID: 4218353326-0
                                                                                  • Opcode ID: 960fff44adad29512c2f4c1d3d620c08698d64aa109bd28e6f95a4e23b2819b7
                                                                                  • Instruction ID: b7703abe150ba9e3d780d0b6c569b89679ab2feb956ba67ea78892ddc9ad4ca5
                                                                                  • Opcode Fuzzy Hash: 960fff44adad29512c2f4c1d3d620c08698d64aa109bd28e6f95a4e23b2819b7
                                                                                  • Instruction Fuzzy Hash: 9241B571904214ABDF14EBA8EC85FAEB7A8AF44310F158159F819DB292DB38ED44EB50
                                                                                  APIs
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F8B89E
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00F8B8C4
                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F8B8E9
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F8B915
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 3321077145-0
                                                                                  • Opcode ID: ae76bacc2028e3665822d0348125349c9ef6f8194702570e9e753f17d70b29fa
                                                                                  • Instruction ID: 6e89a831f7219338bd59bbd04b14c4d52f573518b6ff1ac06ff2ff51af73ec86
                                                                                  • Opcode Fuzzy Hash: ae76bacc2028e3665822d0348125349c9ef6f8194702570e9e753f17d70b29fa
                                                                                  • Instruction Fuzzy Hash: 1D412D35A00514DFCB10EF55D844A99BBE1EF4A320F498098EC4A9F362CB78FD01EB95
                                                                                  APIs
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FA88DE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 634782764-0
                                                                                  • Opcode ID: ab1bd9e56eae26a9f66a356804106cdca880ceeccfc9b32c6f833c369ce1a08b
                                                                                  • Instruction ID: e424870119299917ec6905e55e7a32fa3817244d91d375d05fc9cba25129bfc9
                                                                                  • Opcode Fuzzy Hash: ab1bd9e56eae26a9f66a356804106cdca880ceeccfc9b32c6f833c369ce1a08b
                                                                                  • Instruction Fuzzy Hash: D831D6B4A40108AFEB209E54CC45BBA77B5EB0B7A0F544112FA51E62A1CEB4E942B752
                                                                                  APIs
                                                                                  • ClientToScreen.USER32(?,?), ref: 00FAAB60
                                                                                  • GetWindowRect.USER32(?,?), ref: 00FAABD6
                                                                                  • PtInRect.USER32(?,?,00FAC014), ref: 00FAABE6
                                                                                  • MessageBeep.USER32(00000000), ref: 00FAAC57
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1352109105-0
                                                                                  • Opcode ID: 11f4030ec9613d6c94f7b341a6610f4c94789eafdf27b2e17a84e1f5a003fe6d
                                                                                  • Instruction ID: d555ff9b1a40eb23bcef0e33d643b7ab98a38ea26ccf920b6828d94f15f02c49
                                                                                  • Opcode Fuzzy Hash: 11f4030ec9613d6c94f7b341a6610f4c94789eafdf27b2e17a84e1f5a003fe6d
                                                                                  • Instruction Fuzzy Hash: FD419FB0A00219DFDB11DF58C884B697BF5FF4A760F1880A9E8159F364D730E949EB92
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00F80B27
                                                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 00F80B43
                                                                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00F80BA9
                                                                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00F80BFB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: b5dccc8fe248206e0ccf583ed53f5fba49504e3dbefef8ed1363653549dd3656
                                                                                  • Instruction ID: 678e2ee8673d94987136379ee02783e0866624c17b7b60e8592960772ec60f8b
                                                                                  • Opcode Fuzzy Hash: b5dccc8fe248206e0ccf583ed53f5fba49504e3dbefef8ed1363653549dd3656
                                                                                  • Instruction Fuzzy Hash: A3314B70D40208AEFF70AB658C09BF9BBA5AB85334F88435AE491D21D1CB78894CB752
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00F80C66
                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F80C82
                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F80CE1
                                                                                  • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00F80D33
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: 73db30d4206c98d72443f7561eab55f157a5af2fa449382a6b8263240097ade6
                                                                                  • Instruction ID: 61d56baf3fcf8b18bbcc888c508b313f8c9b1160d61bf538626664b1ee57a18d
                                                                                  • Opcode Fuzzy Hash: 73db30d4206c98d72443f7561eab55f157a5af2fa449382a6b8263240097ade6
                                                                                  • Instruction Fuzzy Hash: 68314B71E002185EFF70AFA5CC047FEBB65AB46330F84431AE485511D1CB39594DB752
                                                                                  APIs
                                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F561FB
                                                                                  • __isleadbyte_l.LIBCMT ref: 00F56229
                                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F56257
                                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F5628D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                  • String ID:
                                                                                  • API String ID: 3058430110-0
                                                                                  • Opcode ID: 3dde6ca2ecdd9b558a8616a3aa234d6bb42fa402a70bdf4256f7a9f08ee20965
                                                                                  • Instruction ID: 1f2f2aa0386d5ea012beec756d4c9f6a806df3911f67703ef351a4ffa462c6c4
                                                                                  • Opcode Fuzzy Hash: 3dde6ca2ecdd9b558a8616a3aa234d6bb42fa402a70bdf4256f7a9f08ee20965
                                                                                  • Instruction Fuzzy Hash: 1331BC31A04246AFDF218F65CC44BBA7FA9BF42322F554128ED64C71A1DB30E958EB90
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 00FA4F02
                                                                                    • Part of subcall function 00F83641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F8365B
                                                                                    • Part of subcall function 00F83641: GetCurrentThreadId.KERNEL32 ref: 00F83662
                                                                                    • Part of subcall function 00F83641: AttachThreadInput.USER32(00000000,?,00F85005), ref: 00F83669
                                                                                  • GetCaretPos.USER32(?), ref: 00FA4F13
                                                                                  • ClientToScreen.USER32(00000000,?), ref: 00FA4F4E
                                                                                  • GetForegroundWindow.USER32 ref: 00FA4F54
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                  • String ID:
                                                                                  • API String ID: 2759813231-0
                                                                                  • Opcode ID: 94767e9029481ddb20680769ad906a1ee048b7b2651f00201b1157f040e57988
                                                                                  • Instruction ID: 0cd2f6afb7d7c5d7542d791e358c90bf56f91f769d1172a61fdc4d11f8345138
                                                                                  • Opcode Fuzzy Hash: 94767e9029481ddb20680769ad906a1ee048b7b2651f00201b1157f040e57988
                                                                                  • Instruction Fuzzy Hash: 87312FB1D00118AFDB00EFA5DC85DEFB7F9EF89300F11446AE415E7241DA759E059BA0
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00F83C7A
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00F83C88
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00F83CA8
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F83D52
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 420147892-0
                                                                                  • Opcode ID: 70ced26c56556d1c7eb21462843145289ff23e8090002564a7211aff13926050
                                                                                  • Instruction ID: a4656eda4422328745024673c89076f249148c6223eee02c0726841ba30e5a9f
                                                                                  • Opcode Fuzzy Hash: 70ced26c56556d1c7eb21462843145289ff23e8090002564a7211aff13926050
                                                                                  • Instruction Fuzzy Hash: 1331A0721083099FD300FF50DC81AAFBBE8EF95754F50082DF481861A1EB75EA49EB92
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • GetCursorPos.USER32(?), ref: 00FAC4D2
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F5B9AB,?,?,?,?,?), ref: 00FAC4E7
                                                                                  • GetCursorPos.USER32(?), ref: 00FAC534
                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F5B9AB,?,?,?), ref: 00FAC56E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2864067406-0
                                                                                  • Opcode ID: bbdf7ec4d431e3c58cc53e209d93cf38fcfdc0dc9189899a72a45eff945bc846
                                                                                  • Instruction ID: 92f22419fc053335787fa69da7d7f74a83b0f0de2e24229bfada9f7e135fcaf6
                                                                                  • Opcode Fuzzy Hash: bbdf7ec4d431e3c58cc53e209d93cf38fcfdc0dc9189899a72a45eff945bc846
                                                                                  • Instruction Fuzzy Hash: C331647990045CEFCB15CF98C854EAA7BB9EF4A720F484155F9058B261C7316950EBE4
                                                                                  APIs
                                                                                    • Part of subcall function 00F7810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F78121
                                                                                    • Part of subcall function 00F7810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F7812B
                                                                                    • Part of subcall function 00F7810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F7813A
                                                                                    • Part of subcall function 00F7810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F78141
                                                                                    • Part of subcall function 00F7810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F78157
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F786A3
                                                                                  • _memcmp.LIBCMT ref: 00F786C6
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F786FC
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F78703
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 1592001646-0
                                                                                  • Opcode ID: db731bd56e65c8fab7b53a4d288686694ae4e3d64bacdace511c1a0cfbbff42f
                                                                                  • Instruction ID: bf59b5ce63e464be5d45f87530f231196434dd4d40c2d640cad48311b0785f68
                                                                                  • Opcode Fuzzy Hash: db731bd56e65c8fab7b53a4d288686694ae4e3d64bacdace511c1a0cfbbff42f
                                                                                  • Instruction Fuzzy Hash: 53217C71E80108EFDB10DFA4CD49BEEB7B8EF45354F15805AE448AB241DB30AE06EB61
                                                                                  APIs
                                                                                  • __setmode.LIBCMT ref: 00F409AE
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F87896,?,?,00000000), ref: 00F25A2C
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F87896,?,?,00000000,?,?), ref: 00F25A50
                                                                                  • _fprintf.LIBCMT ref: 00F409E5
                                                                                  • OutputDebugStringW.KERNEL32(?), ref: 00F75DBB
                                                                                    • Part of subcall function 00F44AAA: _flsall.LIBCMT ref: 00F44AC3
                                                                                  • __setmode.LIBCMT ref: 00F40A1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                  • String ID:
                                                                                  • API String ID: 521402451-0
                                                                                  • Opcode ID: 01c3f94efa83d852090ceded5b7e7f11abe9dc1be00994b4b70782c5c30014b9
                                                                                  • Instruction ID: e76af4a3eaa2a906bffce0a5f07e339eeed58b711aa5f547181b5a08687ed6fc
                                                                                  • Opcode Fuzzy Hash: 01c3f94efa83d852090ceded5b7e7f11abe9dc1be00994b4b70782c5c30014b9
                                                                                  • Instruction Fuzzy Hash: D8113A329082046FDB04B7B4AC47AFE7FA89F46320F64401AF60467282EE7C6C4677A5
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F917A3
                                                                                    • Part of subcall function 00F9182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F9184C
                                                                                    • Part of subcall function 00F9182D: InternetCloseHandle.WININET(00000000), ref: 00F918E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$CloseConnectHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1463438336-0
                                                                                  • Opcode ID: 81a90a63797da56b0a4aca514d55d8f46a3114f232f53a666ebca6a40415eb6f
                                                                                  • Instruction ID: ce70619e4cbcf188cf00be56e73e8b4dab430de64987a7cf4348e1b87b610501
                                                                                  • Opcode Fuzzy Hash: 81a90a63797da56b0a4aca514d55d8f46a3114f232f53a666ebca6a40415eb6f
                                                                                  • Instruction Fuzzy Hash: 1121A172600606BFFF169FA0DC41FBABBA9FF49710F10443AFA1196650DB759811BBA0
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNEL32(?,00FAFAC0), ref: 00F83A64
                                                                                  • GetLastError.KERNEL32 ref: 00F83A73
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F83A82
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FAFAC0), ref: 00F83ADF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 2267087916-0
                                                                                  • Opcode ID: f0e2357baaf27dbb0bbf2bc87dfe4786c1fe798160792a35d212c7d87cb2a1d0
                                                                                  • Instruction ID: d645830b61fa62384326b6dbb2b22e1cc0237e9b2e127bcb3bea9abfdb656b1f
                                                                                  • Opcode Fuzzy Hash: f0e2357baaf27dbb0bbf2bc87dfe4786c1fe798160792a35d212c7d87cb2a1d0
                                                                                  • Instruction Fuzzy Hash: 1121D3785083058FC714FF28D8818AA77E4AE56764F104A2DF499C72A1D735DE4AEB42
                                                                                  APIs
                                                                                    • Part of subcall function 00F7F0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00F7DCD3,?,?,?,00F7EAC6,00000000,000000EF,00000119,?,?), ref: 00F7F0CB
                                                                                    • Part of subcall function 00F7F0BC: lstrcpyW.KERNEL32(00000000,?,?,00F7DCD3,?,?,?,00F7EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F7F0F1
                                                                                    • Part of subcall function 00F7F0BC: lstrcmpiW.KERNEL32(00000000,?,00F7DCD3,?,?,?,00F7EAC6,00000000,000000EF,00000119,?,?), ref: 00F7F122
                                                                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00F7EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F7DCEC
                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00F7EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F7DD12
                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F7EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F7DD46
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                  • String ID: cdecl
                                                                                  • API String ID: 4031866154-3896280584
                                                                                  • Opcode ID: c1dbdba4f156e746c23efd4324569bf91ef8050344cb77410cbc0dd63c7bbe33
                                                                                  • Instruction ID: dffc13b77b9edfbd38f1506523d421d52025d1f5c1b44d6b3be513058489108a
                                                                                  • Opcode Fuzzy Hash: c1dbdba4f156e746c23efd4324569bf91ef8050344cb77410cbc0dd63c7bbe33
                                                                                  • Instruction Fuzzy Hash: 8211B43A600305EBCB259F74CC4597A77B5FF45350B80812BE90ACB250EB719850E792
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00F55101
                                                                                    • Part of subcall function 00F4571C: __FF_MSGBANNER.LIBCMT ref: 00F45733
                                                                                    • Part of subcall function 00F4571C: __NMSG_WRITE.LIBCMT ref: 00F4573A
                                                                                    • Part of subcall function 00F4571C: RtlAllocateHeap.NTDLL(01450000,00000000,00000001,00000000,?,?,?,00F40DD3,?), ref: 00F4575F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 614378929-0
                                                                                  • Opcode ID: f94dd7dc2a2eb292265d28d944b4cce7db12c4431a680ca9a3e995536b87eb85
                                                                                  • Instruction ID: c71864af85d548acb65e86a1fbbdd6385486c5df6357bd3228cc7700561c4685
                                                                                  • Opcode Fuzzy Hash: f94dd7dc2a2eb292265d28d944b4cce7db12c4431a680ca9a3e995536b87eb85
                                                                                  • Instruction Fuzzy Hash: 5611E372D00E15AFCF313FB0AC5976D3F989F41BB3B100529FE449A161DE388849BA90
                                                                                  APIs
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F87896,?,?,00000000), ref: 00F25A2C
                                                                                    • Part of subcall function 00F25A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F87896,?,?,00000000,?,?), ref: 00F25A50
                                                                                  • gethostbyname.WSOCK32(?,?,?), ref: 00F96399
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00F963A4
                                                                                  • _memmove.LIBCMT ref: 00F963D1
                                                                                  • inet_ntoa.WSOCK32(?), ref: 00F963DC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                  • String ID:
                                                                                  • API String ID: 1504782959-0
                                                                                  • Opcode ID: ee6cdfc71d2b9151f6cbeb5b964219a34429903d671de9be64ced5aea4d6696e
                                                                                  • Instruction ID: 3fec4408c06ced34a64aa200ff0921522ad3a7fd83edd50909a6d6ba795a159f
                                                                                  • Opcode Fuzzy Hash: ee6cdfc71d2b9151f6cbeb5b964219a34429903d671de9be64ced5aea4d6696e
                                                                                  • Instruction Fuzzy Hash: B2116072900109AFCF00FBA4ED46CEEB7B8AF09310B144065F505E7261DB38EE18EBA1
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00F78B61
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F78B73
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F78B89
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F78BA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: f92b88ef397250a14e0de973af31e0b75ab628d08162cf6d167c9361c9bc5ded
                                                                                  • Instruction ID: 72568c332e82b6d78240ab56b5d898edff9a7ea9939af5fce87136ec381ad040
                                                                                  • Opcode Fuzzy Hash: f92b88ef397250a14e0de973af31e0b75ab628d08162cf6d167c9361c9bc5ded
                                                                                  • Instruction Fuzzy Hash: 02114C79940218FFDB10DF99CC84F9DBB74FB48350F204096E904B7250DA716E11EB94
                                                                                  APIs
                                                                                    • Part of subcall function 00F22612: GetWindowLongW.USER32(?,000000EB), ref: 00F22623
                                                                                  • DefDlgProcW.USER32(?,00000020,?), ref: 00F212D8
                                                                                  • GetClientRect.USER32(?,?), ref: 00F5B5FB
                                                                                  • GetCursorPos.USER32(?), ref: 00F5B605
                                                                                  • ScreenToClient.USER32(?,?), ref: 00F5B610
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4127811313-0
                                                                                  • Opcode ID: d3d0499538941d460d65fa49f8ad76f2d16ea12a0e85bae8bde32e6dc9e48847
                                                                                  • Instruction ID: 0050249d21d35745c6fdf462ed014366f0a77ffde7b6f32847d84d54c4780c03
                                                                                  • Opcode Fuzzy Hash: d3d0499538941d460d65fa49f8ad76f2d16ea12a0e85bae8bde32e6dc9e48847
                                                                                  • Instruction Fuzzy Hash: 05113A7690102DEFCB10DFA8E8859EE77B8FB16301F500456F901E7281D734BA55EBA9
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F7FCED,?,00F80D40,?,00008000), ref: 00F8115F
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00F7FCED,?,00F80D40,?,00008000), ref: 00F81184
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F7FCED,?,00F80D40,?,00008000), ref: 00F8118E
                                                                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,00F7FCED,?,00F80D40,?,00008000), ref: 00F811C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                  • String ID:
                                                                                  • API String ID: 2875609808-0
                                                                                  • Opcode ID: 7babe4764742e980c9048d90fb42acb41b05bea22e7d7c0d366275604cd7d17c
                                                                                  • Instruction ID: b241184e24f38d95d786ce3c83254ad7e2df8a4ce261ae078e5c41314b528a0e
                                                                                  • Opcode Fuzzy Hash: 7babe4764742e980c9048d90fb42acb41b05bea22e7d7c0d366275604cd7d17c
                                                                                  • Instruction Fuzzy Hash: FE117C72D0091DD7CF00AFE4D848AEEBB7CFF09711F104155EA80B6240CB709556EBA1
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00F7D84D
                                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F7D864
                                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F7D879
                                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F7D897
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                                  • String ID:
                                                                                  • API String ID: 1352324309-0
                                                                                  • Opcode ID: 840b41f67d17612ca972328d98daf589fd20d0b3833964f4247fc9c9deb673b8
                                                                                  • Instruction ID: bab961d3967083c4a5680dded1319903afdee03f6312d536ee96777d19f21374
                                                                                  • Opcode Fuzzy Hash: 840b41f67d17612ca972328d98daf589fd20d0b3833964f4247fc9c9deb673b8
                                                                                  • Instruction Fuzzy Hash: 591161B5605304DBE320CF90DC08F93BBBCEF04B00F50856AA95ADA490D7B0E549ABA3
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                  • String ID:
                                                                                  • API String ID: 3016257755-0
                                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction ID: 270bdaf2d67df71e12e784d1126f08a6de00b503bc808132121978051b2dab26
                                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction Fuzzy Hash: 95014E7244424ABBCF166E84EC01CED3FA6BB18352F598415FF1859071D336D9B9BB81
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00FAB2E4
                                                                                  • ScreenToClient.USER32(?,?), ref: 00FAB2FC
                                                                                  • ScreenToClient.USER32(?,?), ref: 00FAB320
                                                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FAB33B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 357397906-0
                                                                                  • Opcode ID: cb7cc85f93ebab761a245c1df11c88b8be15a49d3035d3eec7b36f3c2700bced
                                                                                  • Instruction ID: 1ae4c2cd94170203b1849a9337c44505b17f0557211216cc3cbbdcb97b934854
                                                                                  • Opcode Fuzzy Hash: cb7cc85f93ebab761a245c1df11c88b8be15a49d3035d3eec7b36f3c2700bced
                                                                                  • Instruction Fuzzy Hash: 931143B9D0020DEFDB41CFA9C8849EEBBB9FB09311F108166E914E3220D735AA559F90
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00FAB644
                                                                                  • _memset.LIBCMT ref: 00FAB653
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00FE6F20,00FE6F64), ref: 00FAB682
                                                                                  • CloseHandle.KERNEL32 ref: 00FAB694
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$CloseCreateHandleProcess
                                                                                  • String ID:
                                                                                  • API String ID: 3277943733-0
                                                                                  • Opcode ID: 9a008d80399f3e89d90f0b38a5cabe5d729ada7aae4908c7d81712694da020f6
                                                                                  • Instruction ID: f8fb33e7cd4100b3988f41e0e1e651547dcb786dfd36cb1c636b9c809eeacd5b
                                                                                  • Opcode Fuzzy Hash: 9a008d80399f3e89d90f0b38a5cabe5d729ada7aae4908c7d81712694da020f6
                                                                                  • Instruction Fuzzy Hash: 9AF0FEF294038C7AE7102765BC46FBB7A9CEB197D5F404031BA08E9192E7755C10A7A8
                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00F86BE6
                                                                                    • Part of subcall function 00F876C4: _memset.LIBCMT ref: 00F876F9
                                                                                  • _memmove.LIBCMT ref: 00F86C09
                                                                                  • _memset.LIBCMT ref: 00F86C16
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00F86C26
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 48991266-0
                                                                                  • Opcode ID: 7fcf097bc6a9777e2fb667a9710cf41139075f021e28b9f661cea20bf1a77e7c
                                                                                  • Instruction ID: dd2dfd54815b33b18dd565897bce7a07fc6e319676979d2d9465ed6250280466
                                                                                  • Opcode Fuzzy Hash: 7fcf097bc6a9777e2fb667a9710cf41139075f021e28b9f661cea20bf1a77e7c
                                                                                  • Instruction Fuzzy Hash: 6EF05E7A200204ABCF416F95DC85A8ABF69EF46360F048061FE085E227DB35E811EBB4
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000008), ref: 00F22231
                                                                                  • SetTextColor.GDI32(?,000000FF), ref: 00F2223B
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 00F22250
                                                                                  • GetStockObject.GDI32(00000005), ref: 00F22258
                                                                                  • GetWindowDC.USER32(?,00000000), ref: 00F5BE83
                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F5BE90
                                                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 00F5BEA9
                                                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 00F5BEC2
                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00F5BEE2
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00F5BEED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1946975507-0
                                                                                  • Opcode ID: 91459cb289d83475352bede458ec657f61dcb006510250dff2ebf38fa7e7e853
                                                                                  • Instruction ID: fcf416c15483a11843792679b811f9c0ca7946e3c84efb0b304b43a0086e454c
                                                                                  • Opcode Fuzzy Hash: 91459cb289d83475352bede458ec657f61dcb006510250dff2ebf38fa7e7e853
                                                                                  • Instruction Fuzzy Hash: 49E03071904148EBDB215FA4FC0D7D83F10EB06332F148366FA69880E187714588EB12
                                                                                  APIs
                                                                                  • GetCurrentThread.KERNEL32 ref: 00F7871B
                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F782E6), ref: 00F78722
                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F782E6), ref: 00F7872F
                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F782E6), ref: 00F78736
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                  • String ID:
                                                                                  • API String ID: 3974789173-0
                                                                                  • Opcode ID: 9e98b6379647f1937d9472a8b3fd499182d564380d60e70d100f5b377e3e4634
                                                                                  • Instruction ID: 12d688012bffb973fadc8000a726b0f05bbff3cef09cf6e7b379394e9ef356d8
                                                                                  • Opcode Fuzzy Hash: 9e98b6379647f1937d9472a8b3fd499182d564380d60e70d100f5b377e3e4634
                                                                                  • Instruction Fuzzy Hash: 01E086B6A513159BD7605FF05D0CB973BACEF527E1F14C828F24ACE040DA34844AE751
                                                                                  APIs
                                                                                  • OleSetContainedObject.OLE32(?,00000001), ref: 00F7B4BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ContainedObject
                                                                                  • String ID: AutoIt3GUI$Container
                                                                                  • API String ID: 3565006973-3941886329
                                                                                  • Opcode ID: 52a5c29a47f71654f5f3886b39ee2a6c2462bc230b279dae43758defe61bad30
                                                                                  • Instruction ID: e11afa76f646b71ff00eee4cd6b4aae7808c2eb8aa5ff53c4d4e37636637f102
                                                                                  • Opcode Fuzzy Hash: 52a5c29a47f71654f5f3886b39ee2a6c2462bc230b279dae43758defe61bad30
                                                                                  • Instruction Fuzzy Hash: 58916870600601AFDB54DF64C884B6ABBF5FF4A710F24856EF94ACB291DB70E841DB51
                                                                                  APIs
                                                                                    • Part of subcall function 00F3FC86: _wcscpy.LIBCMT ref: 00F3FCA9
                                                                                    • Part of subcall function 00F29837: __itow.LIBCMT ref: 00F29862
                                                                                    • Part of subcall function 00F29837: __swprintf.LIBCMT ref: 00F298AC
                                                                                  • __wcsnicmp.LIBCMT ref: 00F8B02D
                                                                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00F8B0F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                  • String ID: LPT
                                                                                  • API String ID: 3222508074-1350329615
                                                                                  • Opcode ID: 0f0c9ae992ea110aeebd76fcaa2a1a154b0f54f1f69a4c48b3848e20713e8388
                                                                                  • Instruction ID: 8aadade329dec86900b33a841ca57e50c4d8ce7fa7397c04e8f915e00c50cea3
                                                                                  • Opcode Fuzzy Hash: 0f0c9ae992ea110aeebd76fcaa2a1a154b0f54f1f69a4c48b3848e20713e8388
                                                                                  • Instruction Fuzzy Hash: 8761B072E00219AFCB14EF94C895EEEB7B4EF09310F044069F916AB391DB74AE44EB50
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000), ref: 00F32968
                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F32981
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                  • String ID: @
                                                                                  • API String ID: 2783356886-2766056989
                                                                                  • Opcode ID: 372d4f093b245179bc7aeedbb098c41d922f66b235b52076222e3a7e6f193a13
                                                                                  • Instruction ID: f428711ddffd397af76db80d8e31b8b837d91eee15e9d5a8f43a88e168e8655e
                                                                                  • Opcode Fuzzy Hash: 372d4f093b245179bc7aeedbb098c41d922f66b235b52076222e3a7e6f193a13
                                                                                  • Instruction Fuzzy Hash: 19518A714097589BD320EF50EC86BAFBBE8FF85350F82485DF2D8420A1DB709529DB66
                                                                                  APIs
                                                                                    • Part of subcall function 00F24F0B: __fread_nolock.LIBCMT ref: 00F24F29
                                                                                  • _wcscmp.LIBCMT ref: 00F89824
                                                                                  • _wcscmp.LIBCMT ref: 00F89837
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscmp$__fread_nolock
                                                                                  • String ID: FILE
                                                                                  • API String ID: 4029003684-3121273764
                                                                                  • Opcode ID: fc84b35c310b0fffa23840d2c50d71ed5a2276540518f818109bb64c7b3df5a8
                                                                                  • Instruction ID: c98260b2927bf764c949838eed86a5430a1d4ae0371ff6b7099d0b6f4ae30d9c
                                                                                  • Opcode Fuzzy Hash: fc84b35c310b0fffa23840d2c50d71ed5a2276540518f818109bb64c7b3df5a8
                                                                                  • Instruction Fuzzy Hash: F041D831A0421ABADF20AFA0DC45FEFBBBDDF85710F050069F904B7181DBB5A9049B61
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F9259E
                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F925D4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CrackInternet_memset
                                                                                  • String ID: |
                                                                                  • API String ID: 1413715105-2343686810
                                                                                  • Opcode ID: 139f343e4a606a46c9d6894ec57b4a6761b503cf5b7990caed941b0760745ea1
                                                                                  • Instruction ID: cf1762ebad982fee9c3f1c62aa9baf14d48a72e95aff4f6f936a0f9566f18c43
                                                                                  • Opcode Fuzzy Hash: 139f343e4a606a46c9d6894ec57b4a6761b503cf5b7990caed941b0760745ea1
                                                                                  • Instruction Fuzzy Hash: DE310871C00219ABDF41EFA5DC85EEEBFB8FF08350F100069F915A6162EB355956EB60
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00FA7B61
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FA7B76
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: '
                                                                                  • API String ID: 3850602802-1997036262
                                                                                  • Opcode ID: 9165e885baf4bbdb4c683de371f9895b93fa27cbe8648c219305d0dfa70cb75c
                                                                                  • Instruction ID: 78e42e2524e14b0f76d41c0d733c04649ad382a3a7724f00891bbdb5f1a95644
                                                                                  • Opcode Fuzzy Hash: 9165e885baf4bbdb4c683de371f9895b93fa27cbe8648c219305d0dfa70cb75c
                                                                                  • Instruction Fuzzy Hash: 2F4117B5A04309AFDB14DF65C880FEABBB5FB49340F10016AE904AB395D770AA51DFA0
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00FA6B17
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00FA6B53
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$DestroyMove
                                                                                  • String ID: static
                                                                                  • API String ID: 2139405536-2160076837
                                                                                  • Opcode ID: 91e607804ad8a57481c98f690b0fc81015a8510a8dff71583dd232c6cee85865
                                                                                  • Instruction ID: 22f891d54b7fbac7b4d97ad6f716570881912feb22b8cb5f27219a0ab128b697
                                                                                  • Opcode Fuzzy Hash: 91e607804ad8a57481c98f690b0fc81015a8510a8dff71583dd232c6cee85865
                                                                                  • Instruction Fuzzy Hash: 3F31A1B1500604AEDB109F74CC80BFB73B9FF89764F148619F9A5D7190DA34AC91E760
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F82911
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F8294C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoItemMenu_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 2223754486-4108050209
                                                                                  • Opcode ID: 2c7c22fba13131ba8c9535351514d2bea9735d9c9978013cc8d9ea728c14811a
                                                                                  • Instruction ID: d06fc5fbd8ef8c11e789febc5cc6f97ed7aaf5a849501a388ebedbe6e5960861
                                                                                  • Opcode Fuzzy Hash: 2c7c22fba13131ba8c9535351514d2bea9735d9c9978013cc8d9ea728c14811a
                                                                                  • Instruction Fuzzy Hash: D631C331E00305AFEB64EF58CD85BEEBBB4EF45360F140029ED85A61A1D774A944FB51
                                                                                  APIs
                                                                                  • __snwprintf.LIBCMT ref: 00F93A66
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: __snwprintf_memmove
                                                                                  • String ID: , $$AUTOITCALLVARIABLE%d
                                                                                  • API String ID: 3506404897-2584243854
                                                                                  • Opcode ID: f39c985652acf2756686d7f408c39f3d70ce8179b45aa8ec191fce08bd68112d
                                                                                  • Instruction ID: 32468f0e0d2b7453e6880ee07ce174cf8925748619f0ceebee80ca478ae873e7
                                                                                  • Opcode Fuzzy Hash: f39c985652acf2756686d7f408c39f3d70ce8179b45aa8ec191fce08bd68112d
                                                                                  • Instruction Fuzzy Hash: 9B21A235600229AFCF10FF64DC82EAE77B5EF44740F444455F455AB282DB38EA46EB62
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FA6761
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FA676C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Combobox
                                                                                  • API String ID: 3850602802-2096851135
                                                                                  • Opcode ID: ac922159dfc2021ead9bbd110953243c18419b417259d24cab01e29d941b6ad1
                                                                                  • Instruction ID: c7238f735d426bf97e051d419630b835b232a8489ad27ca241ce95ed44a93017
                                                                                  • Opcode Fuzzy Hash: ac922159dfc2021ead9bbd110953243c18419b417259d24cab01e29d941b6ad1
                                                                                  • Instruction Fuzzy Hash: E711C8B5710208AFEF11DF54CC80EBB376AEB45368F150125F914DB290DA75DC51A7A0
                                                                                  APIs
                                                                                    • Part of subcall function 00F21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F21D73
                                                                                    • Part of subcall function 00F21D35: GetStockObject.GDI32(00000011), ref: 00F21D87
                                                                                    • Part of subcall function 00F21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F21D91
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00FA6C71
                                                                                  • GetSysColor.USER32(00000012), ref: 00FA6C8B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                  • String ID: static
                                                                                  • API String ID: 1983116058-2160076837
                                                                                  • Opcode ID: 435eed3769b74d656f78f1875837fea522d5b58bd020d1699924f5122627260e
                                                                                  • Instruction ID: 2ea1328470bd3b3cfc9a25971b771206f34347340a6d814399d256b4fb7859d3
                                                                                  • Opcode Fuzzy Hash: 435eed3769b74d656f78f1875837fea522d5b58bd020d1699924f5122627260e
                                                                                  • Instruction Fuzzy Hash: AD2159B2910219AFDF05DFB8CC45AEA7BA9FB09315F044628F995D2250D635E850EB60
                                                                                  APIs
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00FA69A2
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00FA69B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                  • String ID: edit
                                                                                  • API String ID: 2978978980-2167791130
                                                                                  • Opcode ID: 31dc3973357741f12833f8cffca214a580395baa95be33e939bee93330f17377
                                                                                  • Instruction ID: ad8689c1ff0e860946345b14e5bd58a925a458d8e290e633c2aa8d78a2da7663
                                                                                  • Opcode Fuzzy Hash: 31dc3973357741f12833f8cffca214a580395baa95be33e939bee93330f17377
                                                                                  • Instruction Fuzzy Hash: E5116AB1910208AFEB108E64DC44AEB37A9EB0A3B8F544728F9A5D61E0C735DC55BB60
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00F82A22
                                                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00F82A41
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoItemMenu_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 2223754486-4108050209
                                                                                  • Opcode ID: 935e6e9b0842f2a0cf3216872fd93aa887f30025bb4134e2a8589fc272c78970
                                                                                  • Instruction ID: cd0897f72cc132fde1992fc0d8d65f27a3d8071e4b3d9532d03ceea4eab2c855
                                                                                  • Opcode Fuzzy Hash: 935e6e9b0842f2a0cf3216872fd93aa887f30025bb4134e2a8589fc272c78970
                                                                                  • Instruction Fuzzy Hash: 0F11D336D01118ABCF78EB98DD44BDA77B8AF46724F044021E855EB2A0D738BD0AE791
                                                                                  APIs
                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F9222C
                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F92255
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$OpenOption
                                                                                  • String ID: <local>
                                                                                  • API String ID: 942729171-4266983199
                                                                                  • Opcode ID: 70233fd2bac1e343e64a27e400ab7d06d1f2d3fe693e59ad5d830616ff132a34
                                                                                  • Instruction ID: 51d0d52a65574606388728329089215442ca2abfb71510f32761a922a243c08d
                                                                                  • Opcode Fuzzy Hash: 70233fd2bac1e343e64a27e400ab7d06d1f2d3fe693e59ad5d830616ff132a34
                                                                                  • Instruction Fuzzy Hash: 5611E070941225BAFF288F518C84FFBFBA8FF06761F10822AF90486000D3706994E6F0
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F78E73
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: 5c00405fdeb6e0c4ee7e12b3903f11b648bcc1a8517bb688b35414338c7618ea
                                                                                  • Instruction ID: b017bec39190b0fd842eaaa62994920bf69bf90a78e8ea83a03554dbe81951ac
                                                                                  • Opcode Fuzzy Hash: 5c00405fdeb6e0c4ee7e12b3903f11b648bcc1a8517bb688b35414338c7618ea
                                                                                  • Instruction Fuzzy Hash: 7401F571A41228AB9B14FBE0CC45DFE7369AF02360B14461AF825573D1EF39580CF651
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F78D6B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: 441af9fad9b28490340004b690b85fe3b3fdc52ff97c7c99f2c5f7ef79f354f3
                                                                                  • Instruction ID: 1ffcd0f82d0d9da9c1798024d58b5351a47b9bb4661e1a0d766b341207af0770
                                                                                  • Opcode Fuzzy Hash: 441af9fad9b28490340004b690b85fe3b3fdc52ff97c7c99f2c5f7ef79f354f3
                                                                                  • Instruction Fuzzy Hash: 9301D471A81218ABDB24EBA0CD56EFE77A89F15350F14401AB809672D1DE299E0CF272
                                                                                  APIs
                                                                                    • Part of subcall function 00F27DE1: _memmove.LIBCMT ref: 00F27E22
                                                                                    • Part of subcall function 00F7AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F7AABC
                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F78DEE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: d5edc45daec323cda68719c8cbefe8e3197be9e35e5af839ade4bb565e30aee9
                                                                                  • Instruction ID: ec30f22c39b1c46933ca5cbffbc52470c53ca8a5473cce41fd235e90ec78ab19
                                                                                  • Opcode Fuzzy Hash: d5edc45daec323cda68719c8cbefe8e3197be9e35e5af839ade4bb565e30aee9
                                                                                  • Instruction Fuzzy Hash: EC01F771A81218A7DB25F6A4CD46EFE77AC8F11350F144016B809A7291DE298E0DF272
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName_wcscmp
                                                                                  • String ID: #32770
                                                                                  • API String ID: 2292705959-463685578
                                                                                  • Opcode ID: cc35604a18ae65b88634747aceeeeab9fccc5ae25283a99a1c6e25045744b411
                                                                                  • Instruction ID: 5054bdfdb5f700a99b6639ca852c64f35216b05a362f669a3ee1a4d30641a44f
                                                                                  • Opcode Fuzzy Hash: cc35604a18ae65b88634747aceeeeab9fccc5ae25283a99a1c6e25045744b411
                                                                                  • Instruction Fuzzy Hash: C9E06832A0032D2BD320AB99AC49FA7FBACEB51B70F04002BFD00D7040D960AA4587E0
                                                                                  APIs
                                                                                    • Part of subcall function 00F5B314: _memset.LIBCMT ref: 00F5B321
                                                                                    • Part of subcall function 00F40940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F5B2F0,?,?,?,00F2100A), ref: 00F40945
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00F2100A), ref: 00F5B2F4
                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F2100A), ref: 00F5B303
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F5B2FE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 3158253471-631824599
                                                                                  • Opcode ID: 5574d31519d4ca6b1a2a8cadd922a2766eb4abe255c0c911892c9375ae22e8fe
                                                                                  • Instruction ID: 9d347de130d0389af628c6427adaf7f07f708861833d19762c915d152a37a7cf
                                                                                  • Opcode Fuzzy Hash: 5574d31519d4ca6b1a2a8cadd922a2766eb4abe255c0c911892c9375ae22e8fe
                                                                                  • Instruction Fuzzy Hash: 8DE092B02007158FD760DF68E9047427BE4EF00715F008A6CE956DB342EBB4D448EBA1
                                                                                  APIs
                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F77C82
                                                                                    • Part of subcall function 00F43358: _doexit.LIBCMT ref: 00F43362
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message_doexit
                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                  • API String ID: 1993061046-4017498283
                                                                                  • Opcode ID: ff542eada9ef2660cf39e854144c122298b3e14873823b2a8b14e3a44b062e06
                                                                                  • Instruction ID: 075425a44b7272d2daea54be9fac87f8a1d31a12a2671616d64398827df8f02b
                                                                                  • Opcode Fuzzy Hash: ff542eada9ef2660cf39e854144c122298b3e14873823b2a8b14e3a44b062e06
                                                                                  • Instruction Fuzzy Hash: D3D05B323C431C36D21532A5BD07FDA7D484F05B52F044426FF085D5D34DD9959071E6
                                                                                  APIs
                                                                                  • GetSystemDirectoryW.KERNEL32(?), ref: 00F61775
                                                                                    • Part of subcall function 00F9BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00F6195E,?), ref: 00F9BFFE
                                                                                    • Part of subcall function 00F9BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00F9C010
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00F6196D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                  • String ID: WIN_XPe
                                                                                  • API String ID: 582185067-3257408948
                                                                                  • Opcode ID: 7343b9a499ebc5560a5470422e03ae11c3fcf4725392eab9c6efbbd9c540ced4
                                                                                  • Instruction ID: 0540debe6e351a96cc09cb35009087f7cd96a56899726ec26ce9fa1ff727714c
                                                                                  • Opcode Fuzzy Hash: 7343b9a499ebc5560a5470422e03ae11c3fcf4725392eab9c6efbbd9c540ced4
                                                                                  • Instruction Fuzzy Hash: 72F0C9B180010DDFDB15DB91D984BECBBF8BB18315F580095E102A6090D7755F88FF60
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FA59AE
                                                                                  • PostMessageW.USER32(00000000), ref: 00FA59B5
                                                                                    • Part of subcall function 00F85244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F852BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: 959d3d1afb512361c852601c075550cb55da1e9127d6b158421fe602d83a3892
                                                                                  • Instruction ID: 8218e44e0ca78a40d109cdb05cae1681187d75fa87205999750b5bbf0e88950a
                                                                                  • Opcode Fuzzy Hash: 959d3d1afb512361c852601c075550cb55da1e9127d6b158421fe602d83a3892
                                                                                  • Instruction Fuzzy Hash: BDD0C9767803157BE664BBB0AC4BFD67A55AB05B50F080825B246AE2D4C9E4A804D654
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FA596E
                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FA5981
                                                                                    • Part of subcall function 00F85244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F852BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2119463439.0000000000F21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F20000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2119445657.0000000000F20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FAF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119511056.0000000000FD4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119552836.0000000000FDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2119566889.0000000000FE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_f20000_RFQ.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: 5ed811fa8f800e6bd52fe94259fe80052bb6b9a8c600ffd7f0e31595f498a7f6
                                                                                  • Instruction ID: da5bf8246804ad15c161e55766bc7ef61dcaacec9a07aae0ece8a0d77f3490fd
                                                                                  • Opcode Fuzzy Hash: 5ed811fa8f800e6bd52fe94259fe80052bb6b9a8c600ffd7f0e31595f498a7f6
                                                                                  • Instruction Fuzzy Hash: C8D0C976784315BBE664BBB0AC4BFD67A55AB01B50F080825B24AAE2D4C9E49804D654