Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
W7ZBbzV7A5.exe

Overview

General Information

Sample name:W7ZBbzV7A5.exe
renamed because original name is a hash value
Original sample name:0064e7befb41f52b9f050e06bd6bbeecfbdfaf18d3fbd3ab3678417a8a82a462.exe
Analysis ID:1571791
MD5:fdf35b2e3e30f50b6cff5c52e12cd613
SHA1:cc10e3aead57db26ae8a15b4ae881a1715ba9a29
SHA256:0064e7befb41f52b9f050e06bd6bbeecfbdfaf18d3fbd3ab3678417a8a82a462
Tags:185-215-113-17exeRedLineStealeruser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Evader
AI detected suspicious sample
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Sample or dropped binary is a compiled AutoHotkey binary
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect sandboxes (foreground window change detection)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Yara signature match

Classification

  • System is w10x64
  • W7ZBbzV7A5.exe (PID: 7736 cmdline: "C:\Users\user\Desktop\W7ZBbzV7A5.exe" MD5: FDF35B2E3E30F50B6CFF5C52E12CD613)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_EvaderYara detected EvaderJoe Security
    00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_EvaderYara detected EvaderJoe Security
      00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EvaderYara detected EvaderJoe Security
        00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0xe08:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        0.2.W7ZBbzV7A5.exe.400000.0.unpackJoeSecurity_EvaderYara detected EvaderJoe Security
          0.2.W7ZBbzV7A5.exe.400000.0.unpackMALWARE_Win_RedLineDropperAHKDetects AutoIt/AutoHotKey executables dropping RedLine infostealerditekSHen
          • 0xcc4cb:$s1: .SetRequestHeader("User-Agent"," ( " OSName " | " bit " | " CPUNAme ""
          • 0xcbde5:$s2: := " | Windows Defender"
          • 0xabda8:$s3: WindowSpy.ahk
          • 0xabe02:$s3: WindowSpy.ahk
          • 0xa70d0:$s4: >AUTOHOTKEY SCRIPT<
          • 0xc7032:$s4: >AUTOHOTKEY SCRIPT<
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-09T17:45:13.813721+010020283713Unknown Traffic192.168.2.949732104.26.3.46443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-09T17:45:14.619063+010020301631Malware Command and Control Activity Detected192.168.2.949732104.26.3.46443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: W7ZBbzV7A5.exeAvira: detected
          Source: W7ZBbzV7A5.exeReversingLabs: Detection: 96%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: W7ZBbzV7A5.exeJoe Sandbox ML: detected

          Compliance

          barindex
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeUnpacked PE file: 0.2.W7ZBbzV7A5.exe.400000.0.unpack
          Source: W7ZBbzV7A5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
          Source: unknownHTTPS traffic detected: 104.26.3.46:443 -> 192.168.2.9:49732 version: TLS 1.2
          Source: Binary string: C:\dagomoxi_helefacejapi\kol\vujixemag\zapotesahus.pdb source: W7ZBbzV7A5.exe
          Source: Binary string: "C:\dagomoxi_helefacejapi\kol\vujixemag\zapotesahus.pdb source: W7ZBbzV7A5.exe
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004770E0 FindFirstFileW,FindClose,GetFileAttributesW,0_2_004770E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00477170 _wcschr,_wcschr,_wcschr,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_00477170
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00444070 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,0_2_00444070
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004443B0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_004443B0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004558D0 GetFullPathNameW,GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,_wcsrchr,_wcsrchr,_wcsncpy,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,FindNextFileW,FindClose,0_2_004558D0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00472A90 FindFirstFileW,FindClose,GetFileAttributesW,CreateFileW,WriteFile,WriteFile,WriteFile,CloseHandle,0_2_00472A90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00454C60 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00454C60
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00443D90 FindFirstFileW,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_00443D90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00455E40 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00455E40
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0042DF00 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,__wcstoi64,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_0042DF00
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02187330 FindFirstFileW,FindClose,GetFileAttributesW,0_2_02187330
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021873C0 _wcschr,_wcschr,_wcschr,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_021873C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02154600 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_02154600
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02164EB0 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,CoInitialize,CoCreateInstance,CoUninitialize,0_2_02164EB0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02182CE0 FindFirstFileW,FindClose,GetFileAttributesW,CreateFileW,CloseHandle,0_2_02182CE0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030163 - Severity 1 - ET MALWARE AutoHotkey Downloader Checkin via IPLogger : 192.168.2.9:49732 -> 104.26.3.46:443
          Source: Joe Sandbox ViewIP Address: 104.26.3.46 104.26.3.46
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: unknownDNS query: name: iplogger.org
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49732 -> 104.26.3.46:443
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004545D0 __wcstoi64,InternetOpenW,InternetOpenUrlW,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,InternetReadFile,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,InternetReadFile,InternetReadFileExA,InternetReadFileExA,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,InternetReadFileExA,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,DeleteFileW,0_2_004545D0
          Source: global trafficHTTP traffic detected: GET /1jhxh7 HTTP/1.1Cache-Control: no-cache, no-storeConnection: Keep-AlivePragma: no-cacheAccept: */*If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMTUser-Agent: ( Windows 10 Enterprise | x64 | Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz | Windows Defender | Chrome )Host: iplogger.org
          Source: global trafficDNS traffic detected: DNS query: iplogger.org
          Source: global trafficDNS traffic detected: DNS query: nailedpizza.top
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000649000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/C
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.000000000295E000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exe
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exe%
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.000000000295E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exe:
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exeL
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exeW
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627673551.00000000023B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exeedspolishpp.exe?
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nailedpizza.top/bestof/mixx.exev
          Source: W7ZBbzV7A5.exe, W7ZBbzV7A5.exe, 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.00000000021E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://autohotkey.com
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.00000000021E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://autohotkey.comCould
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627279381.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.org/
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627673551.00000000023B0000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://iplogger.org/1jhxh7
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627279381.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.org/1jhxh78
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.org:443/1jhxh7v
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownHTTPS traffic detected: 104.26.3.46:443 -> 192.168.2.9:49732 version: TLS 1.2

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00409200 SetWindowsHookExW 0000000D,Function_00004BF0,00400000,000000000_2_00409200
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00404990 GetTickCount,GetTickCount,OpenClipboard,OpenClipboard,GetTickCount,OpenClipboard,0_2_00404990
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00479220 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,0_2_00479220
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004046C0 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,0_2_004046C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02114910 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalFree,CloseClipboard,SetClipboardData,CloseClipboard,0_2_02114910
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02189470 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,0_2_02189470
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00404890 GetClipboardFormatNameW,__wcsnicmp,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,GetClipboardData,0_2_00404890
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043A490 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,SelectObject,DeleteDC,DeleteObject,_free,GetPixel,ReleaseDC,0_2_0043A490
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040F250 __wcsnicmp,__wcsnicmp,GetWindowThreadProcessId,AttachThreadInput,GetKeyboardLayout,GetTickCount,GetCurrentThreadId,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetTickCount,BlockInput,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,__wcsnicmp,_wcschr,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsicoll,PostMessageW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,__wcsnicmp,__wcsnicmp,__fassign,PostMessageW,PostMessageW,PostMessageW,__itow,PostMessageW,_free,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,BlockInput,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040F250
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004013F4 GlobalUnlock,CloseClipboard,SetTimer,GetTickCount,GetTickCount,GetMessageW,GetTickCount,GetFocus,TranslateAcceleratorW,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,IsDialogMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,KillTimer,DragQueryFileW,DragFinish,GetTickCount,DragFinish,DragFinish,_wcsncpy,_wcsncpy,GetTickCount,_wcsncpy,GetTickCount,IsDialogMessageW,SetCurrentDirectoryW,TranslateAcceleratorW,TranslateMessage,DispatchMessageW,0_2_004013F4
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040F250 __wcsnicmp,__wcsnicmp,GetWindowThreadProcessId,AttachThreadInput,GetKeyboardLayout,GetTickCount,GetCurrentThreadId,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetTickCount,BlockInput,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,__wcsnicmp,_wcschr,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsicoll,PostMessageW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,__wcsnicmp,__wcsnicmp,__fassign,PostMessageW,PostMessageW,PostMessageW,__itow,PostMessageW,_free,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,BlockInput,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040F250
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040F686 GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,BlockInput,0_2_0040F686
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00412B00 GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetKeyState,0_2_00412B00

          System Summary

          barindex
          Source: 0.2.W7ZBbzV7A5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AutoIt/AutoHotKey executables dropping RedLine infostealer Author: ditekSHen
          Source: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
          Source: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeWindow found: window name: AutoHotkeyJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0214B9D0 RegisterClipboardFormatW,ShowWindow,MoveWindow,GetSysColor,SetBkColor,SetTextColor,GetSysColorBrush,CreateCompatibleDC,SelectObject,BitBlt,SelectObject,DeleteDC,DrawIconEx,ExcludeClipRect,CreateRectRgn,GetClipRgn,GetSysColorBrush,FillRgn,DeleteObject,GetClipBox,FillRect,GetClientRect,MoveWindow,MoveWindow,MoveWindow,InvalidateRect,ShowWindow,GetMenu,CheckMenuItem,NtdllDefWindowProc_W,SendMessageTimeoutW,PostMessageW,PostMessageW,SendMessageTimeoutW,0_2_0214B9D0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021785C0 _memset,DragQueryPoint,ClientToScreen,EnumChildWindows,GetDlgCtrlID,PostMessageW,DragFinish,PostMessageW,NtdllDialogWndProc_W,0_2_021785C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00440560: CreateFileW,DeviceIoControl,CloseHandle,0_2_00440560
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00455EB0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00455EB0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004013F40_2_004013F4
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004081400_2_00408140
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004201C00_2_004201C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040F2500_2_0040F250
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004422600_2_00442260
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004922620_2_00492262
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0048E2B00_2_0048E2B0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004183E00_2_004183E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004824050_2_00482405
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0041C4300_2_0041C430
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043A4900_2_0043A490
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0048949E0_2_0048949E
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040C5300_2_0040C530
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0049D58D0_2_0049D58D
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004826750_2_00482675
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004846200_2_00484620
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004966C50_2_004966C5
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004996AF0_2_004996AF
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040D7700_2_0040D770
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004147F10_2_004147F1
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004147F00_2_004147F0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00432AC00_2_00432AC0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00481AFB0_2_00481AFB
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00475BB00_2_00475BB0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00499C000_2_00499C00
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0049ECD00_2_0049ECD0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0049AD4C0_2_0049AD4C
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0045FE300_2_0045FE30
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0049CEB10_2_0049CEB1
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00447F400_2_00447F40
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040BF100_2_0040BF10
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0047EF100_2_0047EF10
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00404F200_2_00404F20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0042EF900_2_0042EF90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02124A400_2_02124A40
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02124A410_2_02124A41
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021948700_2_02194870
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A98FF0_2_021A98FF
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021AD1010_2_021AD101
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0211D9C00_2_0211D9C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02185E000_2_02185E00
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A9E500_2_021A9E50
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0214A6E00_2_0214A6E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021AAF9C0_2_021AAF9C
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021304100_2_02130410
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02169C100_2_02169C10
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A24B20_2_021A24B2
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0219E5000_2_0219E500
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 00476360 appears 73 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 00430370 appears 78 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 0049AF30 appears 44 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 00430620 appears 262 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 0048FE1D appears 53 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 0048FC19 appears 346 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 00476400 appears 50 times
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: String function: 00494550 appears 33 times
          Source: W7ZBbzV7A5.exe, 00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs W7ZBbzV7A5.exe
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs W7ZBbzV7A5.exe
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs W7ZBbzV7A5.exe
          Source: W7ZBbzV7A5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.W7ZBbzV7A5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLineDropperAHK author = ditekSHen, description = Detects AutoIt/AutoHotKey executables dropping RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLineDropper-AHK
          Source: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
          Source: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
          Source: W7ZBbzV7A5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.spyw.evad.winEXE@1/0@2/1
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00431310 __wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,_memset,CreateProcessW,CloseHandle,CloseHandle,GetLastError,_memset,__wcsicoll,_wcschr,SetCurrentDirectoryW,_wcschr,_wcschr,GetFileAttributesW,_wcschr,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetLastError,FormatMessageW,0_2_00431310
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00455EB0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00455EB0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00440200 _wcsncpy,GetDiskFreeSpaceExW,0_2_00440200
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004560C0 CreateToolhelp32Snapshot,Process32FirstW,__wcstoi64,Process32NextW,__wsplitpath,__wcsicoll,Process32NextW,CloseHandle,CloseHandle,CloseHandle,0_2_004560C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00456430 CLSIDFromString,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoCreateInstance,0_2_00456430
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004781C0 SystemParametersInfoW,LoadLibraryExW,EnumResourceNamesW,FindResourceW,LoadResource,LockResource,GetSystemMetrics,FindResourceW,LoadResource,LockResource,SizeofResource,CreateIconFromResourceEx,FreeLibrary,ExtractIconW,ExtractIconW,0_2_004781C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeFile created: C:\Users\user\AppData\Roaming\nailedpJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: /restart0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: /force0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: /ErrorStdOut0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: A_Args0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: A_Args0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: AutoHotkey0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: AutoHotkey0_2_00403D20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCommand line argument: Clipboard0_2_00403D20
          Source: W7ZBbzV7A5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: W7ZBbzV7A5.exeReversingLabs: Detection: 96%
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: msvcr100.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: winhttpcom.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
          Source: W7ZBbzV7A5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\dagomoxi_helefacejapi\kol\vujixemag\zapotesahus.pdb source: W7ZBbzV7A5.exe
          Source: Binary string: "C:\dagomoxi_helefacejapi\kol\vujixemag\zapotesahus.pdb source: W7ZBbzV7A5.exe

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeUnpacked PE file: 0.2.W7ZBbzV7A5.exe.400000.0.unpack
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0046A020 LoadLibraryW,GetProcAddress,FreeLibrary,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetSysColor,SendMessageW,0_2_0046A020
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00494595 push ecx; ret 0_2_004945A8
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0056F627 push ecx; ret 0_2_0056F628
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_005718D2 push edx; ret 0_2_005718ED
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0056E9E3 push es; ret 0_2_0056EA12
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0211CEC4 push esi; retf 0040h0_2_0211CEC5
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A47E5 push ecx; ret 0_2_021A47F8
          Source: W7ZBbzV7A5.exeStatic PE information: section name: .text entropy: 7.830965994043891
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004630C0 GetWindowLongW,GetWindowLongW,GetWindowLongW,__wcsnicmp,__wcsnicmp,__wcsicoll,SetWindowPos,__wcsicoll,__wcsicoll,__wcsnicmp,__wcsicoll,__wcsicoll,__wcsicoll,EnableWindow,__wcsnicmp,__wcsnicmp,__wcsicoll,__wcsicoll,__wcsicoll,__wcsnicmp,MulDiv,MulDiv,__wcsnicmp,MulDiv,MulDiv,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcstoi64,IsWindow,SetParent,SetWindowLongW,SetParent,IsWindowVisible,IsIconic,SetWindowLongW,SetWindowLongW,SetWindowPos,InvalidateRect,0_2_004630C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0047A090 GetForegroundWindow,IsWindowVisible,IsIconic,ShowWindow,0_2_0047A090
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0047A1D0 GetWindowThreadProcessId,GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,SetForegroundWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,BringWindowToTop,0_2_0047A1D0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00439180 GetForegroundWindow,IsWindowVisible,GetWindowThreadProcessId,IsZoomed,IsIconic,GetWindowLongW,GetModuleHandleW,GetProcAddress,0_2_00439180
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0046A240 SendMessageW,SendMessageW,SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,PtInRect,SetFocus,SendMessageW,SendMessageW,ShowWindow,SetFocus,InvalidateRect,InvalidateRect,InvalidateRect,MapWindowPoints,InvalidateRect,0_2_0046A240
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004663F0 SetWindowTextW,IsZoomed,IsIconic,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,MulDiv,MulDiv,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,GetWindowLongW,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongW,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetWindowRect,GetClientRect,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,GetDlgCtrlID,SetFocus,0_2_004663F0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004663F0 SetWindowTextW,IsZoomed,IsIconic,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,MulDiv,MulDiv,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,GetWindowLongW,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongW,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetWindowRect,GetClientRect,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,GetDlgCtrlID,SetFocus,0_2_004663F0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043D4F0 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,EnumChildWindows,_memset,EnumChildWindows,GetClassNameW,EnumChildWindows,0_2_0043D4F0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043A490 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,SelectObject,DeleteDC,DeleteObject,_free,GetPixel,ReleaseDC,0_2_0043A490
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043C660 SendMessageW,SendMessageW,SendMessageW,IsWindowVisible,ShowWindow,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageW,0_2_0043C660
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00477760 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_00477760
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004777C0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_004777C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0043ACA0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,_wcsrchr,__wcsicoll,__wcsicoll,__wcsicoll,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,__wcsnicmp,__fassign,__wcsnicmp,_wcsncpy,__fassign,__fassign,__fassign,__fassign,GetDC,DestroyIcon,DeleteObject,DeleteObject,GetIconInfo,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,_free,_free,_free,0_2_0043ACA0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00452E00 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCW,GetDC,GetPixel,DeleteDC,ReleaseDC,0_2_00452E00
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0045FE30 MulDiv,MulDiv,MulDiv,_wcschr,__wcsicoll,MulDiv,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,_wcschr,DrawTextW,DrawTextW,GetCharABCWidthsW,MulDiv,GetSystemMetrics,GetSystemMetrics,MulDiv,MulDiv,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetWindowLongW,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,CreateWindowExW,CreateWindowExW,CreateWindowExW,CreateWindowExW,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,CreateWindowExW,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,MulDiv,MulDiv,MulDiv,MoveWindow,SelectObject,ReleaseDC,SendMessageW,SendMessageW,GetClientRect,SetWindowLongW,SendMessageW,SetWindowLongW,MoveWindow,GetWindowRect,SendMessageW,SetWindowPos,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,MapWindowPoints,0_2_0045FE30
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02187A10 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_02187A10
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021879B0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_021879B0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0214AEF0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,_wcsrchr,__wcsicoll,__wcsicoll,__wcsicoll,__wcsnicmp,__fassign,__wcsnicmp,_wcsncpy,__fassign,__fassign,__fassign,__fassign,GetDC,DestroyCursor,DeleteObject,GetIconInfo,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,_free,_free,_free,0_2_0214AEF0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0214A6E0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,SelectObject,DeleteDC,DeleteObject,_free,GetPixel,ReleaseDC,0_2_0214A6E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0214D740 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,_memset,GetClassNameW,0_2_0214D740
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0218A420 GetForegroundWindow,IsIconic,ShowWindow,AttachThreadInput,AttachThreadInput,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,BringWindowToTop,0_2_0218A420
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0217A490 GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,SetFocus,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,0_2_0217A490
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: SetTimer,GetMessageW,GetFocus,TranslateAcceleratorW,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,GetFocus,GetClassNameW,__wcsicoll,__wcsicoll,PeekMessageW,Sleep,Sleep,Sleep,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,IsDialogMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,KillTimer,GetTickCount,DragFinish,DragFinish,GetTickCount,_wcsncpy,GetTickCount,IsDialogMessageW,SetCurrentDirectoryW,TranslateAcceleratorW,TranslateMessage,DispatchMessageW,0_2_021116EB
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeWindow / User API: foregroundWindowGot 891Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeAPI coverage: 1.8 %
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00413B80 GetKeyboardLayout followed by cmp: cmp al, 19h and CTI: ja 00413C6Fh country: Russian (ru)0_2_00413B80
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00406DD0 GetKeyboardLayout followed by cmp: cmp dword ptr [004cc1fch], ebx and CTI: je 00406F90h0_2_00406DD0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02117020 GetKeyboardLayout followed by cmp: cmp dword ptr [004cc1fch], ebx and CTI: je 021171E0h0_2_02117020
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02123DD0 GetKeyboardLayout followed by cmp: cmp al, 19h and CTI: ja 02123EBFh country: Russian (ru)0_2_02123DD0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004770E0 FindFirstFileW,FindClose,GetFileAttributesW,0_2_004770E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00477170 _wcschr,_wcschr,_wcschr,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_00477170
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00444070 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,0_2_00444070
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004443B0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_004443B0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004558D0 GetFullPathNameW,GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,_wcsrchr,_wcsrchr,_wcsncpy,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,FindNextFileW,FindClose,0_2_004558D0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00472A90 FindFirstFileW,FindClose,GetFileAttributesW,CreateFileW,WriteFile,WriteFile,WriteFile,CloseHandle,0_2_00472A90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00454C60 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00454C60
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00443D90 FindFirstFileW,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_00443D90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00455E40 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00455E40
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0042DF00 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,__wcstoi64,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_0042DF00
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02187330 FindFirstFileW,FindClose,GetFileAttributesW,0_2_02187330
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021873C0 _wcschr,_wcschr,_wcschr,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_021873C0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02154600 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_02154600
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02164EB0 _wcschr,_wcschr,GetFileAttributesW,FindFirstFileW,FindClose,CoInitialize,CoCreateInstance,CoUninitialize,0_2_02164EB0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02182CE0 FindFirstFileW,FindClose,GetFileAttributesW,CreateFileW,CloseHandle,0_2_02182CE0
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627279381.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1480525173.0000000000649000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000649000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0040F250 __wcsnicmp,__wcsnicmp,GetWindowThreadProcessId,AttachThreadInput,GetKeyboardLayout,GetTickCount,GetCurrentThreadId,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetTickCount,BlockInput,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,__wcsnicmp,_wcschr,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsnicmp,__wcsicoll,PostMessageW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,__wcsnicmp,__wcsnicmp,__fassign,PostMessageW,PostMessageW,PostMessageW,__itow,PostMessageW,_free,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,BlockInput,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040F250
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004966B6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004966B6
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0046A020 LoadLibraryW,GetProcAddress,FreeLibrary,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetSysColor,SendMessageW,0_2_0046A020
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0056C713 push dword ptr fs:[00000030h]0_2_0056C713
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0211092B mov eax, dword ptr fs:[00000030h]0_2_0211092B
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_02110D90 mov eax, dword ptr fs:[00000030h]0_2_02110D90
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_0049C54E __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0049C54E
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004981F2 SetUnhandledExceptionFilter,0_2_004981F2
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004966B6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004966B6
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00493AA5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00493AA5
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A6906 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_021A6906
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_021A3CF5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021A3CF5
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00431310 __wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,_memset,CreateProcessW,CloseHandle,CloseHandle,GetLastError,_memset,__wcsicoll,_wcschr,SetCurrentDirectoryW,_wcschr,_wcschr,GetFileAttributesW,_wcschr,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetLastError,FormatMessageW,0_2_00431310
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00412300 keybd_event,0_2_00412300
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004122A0 mouse_event,0_2_004122A0
          Source: W7ZBbzV7A5.exeBinary or memory string: Program Manager
          Source: W7ZBbzV7A5.exeBinary or memory string: Shell_TrayWnd
          Source: W7ZBbzV7A5.exeBinary or memory string: Progman
          Source: W7ZBbzV7A5.exe, 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowDwmGetWindowAttributedwmapi.dllahk_idpidgroup%s%uProgram ManagerProgmanWorkerWError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory

          Language, Device and Operating System Detection

          barindex
          Source: Yara matchFile source: 0.2.W7ZBbzV7A5.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: W7ZBbzV7A5.exe PID: 7736, type: MEMORYSTR
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004760E0 SystemTimeToFileTime,SystemTimeToFileTime,GetSystemTimeAsFileTime,FileTimeToLocalFileTime,SystemTimeToFileTime,GetSystemTimeAsFileTime,FileTimeToLocalFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_004760E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00445C20 GetComputerNameW,GetUserNameW,0_2_00445C20
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00414971 GetModuleHandleW,GetProcAddress,GetVersionExW,__snwprintf,0_2_00414971
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: W7ZBbzV7A5.exeBinary or memory string: WIN_XP
          Source: W7ZBbzV7A5.exe, 00000000.00000003.1438415452.00000000021E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle1.1.33.02\AutoHotkey.exeWIN32_NTWIN_8.1WIN_8WIN_7WIN_VISTAWIN_XPWIN_2003WIN_2000%04hX0x%Ix*pPIntStrPtrShortInt64DoubleAStrWStrgdi32comctl32kernel32W-3-4CDecl-2This DllCall requires a prior VarSetCapacity.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fCcFfSelectVisCenterUniDescLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfoGetProcessImageFileNameWpsapi
          Source: W7ZBbzV7A5.exeBinary or memory string: WIN_VISTA
          Source: W7ZBbzV7A5.exeBinary or memory string: WIN_7
          Source: W7ZBbzV7A5.exeBinary or memory string: WIN_8
          Source: W7ZBbzV7A5.exeBinary or memory string: WIN_8.1
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_004175E0 AddClipboardFormatListener,PostMessageW,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,0_2_004175E0
          Source: C:\Users\user\Desktop\W7ZBbzV7A5.exeCode function: 0_2_00416D40 Shell_NotifyIconW,DeleteObject,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,DeleteObject,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,RemoveClipboardFormatListener,ChangeClipboardChain,mciSendStringW,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,_free,_free,_free,0_2_00416D40
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          121
          Input Capture
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol1
          Screen Capture
          11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          Access Token Manipulation
          3
          Obfuscated Files or Information
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin Shares121
          Input Capture
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          Process Injection
          12
          Software Packing
          NTDS25
          System Information Discovery
          Distributed Component Object Model3
          Clipboard Data
          3
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets31
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Masquerading
          Cached Domain Credentials2
          Process Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSync11
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Process Injection
          Proc Filesystem1
          System Owner/User Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
          System Network Configuration Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          W7ZBbzV7A5.exe96%ReversingLabsWin32.Trojan.AZORult
          W7ZBbzV7A5.exe100%AviraTR/Crypt.ZPACK.Gen
          W7ZBbzV7A5.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://nailedpizza.top/bestof/mixx.exeedspolishpp.exe?0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exe%0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exeW0%Avira URL Cloudsafe
          http://nailedpizza.top/0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exe0%Avira URL Cloudsafe
          http://nailedpizza.top/C0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exev0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exeL0%Avira URL Cloudsafe
          http://nailedpizza.top/bestof/mixx.exe:0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          iplogger.org
          104.26.3.46
          truefalse
            high
            s-part-0035.t-0009.t-msedge.net
            13.107.246.63
            truefalse
              high
              nailedpizza.top
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://iplogger.org/1jhxh7false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nailedpizza.top/bestof/mixx.exeedspolishpp.exe?W7ZBbzV7A5.exe, 00000000.00000002.2627673551.00000000023B0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nailedpizza.top/bestof/mixx.exeWW7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://autohotkey.comW7ZBbzV7A5.exe, W7ZBbzV7A5.exe, 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.00000000021E0000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    http://nailedpizza.top/bestof/mixx.exevW7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nailedpizza.top/bestof/mixx.exe:W7ZBbzV7A5.exe, 00000000.00000002.2627841624.000000000295E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nailedpizza.top/W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000649000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nailedpizza.top/bestof/mixx.exeW7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627841624.000000000295E000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nailedpizza.top/CW7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://iplogger.org/W7ZBbzV7A5.exe, 00000000.00000002.2627279381.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000613000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://iplogger.org:443/1jhxh7vW7ZBbzV7A5.exe, 00000000.00000002.2627279381.0000000000613000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://nailedpizza.top/bestof/mixx.exe%W7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002920000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nailedpizza.top/bestof/mixx.exeLW7ZBbzV7A5.exe, 00000000.00000002.2627841624.0000000002950000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://autohotkey.comCouldW7ZBbzV7A5.exe, 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, W7ZBbzV7A5.exe, 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, W7ZBbzV7A5.exe, 00000000.00000003.1438415452.00000000021E0000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          https://iplogger.org/1jhxh78W7ZBbzV7A5.exe, 00000000.00000002.2627279381.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.26.3.46
                            iplogger.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1571791
                            Start date and time:2024-12-09 17:44:08 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 5s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:W7ZBbzV7A5.exe
                            renamed because original name is a hash value
                            Original Sample Name:0064e7befb41f52b9f050e06bd6bbeecfbdfaf18d3fbd3ab3678417a8a82a462.exe
                            Detection:MAL
                            Classification:mal100.spyw.evad.winEXE@1/0@2/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 43
                            • Number of non-executed functions: 259
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: W7ZBbzV7A5.exe
                            TimeTypeDescription
                            11:45:09API Interceptor602x Sleep call for process: W7ZBbzV7A5.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.26.3.46d1bc91bd44a0.exeGet hashmaliciousPrivateLoader, Stealc, VidarBrowse
                              file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                66fb252fe232b_Patksl.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                  file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                    file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                      SecuriteInfo.com.Trojan.DownLoaderNET.786.26034.14743.exeGet hashmaliciousUnknownBrowse
                                        kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          s-part-0035.t-0009.t-msedge.netfile.exeGet hashmaliciousUnknownBrowse
                                          • 13.107.246.63
                                          https://maya-lopez.filemail.com/t/BLFGBJSQGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.63
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 13.107.246.63
                                          AWB_5771388044 Documente de expediere.exeGet hashmaliciousFormBookBrowse
                                          • 13.107.246.63
                                          lLNOwu1HG4.jsGet hashmaliciousRHADAMANTHYSBrowse
                                          • 13.107.246.63
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 13.107.246.63
                                          file.exeGet hashmaliciousStealcBrowse
                                          • 13.107.246.63
                                          cwqqRXEhZb.msiGet hashmaliciousUnknownBrowse
                                          • 13.107.246.63
                                          Aktarma,pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 13.107.246.63
                                          Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                          • 13.107.246.63
                                          iplogger.orgcare.rtfGet hashmaliciousUnknownBrowse
                                          • 172.67.74.161
                                          d1bc91bd44a0.exeGet hashmaliciousPrivateLoader, Stealc, VidarBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                          • 104.26.3.46
                                          66fb252fe232b_Patksl.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • 104.26.2.46
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • 172.67.74.161
                                          SecuriteInfo.com.Win32.CrypterX-gen.27124.19662.exeGet hashmaliciousAmadey, Clipboard Hijacker, Cryptbot, Go Injector, LummaC Stealer, PrivateLoader, PureLog StealerBrowse
                                          • 172.67.74.161
                                          SecuriteInfo.com.Win32.CrypterX-gen.27124.19662.exeGet hashmaliciousAmadey, Clipboard Hijacker, Cryptbot, Go Injector, LummaC Stealer, PrivateLoader, PureLog StealerBrowse
                                          • 104.26.2.46
                                          file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                          • 104.26.3.46
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSfile.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.67.152
                                          file.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.67.152
                                          https://maya-lopez.filemail.com/t/BLFGBJSQGet hashmaliciousHTMLPhisherBrowse
                                          • 104.17.25.14
                                          BPzptjK1aF.exeGet hashmaliciousLummaC StealerBrowse
                                          • 172.67.139.78
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 104.21.16.9
                                          file.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.67.152
                                          https://mpleho.com/wd/Get hashmaliciousPhisherBrowse
                                          • 104.21.56.67
                                          file.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 172.67.177.134
                                          download.ps1Get hashmaliciousUnknownBrowse
                                          • 104.20.22.46
                                          download.ps1Get hashmaliciousUnknownBrowse
                                          • 104.20.22.46
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          a0e9f5d64349fb13191bc781f81f42e1BPzptjK1aF.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.26.3.46
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.26.3.46
                                          List of required items pdf.vbsGet hashmaliciousGuLoaderBrowse
                                          • 104.26.3.46
                                          List of required items and services pdf.vbsGet hashmaliciousGuLoaderBrowse
                                          • 104.26.3.46
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.470632646045231
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:W7ZBbzV7A5.exe
                                          File size:754'688 bytes
                                          MD5:fdf35b2e3e30f50b6cff5c52e12cd613
                                          SHA1:cc10e3aead57db26ae8a15b4ae881a1715ba9a29
                                          SHA256:0064e7befb41f52b9f050e06bd6bbeecfbdfaf18d3fbd3ab3678417a8a82a462
                                          SHA512:6cab175f0970787e37890d665252406bdc52fbe6edc18987b052b99ac9559033f33b76d830c0a2e4ad198cff1de8cb2a6d4caea62b6907440fc6ff8105a84d6c
                                          SSDEEP:12288:hpLmR4EzqBiLusWum2OYcdWlfG1xp/jWlekdWMcjNktAVde/IetsqfEc3Fqdo3m:hg4EzqBBsnOYNUprGKYAV2Bzp3FqdoW
                                          TLSH:7CF4E10077A1C034F1F212F6C5BA9AB8582D7DA16F2895CF1BC42AEE56746E0AC31F57
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........b.)...z...z...z.uYz...z.ulz...z.umz...z.{Tz...z...z...z.uhz...z.u]z...z.uZz...zRich...z................PE..L...k.c^...........
                                          Icon Hash:6a5c2c5e66e6f80d
                                          Entrypoint:0x405180
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x5E639A6B [Sat Mar 7 12:58:19 2020 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:39d2476c53e56eec83f63ff721436109
                                          Instruction
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          call 00007FAE8CE6544Bh
                                          call 00007FAE8CE5A106h
                                          pop ebp
                                          ret
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          push FFFFFFFEh
                                          push 0049B300h
                                          push 0040C7D0h
                                          mov eax, dword ptr fs:[00000000h]
                                          push eax
                                          add esp, FFFFFF98h
                                          push ebx
                                          push esi
                                          push edi
                                          mov eax, dword ptr [0049D110h]
                                          xor dword ptr [ebp-08h], eax
                                          xor eax, ebp
                                          push eax
                                          lea eax, dword ptr [ebp-10h]
                                          mov dword ptr fs:[00000000h], eax
                                          mov dword ptr [ebp-18h], esp
                                          mov dword ptr [ebp-70h], 00000000h
                                          lea eax, dword ptr [ebp-60h]
                                          push eax
                                          call dword ptr [00491174h]
                                          cmp dword ptr [004A6504h], 00000000h
                                          jne 00007FAE8CE5A100h
                                          push 00000000h
                                          push 00000000h
                                          push 00000001h
                                          push 00000000h
                                          call dword ptr [00491170h]
                                          call 00007FAE8CE5A283h
                                          mov dword ptr [ebp-6Ch], eax
                                          call 00007FAE8CE6637Bh
                                          test eax, eax
                                          jne 00007FAE8CE5A0FCh
                                          push 0000001Ch
                                          call 00007FAE8CE5A240h
                                          add esp, 04h
                                          call 00007FAE8CE64C48h
                                          test eax, eax
                                          jne 00007FAE8CE5A0FCh
                                          push 00000010h
                                          call 00007FAE8CE5A22Dh
                                          add esp, 04h
                                          push 00000001h
                                          call 00007FAE8CE5C6D3h
                                          add esp, 04h
                                          call 00007FAE8CE662EBh
                                          mov dword ptr [ebp-04h], 00000000h
                                          call 00007FAE8CE65ECFh
                                          test eax, eax
                                          Programming Language:
                                          • [ASM] VS2010 build 30319
                                          • [C++] VS2010 build 30319
                                          • [ C ] VS2010 build 30319
                                          • [IMP] VS2008 SP1 build 30729
                                          • [RES] VS2010 build 30319
                                          • [LNK] VS2010 build 30319
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x9ba4c0x3c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x175d9.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x912c00x1c.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x910000x240.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x8fdc10x8fe0042d55f6c8446ba30a83690cda52a1db7False0.8653820047784535data7.830965994043891IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x910000xb7bc0xb800a51b896423c373d536b628e6a126ae73False0.41323454483695654data5.334283107335279IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x9d0000xa5080x540073c0a9a90dfd3dc5f3e79c561ce6b4bfFalse0.09319196428571429Matlab v4 mat-file (little endian) _Locimp@locale@std@@, text, rows 4294967295, columns 47899081.1637757321404343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xa80000x2c5d90x17600a5fc9be5d1b96e9c4a0f1dae02c632a5False0.5336313502673797data5.7007263934783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          BUKOKOVOTOSO0xa88ec0x6f0ASCII text, with very long lines (1776), with no line terminators0.6137387387387387
                                          NOCOZOLUKUSIDIGE0xa8fdc0x127bASCII text, with very long lines (4731), with no line terminators0.5971253434791799
                                          RT_CURSOR0xaa2580x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                          RT_CURSOR0xaa3880xf0Device independent bitmap graphic, 24 x 48 x 1, image size 00.44166666666666665
                                          RT_CURSOR0xaa4780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.08794559099437148
                                          RT_ICON0xab5200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.7316390041493775
                                          RT_ICON0xadac80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.4229744136460554
                                          RT_ICON0xae9700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6064981949458483
                                          RT_ICON0xaf2180x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.6860599078341014
                                          RT_ICON0xaf8e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.7601156069364162
                                          RT_ICON0xafe480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.5076763485477178
                                          RT_ICON0xb23f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.6585365853658537
                                          RT_ICON0xb34980x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.6963114754098361
                                          RT_ICON0xb3e200x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8093971631205674
                                          RT_ICON0xb42880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.44429637526652455
                                          RT_ICON0xb51300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.5956678700361011
                                          RT_ICON0xb59d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.6394009216589862
                                          RT_ICON0xb60a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.6221098265895953
                                          RT_ICON0xb66080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3039419087136929
                                          RT_ICON0xb8bb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.38109756097560976
                                          RT_ICON0xb9c580x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41147540983606556
                                          RT_ICON0xba5e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.45478723404255317
                                          RT_ICON0xbaa480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.5717509025270758
                                          RT_ICON0xbb2f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.6347926267281107
                                          RT_ICON0xbb9b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.6365606936416185
                                          RT_ICON0xbbf200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.6402439024390244
                                          RT_ICON0xbcfc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.6196721311475409
                                          RT_ICON0xbd9500x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6675531914893617
                                          RT_STRING0xbddb80x150data0.5208333333333334
                                          RT_STRING0xbdf080x506data0.4401244167962675
                                          RT_STRING0xbe4100x24edata0.4847457627118644
                                          RT_STRING0xbe6600x676data0.4274486094316808
                                          RT_STRING0xbecd80x2edata0.5217391304347826
                                          RT_ACCELERATOR0xbed080x50data0.825
                                          RT_GROUP_CURSOR0xbed580x30data1.0
                                          RT_GROUP_ICON0xbed880x14data1.15
                                          RT_GROUP_ICON0xbed9c0x76data0.6694915254237288
                                          RT_GROUP_ICON0xbee140x76data0.6694915254237288
                                          RT_GROUP_ICON0xbee8c0x5adata0.7444444444444445
                                          RT_VERSION0xbeee80x144data0.5925925925925926
                                          RT_MANIFEST0xbf02c0x5adXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1393), with CRLF line terminators0.4542326221610461
                                          DLLImport
                                          KERNEL32.dllGetComputerNameA, FillConsoleOutputCharacterA, GetPrivateProfileSectionNamesW, GetFileSize, SetPriorityClass, WriteConsoleInputW, lstrlenA, GetConsoleAliasesLengthW, TlsGetValue, CommConfigDialogA, FindResourceExW, CallNamedPipeA, SetConsoleTextAttribute, ZombifyActCtx, WritePrivateProfileSectionA, SetEnvironmentVariableW, GetModuleHandleExW, SetComputerNameW, AddConsoleAliasW, CreateDirectoryExA, GetWindowsDirectoryA, EnumTimeFormatsA, WriteFile, SetProcessPriorityBoost, ActivateActCtx, ReadConsoleInputA, CopyFileW, SetVolumeMountPointA, GetVersionExW, GlobalFlags, SetConsoleMode, GetFileAttributesW, WriteConsoleW, IsDBCSLeadByte, CompareStringW, SetThreadPriority, VerifyVersionInfoW, ReleaseActCtx, SetCurrentDirectoryA, SetThreadLocale, GetStdHandle, FindFirstFileExA, GetHandleInformation, GetLastError, GetCurrentDirectoryW, GetProcAddress, GetProcessHeaps, VirtualAlloc, MoveFileW, WriteProfileSectionA, LoadLibraryA, OpenMutexA, ProcessIdToSessionId, OpenWaitableTimerW, LocalAlloc, DnsHostnameToComputerNameA, SetFileApisToANSI, AddAtomA, GlobalWire, SetConsoleCursorInfo, DebugSetProcessKillOnExit, SetConsoleTitleW, ContinueDebugEvent, FreeEnvironmentStringsW, BuildCommDCBA, CompareStringA, GetCurrentThreadId, SetProcessShutdownParameters, OpenSemaphoreW, GetVersionExA, LocalSize, FindAtomW, FindActCtxSectionStringW, ReadConsoleOutputCharacterW, OpenFileMappingA, GlobalReAlloc, GetProfileSectionW, GetVolumeInformationW, CloseHandle, CreateFileW, SetStdHandle, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, DeleteFileA, MultiByteToWideChar, GetCommandLineA, HeapSetInformation, GetStartupInfoW, HeapValidate, IsBadReadPtr, RaiseException, RtlUnwind, IsProcessorFeaturePresent, GetModuleHandleW, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleFileNameW, InitializeCriticalSectionAndSpinCount, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, TlsAlloc, TlsSetValue, TlsFree, SetLastError, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleFileNameA, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapCreate, HeapAlloc, HeapReAlloc, HeapSize, HeapQueryInformation, HeapFree, GetStringTypeW, LoadLibraryW, SetFilePointer, GetConsoleCP, GetConsoleMode, OutputDebugStringA, OutputDebugStringW, LCMapStringW, FlushFileBuffers
                                          USER32.dllGetComboBoxInfo, GetMenuBarInfo
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-09T17:45:13.813721+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949732104.26.3.46443TCP
                                          2024-12-09T17:45:14.619063+01002030163ET MALWARE AutoHotkey Downloader Checkin via IPLogger1192.168.2.949732104.26.3.46443TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 9, 2024 17:45:12.362688065 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:12.362741947 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:12.362871885 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:12.365961075 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:12.365974903 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:13.813637972 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:13.813720942 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:13.817142963 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:13.817157030 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:13.817451954 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:13.857764959 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:13.893948078 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:13.935326099 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:14.619122028 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:14.619277000 CET44349732104.26.3.46192.168.2.9
                                          Dec 9, 2024 17:45:14.619354010 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:14.621329069 CET49732443192.168.2.9104.26.3.46
                                          Dec 9, 2024 17:45:14.621351004 CET44349732104.26.3.46192.168.2.9
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 9, 2024 17:45:11.896359921 CET5253553192.168.2.91.1.1.1
                                          Dec 9, 2024 17:45:12.357064962 CET53525351.1.1.1192.168.2.9
                                          Dec 9, 2024 17:45:15.074098110 CET5919953192.168.2.91.1.1.1
                                          Dec 9, 2024 17:45:15.301760912 CET53591991.1.1.1192.168.2.9
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 9, 2024 17:45:11.896359921 CET192.168.2.91.1.1.10xc338Standard query (0)iplogger.orgA (IP address)IN (0x0001)false
                                          Dec 9, 2024 17:45:15.074098110 CET192.168.2.91.1.1.10x4f39Standard query (0)nailedpizza.topA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 9, 2024 17:44:58.933099985 CET1.1.1.1192.168.2.90x803bNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                          Dec 9, 2024 17:44:58.933099985 CET1.1.1.1192.168.2.90x803bNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                          Dec 9, 2024 17:45:12.357064962 CET1.1.1.1192.168.2.90xc338No error (0)iplogger.org104.26.3.46A (IP address)IN (0x0001)false
                                          Dec 9, 2024 17:45:12.357064962 CET1.1.1.1192.168.2.90xc338No error (0)iplogger.org104.26.2.46A (IP address)IN (0x0001)false
                                          Dec 9, 2024 17:45:12.357064962 CET1.1.1.1192.168.2.90xc338No error (0)iplogger.org172.67.74.161A (IP address)IN (0x0001)false
                                          Dec 9, 2024 17:45:15.301760912 CET1.1.1.1192.168.2.90x4f39Name error (3)nailedpizza.topnonenoneA (IP address)IN (0x0001)false
                                          • iplogger.org
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.949732104.26.3.464437736C:\Users\user\Desktop\W7ZBbzV7A5.exe
                                          TimestampBytes transferredDirectionData
                                          2024-12-09 16:45:13 UTC298OUTGET /1jhxh7 HTTP/1.1
                                          Cache-Control: no-cache, no-store
                                          Connection: Keep-Alive
                                          Pragma: no-cache
                                          Accept: */*
                                          If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMT
                                          User-Agent: ( Windows 10 Enterprise | x64 | Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz | Windows Defender | Chrome )
                                          Host: iplogger.org
                                          2024-12-09 16:45:14 UTC1240INHTTP/1.1 200 OK
                                          Date: Mon, 09 Dec 2024 16:45:14 GMT
                                          Content-Type: image/png
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: 25991339137264100=3; expires=Tue, 09 Dec 2025 16:45:14 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                          Set-Cookie: clhf03028ja=8.46.123.228; expires=Tue, 09 Dec 2025 16:45:14 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                          memory: 0.629913330078125
                                          expires: Mon, 09 Dec 2024 16:45:14 +0000
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          strict-transport-security: max-age=31536000
                                          x-frame-options: SAMEORIGIN
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zbb4zQNSgGnydY4H%2FMPzsY%2BX%2BNnRmq1f8i2pI8W9Oof%2FB85%2BWn9cA2v7bqxDFeoDpD4hRleYpCl5%2FUIsDhXhQGgQFCV3NWVrBv9bVf9ojkiCBmfc6voJs2IFYU6F6F8%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 8ef676e30c3042b5-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          server-timing: cfL4;desc="?proto=TCP&rtt=2209&min_rtt=2200&rtt_var=844&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2828&recv_bytes=912&delivery_rate=1282952&cwnd=214&unsent_bytes=0&cid=a999e55be977304b&ts=820&x=0"
                                          2024-12-09 16:45:14 UTC122INData Raw: 37 34 0d 0a 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 01 00 00 00 01 01 03 00 00 00 25 db 56 ca 00 00 00 03 50 4c 54 45 00 00 00 a7 7a 3d da 00 00 00 01 74 52 4e 53 00 40 e6 d8 66 00 00 00 09 70 48 59 73 00 00 0e c4 00 00 0e c4 01 95 2b 0e 1b 00 00 00 0a 49 44 41 54 08 99 63 60 00 00 00 02 00 01 f4 71 64 a6 00 00 00 00 49 45 4e 44 ae 42 60 82 0d 0a
                                          Data Ascii: 74PNGIHDR%VPLTEz=tRNS@fpHYs+IDATc`qdIENDB`
                                          2024-12-09 16:45:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:11:45:02
                                          Start date:09/12/2024
                                          Path:C:\Users\user\Desktop\W7ZBbzV7A5.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\W7ZBbzV7A5.exe"
                                          Imagebase:0x400000
                                          File size:754'688 bytes
                                          MD5 hash:FDF35B2E3E30F50B6CFF5C52E12CD613
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Evader, Description: Yara detected Evader, Source: 00000000.00000003.1438415452.0000000002290000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Evader, Description: Yara detected Evader, Source: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Evader, Description: Yara detected Evader, Source: 00000000.00000002.2627434216.00000000021C1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:0.8%
                                            Dynamic/Decrypted Code Coverage:3%
                                            Signature Coverage:15%
                                            Total number of Nodes:998
                                            Total number of Limit Nodes:74
                                            execution_graph 151279 56c696 151280 56c6a5 151279->151280 151283 56ce36 151280->151283 151286 56ce51 151283->151286 151284 56ce5a CreateToolhelp32Snapshot 151285 56ce76 Module32First 151284->151285 151284->151286 151287 56ce85 151285->151287 151288 56c6ae 151285->151288 151286->151284 151286->151285 151290 56caf5 151287->151290 151291 56cb20 151290->151291 151292 56cb31 VirtualAlloc 151291->151292 151293 56cb69 151291->151293 151292->151293 151293->151293 151294 43b780 151295 43b795 RegisterWindowMessageW 151294->151295 151296 43b7ac 151294->151296 151295->151296 151297 43b996 151296->151297 151298 43b828 151296->151298 151303 43b7ef 151296->151303 151301 43be83 151297->151301 151302 43b9a2 151297->151302 151299 43b974 151298->151299 151300 43b82e 151298->151300 151433 43c3f0 248 API calls 151299->151433 151304 43bdf2 151300->151304 151305 43b83a 151300->151305 151307 43bf2a 151301->151307 151308 43be8f 151301->151308 151309 43be3a 151302->151309 151310 43b9a8 151302->151310 151315 43be16 DefWindowProcW 151304->151315 151434 4176c0 Shell_NotifyIconW _memset _wcsncpy 151304->151434 151316 43b9d7 151305->151316 151317 43b899 151305->151317 151318 43b8c9 151305->151318 151319 43b848 151305->151319 151320 43b86f 151305->151320 151356 43b932 151305->151356 151373 43b8f0 151305->151373 151389 43b98b 151305->151389 151307->151304 151325 43be9d PostMessageW 151307->151325 151332 43c0b3 151307->151332 151333 43bfd7 151307->151333 151334 43bf47 151307->151334 151335 43c06b 151307->151335 151336 43c09b 151307->151336 151337 43c0cb IsWindow 151307->151337 151338 43c0ee GetCurrentProcessId 151307->151338 151382 43c0fd 151307->151382 151313 43be91 151308->151313 151314 43bece 151308->151314 151311 43be43 151309->151311 151323 43be5b SendMessageTimeoutW 151309->151323 151321 43b9b4 151310->151321 151322 43bdde 151310->151322 151312 43b980 151312->151315 151312->151389 151313->151304 151313->151325 151329 43bede PostMessageW 151314->151329 151353 43befd 151314->151353 151344 43b9e8 151316->151344 151388 43ba28 151316->151388 151317->151315 151330 43b8a8 151317->151330 151318->151315 151339 43b8d8 SetFocus 151318->151339 151319->151315 151324 43b857 151319->151324 151326 43b88e 151320->151326 151429 417af0 98 API calls _wcsncpy 151320->151429 151327 43bda2 GetMenu CheckMenuItem 151321->151327 151328 43b9ba 151321->151328 151322->151304 151322->151314 151331 43b91c 151322->151331 151323->151311 151428 417af0 98 API calls _wcsncpy 151324->151428 151436 403950 151325->151436 151327->151315 151327->151331 151341 43b9c7 151328->151341 151342 43bd6d 151328->151342 151329->151353 151354 43b8be 151330->151354 151430 417af0 98 API calls _wcsncpy 151330->151430 151331->151315 151397 43b924 151331->151397 151445 417af0 98 API calls _wcsncpy 151332->151445 151340 43c00c GetCurrentProcessId EnumWindows 151333->151340 151357 43bfe7 GlobalUnlock 151333->151357 151358 43bffa CloseClipboard 151333->151358 151355 43bf81 151334->151355 151371 43bf8b 151334->151371 151372 43bf5c 151334->151372 151343 403950 GetTickCount 151335->151343 151444 417af0 98 API calls _wcsncpy 151336->151444 151348 43c0e3 151337->151348 151349 43c0d9 GetWindowTextW 151337->151349 151359 43c060 151340->151359 151360 43c034 151340->151360 151447 47b1b0 GetWindowThreadProcessId GetClassNameW 151340->151447 151341->151304 151341->151316 151341->151331 151342->151315 151378 43bd8f ShowWindow 151342->151378 151361 43c070 151343->151361 151362 43ba00 MoveWindow 151344->151362 151363 43b9ed ShowWindow 151344->151363 151349->151348 151369 43bf06 SendMessageTimeoutW 151353->151369 151370 43bf1f 151353->151370 151355->151315 151355->151371 151356->151315 151432 46e210 DrawIconEx 151356->151432 151357->151358 151358->151340 151443 47a1d0 99 API calls 151360->151443 151379 43c074 PostMessageW 151361->151379 151361->151397 151364 43c0a8 151365 43c0c0 151366 43be0d 151435 417770 LoadImageW Shell_NotifyIconW 151366->151435 151367 43b864 151369->151370 151374 43bf92 PostMessageW 151371->151374 151375 43bfb1 151371->151375 151372->151315 151383 43bf65 151372->151383 151373->151315 151431 46e160 GetIconInfo GetObjectW DeleteObject DeleteObject 151373->151431 151385 43bfcc 151375->151385 151392 43bfc0 151375->151392 151387 43beaf 151379->151387 151381 43c126 151446 42d2c0 86 API calls _wcsncpy 151381->151446 151382->151381 151382->151389 151441 46dc90 93 API calls 151383->151441 151386 43c045 151386->151359 151393 43c04c SetTimer 151386->151393 151387->151397 151388->151315 151388->151331 151399 43bab0 151388->151399 151400 43bc57 151388->151400 151442 43c660 164 API calls __write_nolock 151392->151442 151393->151359 151394 43c130 151395 43bf76 151398 43bfc9 151398->151385 151402 43bab5 151399->151402 151403 43bb2d 151399->151403 151401 43bc75 GetClientRect 151400->151401 151405 43bd36 151400->151405 151404 43bc97 151401->151404 151402->151315 151408 43bad8 151402->151408 151411 43bad4 151402->151411 151406 43bc23 151403->151406 151407 43bb38 151403->151407 151410 43bd01 MoveWindow InvalidateRect 151404->151410 151413 43bcca MoveWindow 151404->151413 151414 43bcdd 151404->151414 151406->151315 151409 43bc2d GetClipBox FillRect 151406->151409 151418 43bb53 CreateCompatibleDC SelectObject BitBlt SelectObject DeleteDC 151407->151418 151419 43bba7 DrawIconEx 151407->151419 151412 43baf0 SetBkColor 151408->151412 151410->151405 151411->151408 151415 43bae8 GetSysColor 151411->151415 151416 43bb02 SetTextColor 151412->151416 151417 43bb0a 151412->151417 151413->151414 151420 43bce4 MoveWindow 151414->151420 151421 43bcfb 151414->151421 151415->151412 151416->151417 151422 43bb11 151417->151422 151423 43bb1c GetSysColorBrush 151417->151423 151424 43bbc2 ExcludeClipRect CreateRectRgn GetClipRgn 151418->151424 151419->151424 151420->151421 151421->151410 151425 43bbf9 151424->151425 151426 43bbfd GetSysColorBrush 151424->151426 151427 43bc05 FillRgn DeleteObject 151425->151427 151426->151427 151428->151367 151429->151326 151430->151354 151431->151331 151432->151331 151433->151312 151434->151366 151435->151315 151437 4039a4 151436->151437 151438 403959 151436->151438 151437->151387 151438->151437 151439 403982 GetTickCount 151438->151439 151439->151437 151440 40399d 151439->151440 151440->151437 151441->151395 151442->151398 151443->151386 151444->151364 151445->151365 151446->151394 151448 429807 FindWindowW PostMessageW 151449 42983d FindWindowW PostMessageW 151448->151449 151450 429835 151448->151450 151452 429877 151449->151452 151450->151449 151453 459f4c 151455 459f53 __write_nolock _memmove 151453->151455 151454 459fb6 151467 45be20 151454->151467 151455->151454 151457 459c94 151455->151457 151459 45ba48 151457->151459 151496 490561 46 API calls 2 library calls 151457->151496 151460 459ffa 151492 479ae0 51 API calls 2 library calls 151460->151492 151462 45a0c5 151466 45a160 151462->151466 151493 479d00 46 API calls _free 151462->151493 151494 450d00 80 API calls 151466->151494 151495 450f90 80 API calls 151466->151495 151472 45be49 151467->151472 151486 45bed2 __crtLCMapStringA_stat 151467->151486 151468 45bf69 151497 471ad0 151468->151497 151511 4770e0 151468->151511 151519 456430 151468->151519 151469 45c169 151473 45c174 151469->151473 151474 45c181 151469->151474 151475 45bf84 151469->151475 151540 49e732 47 API calls 6 library calls 151472->151540 151543 46e7e0 52 API calls 3 library calls 151473->151543 151544 46e670 52 API calls _free 151474->151544 151475->151460 151476 45c022 151476->151460 151479 45bfb4 151481 45c01e 151479->151481 151541 479bd0 46 API calls _malloc 151479->151541 151481->151469 151481->151476 151482 478d00 62 API calls 151481->151482 151542 4153e0 104 API calls 151481->151542 151482->151481 151483 45c193 151483->151460 151484 45c1d6 151546 479710 151484->151546 151485 45c17f 151485->151483 151485->151484 151545 46fba0 49 API calls 2 library calls 151485->151545 151486->151468 151486->151476 151486->151479 151492->151462 151493->151466 151494->151466 151495->151466 151496->151457 151501 471b08 151497->151501 151498 471b7e 151593 4716c0 168 API calls __wcsicoll 151498->151593 151500 471b35 151551 457e50 151500->151551 151561 458610 151500->151561 151501->151498 151501->151500 151503 471b61 151503->151475 151504 471c43 151504->151503 151596 4716c0 168 API calls __wcsicoll 151504->151596 151505 471c02 151595 48fc19 58 API calls 2 library calls 151505->151595 151507 471b9a 151507->151503 151507->151505 151594 401000 77 API calls 151507->151594 151512 477161 151511->151512 151513 4770eb __wopenfile 151511->151513 151512->151475 151513->151512 151514 477144 GetFileAttributesW 151513->151514 151515 477118 FindFirstFileW 151513->151515 151517 47714f 151514->151517 151515->151512 151516 477129 FindClose 151515->151516 151518 477134 151516->151518 151517->151475 151518->151475 151520 4564ad 151519->151520 151521 456449 151519->151521 151522 4564b2 CLSIDFromProgID 151520->151522 151521->151520 151527 4564d7 151521->151527 151536 456473 151521->151536 151537 45650c 151521->151537 151605 401000 77 API calls 151521->151605 151524 4564be 151522->151524 151523 456548 CLSIDFromString 151525 45655c CoCreateInstance 151523->151525 151539 4565b7 151523->151539 151524->151527 151529 456593 CoCreateInstance 151524->151529 151524->151539 151528 45657d 151525->151528 151525->151539 151526 456489 CLSIDFromString 151526->151524 151527->151537 151606 401000 77 API calls 151527->151606 151528->151475 151532 4565b0 151529->151532 151529->151539 151531 456618 151531->151475 151607 491078 151532->151607 151536->151522 151536->151526 151537->151523 151538 456622 151538->151475 151539->151538 151618 4581d0 83 API calls 2 library calls 151539->151618 151540->151486 151541->151481 151542->151481 151543->151485 151544->151485 151545->151484 151547 479719 151546->151547 151548 479722 151547->151548 151642 490561 46 API calls 2 library calls 151547->151642 151548->151475 151550 479779 151550->151475 151552 457e5c 151551->151552 151553 457e86 151552->151553 151554 457f30 151552->151554 151555 457ec9 SysAllocString 151552->151555 151556 457ee2 151552->151556 151553->151555 151558 457e8d 151553->151558 151597 49e732 47 API calls 6 library calls 151554->151597 151555->151503 151556->151503 151558->151503 151559 457f46 151559->151556 151560 457f87 SafeArrayCopy 151559->151560 151560->151556 151562 45863b 151561->151562 151563 458669 151561->151563 151562->151563 151565 45868e 151562->151565 151566 458658 151562->151566 151564 458a19 151563->151564 151567 4586c0 151563->151567 151576 4586eb 151563->151576 151577 458670 151563->151577 151564->151567 151568 458a20 151564->151568 151599 4580f0 57 API calls 151565->151599 151598 458010 53 API calls 151566->151598 151604 4581d0 83 API calls 2 library calls 151567->151604 151603 458a70 138 API calls __wcsicoll 151568->151603 151573 45869b 151573->151503 151574 458a31 151574->151503 151575 458a59 151575->151503 151586 4586f3 __crtLCMapStringA_stat 151576->151586 151600 450f90 80 API calls 151576->151600 151577->151503 151579 458962 151581 458997 151579->151581 151582 45896c 151579->151582 151580 458860 151580->151579 151587 45894f SysFreeString 151580->151587 151584 45899d 151581->151584 151602 457a00 56 API calls _malloc 151581->151602 151601 4581d0 83 API calls 2 library calls 151582->151601 151584->151503 151585 458728 151585->151586 151591 458775 SysAllocString 151585->151591 151586->151580 151589 457e50 49 API calls 151586->151589 151587->151580 151588 458978 151588->151503 151589->151586 151592 458793 SysFreeString 151591->151592 151592->151586 151593->151507 151594->151505 151595->151504 151596->151503 151597->151559 151598->151563 151599->151573 151600->151585 151601->151588 151602->151584 151603->151574 151604->151575 151605->151536 151606->151537 151610 491082 _malloc 151607->151610 151609 49109c 151609->151539 151610->151609 151612 49109e std::exception::exception 151610->151612 151619 48fca4 151610->151619 151616 4910dc 151612->151616 151633 4906be 51 API calls __cinit 151612->151633 151613 4910e6 151635 4960eb RaiseException 151613->151635 151634 496048 46 API calls std::exception::operator= 151616->151634 151617 4910f7 151618->151531 151620 48fd21 _malloc 151619->151620 151622 48fcb2 _malloc 151619->151622 151641 493c72 46 API calls __getptd_noexit 151620->151641 151621 48fcbd 151621->151622 151636 493e90 46 API calls __NMSG_WRITE 151621->151636 151637 493ce1 46 API calls 7 library calls 151621->151637 151638 48fee6 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 151621->151638 151622->151621 151625 48fce0 RtlAllocateHeap 151622->151625 151628 48fd0d 151622->151628 151631 48fd0b 151622->151631 151625->151622 151626 48fd19 151625->151626 151626->151610 151639 493c72 46 API calls __getptd_noexit 151628->151639 151640 493c72 46 API calls __getptd_noexit 151631->151640 151633->151616 151634->151613 151635->151617 151636->151621 151637->151621 151639->151631 151640->151626 151641->151626 151642->151550 151643 42b16b 151644 42b175 151643->151644 151647 42b18f 151643->151647 151646 472da0 78 API calls 151644->151646 151644->151647 151646->151647 151664 4159b0 151647->151664 151648 42b1aa 151670 472da0 151648->151670 151650 42b1d6 151651 42b1eb RegCloseKey 151650->151651 151663 426e50 151650->151663 151651->151663 151652 426e8a GetTickCount 151653 426ea6 PeekMessageW 151652->151653 151652->151663 151656 426ec0 151653->151656 151657 426ecc GetTickCount 151653->151657 151654 426e62 GlobalUnlock 151655 426e78 CloseClipboard 151654->151655 151655->151652 151658 426ec9 151656->151658 151657->151663 151658->151657 151659 426f79 GetTickCount 151660 426fa8 151659->151660 151659->151663 151660->151663 151661 444790 58 API calls 151661->151663 151662 427121 151663->151652 151663->151654 151663->151655 151663->151659 151663->151661 151663->151662 151665 4159cd 151664->151665 151666 48fc19 58 API calls __wcsicoll 151665->151666 151667 415af6 _wcsncpy 151665->151667 151668 415a80 151665->151668 151666->151665 151667->151668 151669 415b2c RegConnectRegistryW 151667->151669 151668->151648 151669->151648 151697 414dc0 151670->151697 151672 472dc1 151673 472df8 RegOpenKeyExW 151672->151673 151679 472dc5 151672->151679 151674 472e25 RegQueryValueExW 151673->151674 151694 472e98 151673->151694 151676 472e45 151674->151676 151682 472e5a 151674->151682 151675 472ea3 GetLastError 151675->151679 151678 473117 RegCloseKey 151676->151678 151680 472eae RegQueryValueExW 151676->151680 151681 472fee 151676->151681 151676->151682 151677 472e92 RegCloseKey 151677->151694 151678->151679 151679->151650 151680->151682 151683 472ece 151680->151683 151681->151682 151684 473012 151681->151684 151682->151677 151683->151682 151685 472eda 151683->151685 151688 473027 RegCloseKey 151684->151688 151689 47303d 151684->151689 151686 472f07 151685->151686 151687 472ef1 RegCloseKey 151685->151687 151690 472f12 RegQueryValueExW RegCloseKey 151686->151690 151687->151650 151688->151650 151691 47306e RegCloseKey 151689->151691 151693 472f3d 151690->151693 151692 473087 151691->151692 151691->151694 151692->151679 151708 4046c0 18 API calls 151692->151708 151693->151694 151707 4046c0 18 API calls 151693->151707 151694->151675 151694->151679 151698 414dc7 151697->151698 151699 414dd9 151697->151699 151698->151672 151700 414de2 151699->151700 151702 414def 151699->151702 151709 4045c0 21 API calls _wcsncpy 151700->151709 151704 414dfc 151702->151704 151710 4799a0 46 API calls _free 151702->151710 151703 414dee 151703->151672 151704->151672 151706 414e1a 151706->151672 151707->151694 151708->151679 151709->151703 151710->151706 151711 4a0440 151716 416a90 151711->151716 151713 4a0445 151723 4906be 51 API calls __cinit 151713->151723 151715 4a044f 151717 416cd7 _memset 151716->151717 151724 46cad0 151717->151724 151719 416cef 151722 416d15 OleInitialize 151719->151722 151734 417af0 98 API calls _wcsncpy 151719->151734 151722->151713 151723->151715 151725 46cafc 151724->151725 151726 46cadc 151724->151726 151725->151719 151726->151725 151727 48fca4 _malloc 46 API calls 151726->151727 151728 46cb0e 151727->151728 151728->151728 151729 491078 52 API calls 151728->151729 151733 46cb93 151728->151733 151730 46cb36 151729->151730 151731 46cb3d 151730->151731 151735 490561 46 API calls 2 library calls 151730->151735 151731->151719 151733->151719 151734->151722 151735->151733 151736 40146b 151737 40147b 151736->151737 151738 401488 151737->151738 151799 403380 joyGetPosEx PostMessageW 151737->151799 151740 4014a3 151738->151740 151741 401495 151738->151741 151744 4014c8 SetTimer 151740->151744 151760 4014e5 151740->151760 151800 4031b0 68 API calls _wcsncpy 151741->151800 151743 40149a 151743->151740 151744->151760 151745 4014f3 GetTickCount 151745->151760 151746 403950 GetTickCount 151747 401528 GetMessageW 151746->151747 151747->151745 151748 40154b GetTickCount 151747->151748 151748->151760 151749 4015e4 GetFocus 151749->151760 151750 401c8e GetForegroundWindow 151751 401c9e GetWindowThreadProcessId 151750->151751 151750->151760 151757 401cb3 GetClassNameW 151751->151757 151751->151760 151754 401c63 ShowWindow 151754->151745 151755 402fa8 TranslateMessage DispatchMessageW 151755->151745 151756 402f8e TranslateAcceleratorW 151756->151745 151756->151755 151757->151760 151760->151745 151760->151746 151760->151749 151760->151750 151760->151754 151760->151755 151760->151756 151761 401b98 IsDialogMessageW 151760->151761 151767 402f1d IsDialogMessageW 151760->151767 151769 4016be _wcsncpy 151760->151769 151770 401623 TranslateAcceleratorW 151760->151770 151772 402f60 SetCurrentDirectoryW 151760->151772 151773 401350 GetDlgCtrlID GetParent GetDlgCtrlID 151760->151773 151774 401f41 DragQueryFileW 151760->151774 151775 401f62 DragFinish 151760->151775 151776 401b33 SendMessageW 151760->151776 151777 4022fc DragFinish 151760->151777 151778 40233f DragFinish 151760->151778 151779 401b4d SendMessageW 151760->151779 151781 401a7c GetKeyState 151760->151781 151786 401997 GetKeyState 151760->151786 151787 401ad4 SendMessageW 151760->151787 151788 401af4 SendMessageW 151760->151788 151791 402257 GetTickCount 151760->151791 151793 4019bc GetWindowLongW 151760->151793 151794 4019fb IsWindowEnabled 151760->151794 151797 401a1a GetKeyState 151760->151797 151801 47b290 GetWindowLongW GetParent GetWindowLongW 151760->151801 151802 45d6a0 GetWindowLongW GetParent 151760->151802 151804 417af0 98 API calls _wcsncpy 151760->151804 151805 403380 joyGetPosEx PostMessageW 151760->151805 151808 409ca0 127 API calls 151760->151808 151810 435ff0 92 API calls 151760->151810 151811 40a810 127 API calls 151760->151811 151761->151760 151767->151760 151768 403170 GetTickCount 151768->151769 151769->151745 151769->151760 151769->151768 151771 401d6a 151769->151771 151783 402415 GetTickCount 151769->151783 151769->151791 151798 46a850 168 API calls 151769->151798 151803 466f40 PostMessageW 151769->151803 151806 4031b0 68 API calls _wcsncpy 151769->151806 151807 466ee0 ShowWindow 151769->151807 151809 40cde0 304 API calls __write_nolock 151769->151809 151812 403770 SetCurrentDirectoryW GetTickCount LoadImageW Shell_NotifyIconW 151769->151812 151813 40aba0 125 API calls __write_nolock 151769->151813 151814 403880 48 API calls 2 library calls 151769->151814 151770->151745 151770->151760 151785 401dad KillTimer 151771->151785 151789 401dbf 151771->151789 151772->151760 151773->151760 151774->151760 151775->151745 151776->151745 151777->151760 151778->151760 151779->151745 151781->151760 151782 401a94 GetKeyState 151781->151782 151782->151760 151783->151769 151785->151789 151786->151760 151787->151745 151788->151745 151791->151745 151792 40245e GetTickCount 151792->151769 151793->151760 151794->151760 151797->151769 151798->151769 151799->151738 151800->151743 151801->151760 151802->151760 151803->151769 151804->151760 151805->151760 151806->151769 151807->151769 151808->151760 151809->151769 151810->151760 151811->151760 151812->151792 151813->151769 151814->151769 151815 42740e 151816 427462 151815->151816 151817 427418 151815->151817 151818 427438 151816->151818 151822 427472 151816->151822 151823 4274bc 151816->151823 151819 427444 151817->151819 151820 42741d 151817->151820 151827 427520 151818->151827 151828 42756a 151818->151828 151838 42752b 151818->151838 151821 4159b0 59 API calls 151819->151821 151820->151818 151826 4159b0 59 API calls 151820->151826 151821->151818 151899 48fc19 58 API calls 2 library calls 151822->151899 151900 4761c0 60 API calls 151823->151900 151826->151818 151901 416240 60 API calls __fassign 151827->151901 151832 4275ae 151828->151832 151833 42756f 151828->151833 151829 427483 151829->151818 151835 4159b0 59 API calls 151829->151835 151830 4274ce 151830->151818 151837 4159b0 59 API calls 151830->151837 151903 416290 59 API calls 151832->151903 151902 416240 60 API calls __fassign 151833->151902 151835->151818 151837->151818 151839 4276e2 151838->151839 151840 4276c2 151838->151840 151841 427800 151838->151841 151842 4277c7 151838->151842 151843 427655 151838->151843 151844 4276a5 151838->151844 151845 427739 151838->151845 151856 42b5cc 151838->151856 151886 426e50 151838->151886 151907 48fc19 58 API calls 2 library calls 151839->151907 151906 42d7b0 105 API calls _free 151840->151906 151851 42782a 151841->151851 151852 42780a 151841->151852 151914 42dc20 83 API calls 2 library calls 151842->151914 151847 427668 151843->151847 151848 42765f 151843->151848 151889 42d5c0 151844->151889 151910 4168e0 GetCPInfo 151845->151910 151905 42d460 61 API calls 151847->151905 151904 423160 60 API calls __wcstoi64 151848->151904 151859 4159b0 59 API calls 151851->151859 151858 4159b0 59 API calls 151852->151858 151854 427745 151861 42775c 151854->151861 151882 42779d 151854->151882 151863 42781a 151858->151863 151859->151863 151860 4276f3 151864 42771a 151860->151864 151865 4276fb 151860->151865 151911 473e10 48 API calls 151861->151911 151869 42784b 151863->151869 151863->151886 151909 42ea90 61 API calls 6 library calls 151864->151909 151908 42e7a0 61 API calls 5 library calls 151865->151908 151915 42e390 92 API calls __write_nolock 151869->151915 151870 427777 151870->151882 151912 42eda0 62 API calls 3 library calls 151870->151912 151873 426e8a GetTickCount 151874 426ea6 PeekMessageW 151873->151874 151873->151886 151879 426ec0 151874->151879 151880 426ecc GetTickCount 151874->151880 151875 42787b 151881 427884 RegCloseKey 151875->151881 151875->151886 151877 426e62 GlobalUnlock 151878 426e78 CloseClipboard 151877->151878 151878->151873 151883 426ec9 151879->151883 151880->151886 151881->151886 151913 416930 47 API calls _free 151882->151913 151883->151880 151884 426f79 GetTickCount 151885 426fa8 151884->151885 151884->151886 151885->151886 151886->151873 151886->151877 151886->151878 151886->151884 151887 444790 58 API calls 151886->151887 151888 427121 151886->151888 151887->151886 151894 42d5db 151889->151894 151892 42d6c3 GetTickCount 151892->151894 151896 42d6f1 151892->151896 151894->151892 151895 42d62d 151894->151895 151916 4761c0 60 API calls 151894->151916 151917 491a12 57 API calls __wtof_l 151894->151917 151918 40ec60 59 API calls 151894->151918 151919 491933 57 API calls wcstoxq 151894->151919 151920 490f11 57 API calls __wcstoi64 151894->151920 151895->151886 151896->151894 151899->151829 151900->151830 151901->151838 151902->151838 151903->151838 151904->151847 151905->151885 151906->151886 151907->151860 151908->151886 151909->151886 151910->151854 151911->151870 151912->151882 151913->151885 151914->151886 151915->151875 151916->151894 151917->151894 151918->151894 151919->151894 151920->151894 151921 42a4ae 151924 4421a0 151921->151924 151923 42a4b8 151925 4421d4 SetCurrentDirectoryW 151924->151925 151926 4421ae 151924->151926 151927 4421f1 151925->151927 151928 4421df 151925->151928 151926->151925 151927->151928 151930 442220 151927->151930 151928->151923 151936 49af30 151930->151936 151933 442241 151935 442257 151933->151935 151938 451f20 52 API calls 2 library calls 151933->151938 151935->151928 151937 44222a GetCurrentDirectoryW 151936->151937 151937->151933 151938->151935 151939 211003c 151940 2110049 151939->151940 151954 2110df8 SetErrorMode SetErrorMode 151940->151954 151944 2110238 VirtualAlloc 151945 2110265 151944->151945 151946 21102ce VirtualProtect 151945->151946 151948 211030b 151946->151948 151947 2110439 VirtualFree 151952 21105f4 LoadLibraryA 151947->151952 151953 21104be 151947->151953 151948->151947 151949 21104e3 LoadLibraryA 151949->151953 151951 21108c7 151952->151951 151953->151949 151953->151952 151955 2110223 151954->151955 151956 2110d90 151955->151956 151957 2110dad 151956->151957 151958 2110db6 151957->151958 151959 2110dbb GetPEB 151957->151959 151958->151944 151960 2110ddc 151959->151960 151960->151944 151961 42a28f 151965 4428e0 151961->151965 151963 42a29c GetLastError 151964 42a2c2 151963->151964 151966 4428f1 151965->151966 151967 4429a3 SetLastError 151965->151967 151966->151967 151968 4428fb GetFileAttributesW 151966->151968 151969 4429ad 151967->151969 151970 442909 SetLastError 151968->151970 151972 442924 __crtLCMapStringA_stat _wcsrchr 151968->151972 151969->151963 151970->151963 151971 44298d CreateDirectoryW 151971->151963 151972->151969 151972->151971 151973 4291ed 151976 4545d0 151973->151976 151975 4291ff 151975->151975 151978 4545e1 151976->151978 151977 454645 InternetOpenW 151979 4546b8 InternetOpenUrlW 151977->151979 151987 454662 151977->151987 151978->151977 152016 40ec60 59 API calls 151978->152016 151982 454705 151979->151982 151983 4546cd InternetCloseHandle 151979->151983 151981 454603 151985 454607 151981->151985 151986 454616 151981->151986 152019 491f99 116 API calls __wfsopen 151982->152019 151983->151987 152017 491933 57 API calls wcstoxq 151985->152017 152018 490f11 57 API calls __wcstoi64 151986->152018 151987->151975 151988 454717 151991 454746 151988->151991 151992 454720 InternetCloseHandle InternetCloseHandle 151988->151992 151994 45483e InternetReadFileExA 151991->151994 151997 454799 InternetReadFile 151991->151997 151993 454739 151992->151993 151993->151975 151995 454856 151994->151995 151996 4548d2 InternetCloseHandle InternetCloseHandle 151994->151996 151995->151996 151998 45485d GetTickCount 151995->151998 152022 4921ee 82 API calls 4 library calls 151996->152022 151997->151996 152012 4547bb 151997->152012 152001 454879 PeekMessageW 151998->152001 152005 454890 151998->152005 152000 4548e8 152003 4548ff 152000->152003 152004 4548ef DeleteFileW 152000->152004 152001->152005 152006 45489c GetTickCount 152001->152006 152002 4547c6 GetTickCount 152007 4547e2 PeekMessageW 152002->152007 152002->152012 152003->151975 152004->152003 152005->152006 152021 492107 79 API calls 2 library calls 152005->152021 152006->152005 152011 454805 GetTickCount 152007->152011 152007->152012 152010 454611 152010->151977 152011->152012 152012->151996 152012->152002 152012->152011 152020 492107 79 API calls 2 library calls 152012->152020 152013 4548b5 InternetReadFileExA 152013->151995 152013->151996 152014 45481e InternetReadFile 152014->152012 152015 454839 152014->152015 152015->151996 152016->151981 152017->152010 152018->152010 152019->151988 152020->152014 152021->152013 152022->152000 152023 45c30a 152024 45c317 152023->152024 152025 45c32c 152024->152025 152034 490561 46 API calls 2 library calls 152024->152034 152027 48fca4 _malloc 46 API calls 152025->152027 152029 45c346 152027->152029 152028 45c352 152029->152028 152030 45c5e5 152029->152030 152035 490561 46 API calls 2 library calls 152029->152035 152031 45c63c 152030->152031 152032 45c619 SetTimer 152030->152032 152032->152031 152034->152025 152035->152030 152036 427eb1 152048 426e50 152036->152048 152037 426e8a GetTickCount 152038 426ea6 PeekMessageW 152037->152038 152037->152048 152041 426ec0 152038->152041 152042 426ecc GetTickCount 152038->152042 152039 426e62 GlobalUnlock 152040 426e78 CloseClipboard 152039->152040 152040->152037 152043 426ec9 152041->152043 152042->152048 152043->152042 152044 426f79 GetTickCount 152045 426fa8 152044->152045 152044->152048 152045->152048 152046 444790 58 API calls 152046->152048 152047 427121 152048->152037 152048->152039 152048->152040 152048->152044 152048->152046 152048->152047 152049 45c4d3 152054 45c3e0 152049->152054 152050 45c5e5 152051 45c63c 152050->152051 152052 45c619 SetTimer 152050->152052 152052->152051 152054->152050 152055 490561 46 API calls 2 library calls 152054->152055 152055->152050 152056 473ad0 152057 473adc 152056->152057 152059 473ae2 152056->152059 152058 48fca4 _malloc 46 API calls 152057->152058 152058->152059 152060 477170 152061 477190 152060->152061 152062 47719d 152060->152062 152069 4771bd _wcschr __wopenfile 152062->152069 152070 490ebe 59 API calls __isctype_l 152062->152070 152064 4772df 152064->152061 152065 4772e5 FindFirstFileW 152064->152065 152065->152061 152067 477301 FindClose 152065->152067 152066 477250 FindFirstFileW 152066->152061 152068 477279 FindClose 152066->152068 152067->152061 152068->152069 152069->152061 152069->152064 152069->152066 152070->152069 152071 492956 152109 494550 152071->152109 152073 492962 GetStartupInfoW 152074 492976 HeapSetInformation 152073->152074 152076 492981 152073->152076 152074->152076 152110 493ec9 HeapCreate 152076->152110 152077 4929cf 152078 4929da 152077->152078 152231 49292d 46 API calls 3 library calls 152077->152231 152111 49387b GetModuleHandleW 152078->152111 152081 4929e0 152082 4929eb __RTC_Initialize 152081->152082 152232 49292d 46 API calls 3 library calls 152081->152232 152130 49582a GetStartupInfoW 152082->152130 152086 492a05 GetCommandLineW 152143 498670 GetEnvironmentStringsW 152086->152143 152090 492a15 152150 4985c2 GetModuleFileNameW 152090->152150 152093 492a2a 152156 498390 152093->152156 152096 492a30 152097 492a3b 152096->152097 152235 490188 46 API calls 3 library calls 152096->152235 152170 48ff67 152097->152170 152100 492a43 152102 492a4e __wwincmdln 152100->152102 152236 490188 46 API calls 3 library calls 152100->152236 152174 403d20 InitializeCriticalSection SetErrorMode 152102->152174 152104 492a70 152105 492a7e 152104->152105 152237 49013e 46 API calls _doexit 152104->152237 152238 49016a 46 API calls _doexit 152105->152238 152108 492a83 __wsopen_helper 152109->152073 152110->152077 152112 493898 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 152111->152112 152113 49388f 152111->152113 152115 4938e2 TlsAlloc 152112->152115 152239 4935c8 49 API calls _free 152113->152239 152118 4939f1 152115->152118 152119 493930 TlsSetValue 152115->152119 152116 493894 152116->152081 152118->152081 152119->152118 152120 493941 __init_pointers 152119->152120 152240 493f1e InitializeCriticalSectionAndSpinCount 152120->152240 152122 4939ec 152248 4935c8 49 API calls _free 152122->152248 152124 493985 152124->152122 152241 4955cc 152124->152241 152127 4939d1 152247 493605 46 API calls 4 library calls 152127->152247 152129 4939d9 GetCurrentThreadId 152129->152118 152131 4955cc __calloc_crt 46 API calls 152130->152131 152133 495848 152131->152133 152132 4929f9 152132->152086 152233 490188 46 API calls 3 library calls 152132->152233 152133->152132 152134 4959bd 152133->152134 152136 4955cc __calloc_crt 46 API calls 152133->152136 152142 49593d 152133->152142 152135 4959f3 GetStdHandle 152134->152135 152137 495a57 SetHandleCount 152134->152137 152138 495a05 GetFileType 152134->152138 152141 495a2b InitializeCriticalSectionAndSpinCount 152134->152141 152135->152134 152136->152133 152137->152132 152138->152134 152139 495969 GetFileType 152140 495974 InitializeCriticalSectionAndSpinCount 152139->152140 152139->152142 152140->152132 152140->152142 152141->152132 152141->152134 152142->152134 152142->152139 152142->152140 152144 498681 152143->152144 152145 498685 152143->152145 152144->152090 152258 495587 46 API calls _malloc 152145->152258 152148 4986a7 152149 4986ae FreeEnvironmentStringsW 152148->152149 152149->152090 152151 4985f7 _wparse_cmdline 152150->152151 152152 492a1f 152151->152152 152153 498634 152151->152153 152152->152093 152234 490188 46 API calls 3 library calls 152152->152234 152259 495587 46 API calls _malloc 152153->152259 152155 49863a _wparse_cmdline 152155->152152 152157 4983a8 _wcslen 152156->152157 152161 4983a0 152156->152161 152158 4955cc __calloc_crt 46 API calls 152157->152158 152164 4983cc _wcslen 152158->152164 152159 498422 152261 490561 46 API calls 2 library calls 152159->152261 152161->152096 152162 4955cc __calloc_crt 46 API calls 152162->152164 152163 498448 152262 490561 46 API calls 2 library calls 152163->152262 152164->152159 152164->152161 152164->152162 152164->152163 152167 49845f 152164->152167 152260 495e42 46 API calls __wsopen_helper 152164->152260 152263 493bce 10 API calls __call_reportfault 152167->152263 152169 49846b 152169->152096 152171 48ff75 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 152170->152171 152173 48ffb4 __IsNonwritableInCurrentImage 152171->152173 152264 4906be 51 API calls __cinit 152171->152264 152173->152100 152175 442220 53 API calls 152174->152175 152176 403d4e 152175->152176 152185 403d8c 152176->152185 152412 473700 52 API calls 152176->152412 152177 403f43 152265 423680 152177->152265 152179 403f60 152186 403f85 152179->152186 152417 423930 90 API calls 5 library calls 152179->152417 152182 48fc19 58 API calls __wcsicoll 152182->152185 152184 423680 58 API calls 152184->152185 152185->152177 152185->152182 152185->152184 152201 4040c3 152185->152201 152413 4901a6 79 API calls 3 library calls 152185->152413 152414 423930 90 API calls 5 library calls 152185->152414 152415 48fe1d 58 API calls 2 library calls 152185->152415 152416 416700 61 API calls 2 library calls 152185->152416 152188 423680 58 API calls 152186->152188 152186->152201 152189 404019 152188->152189 152190 404047 152189->152190 152418 423930 90 API calls 5 library calls 152189->152418 152190->152201 152286 46f750 152190->152286 152195 479710 46 API calls 152196 404080 152195->152196 152292 417080 152196->152292 152199 404094 152199->152201 152313 417e10 152199->152313 152201->152104 152202 4040b6 152202->152201 152203 404189 152202->152203 152204 404190 FindWindowW 152202->152204 152206 40411e 152202->152206 152203->152204 152205 40420f SystemParametersInfoW 152203->152205 152204->152205 152209 404182 PostMessageW Sleep IsWindow 152204->152209 152207 404229 152205->152207 152208 40423f 152205->152208 152206->152205 152210 40412b FindWindowW 152206->152210 152207->152208 152211 404232 SystemParametersInfoW 152207->152211 152342 417290 152208->152342 152214 40420b Sleep 152209->152214 152218 4041d0 152209->152218 152210->152205 152216 404147 152210->152216 152211->152208 152214->152205 152215 4041fb Sleep IsWindow 152215->152214 152215->152218 152216->152201 152216->152209 152217 404249 __flsbuf 152217->152201 152370 49025a 152217->152370 152218->152201 152218->152215 152220 404266 152221 40427f _memset 152220->152221 152224 48fca4 _malloc 46 API calls 152220->152224 152222 4042a0 InitCommonControlsEx 152221->152222 152223 4042bb 152221->152223 152222->152223 152389 40a0c0 152223->152389 152224->152221 152228 4042e1 152409 404310 152228->152409 152230 4042ef 152230->152104 152231->152078 152232->152082 152237->152105 152238->152108 152239->152116 152240->152124 152243 4955d5 152241->152243 152244 4939b4 152243->152244 152245 4955f3 Sleep 152243->152245 152249 499554 152243->152249 152244->152122 152244->152127 152246 495608 152245->152246 152246->152243 152246->152244 152247->152129 152248->152118 152250 499560 152249->152250 152254 49957b _malloc 152249->152254 152251 49956c 152250->152251 152250->152254 152257 493c72 46 API calls __getptd_noexit 152251->152257 152253 49958e HeapAlloc 152253->152254 152256 4995b5 152253->152256 152254->152253 152254->152256 152255 499571 152255->152243 152256->152243 152257->152255 152258->152148 152259->152155 152260->152164 152261->152161 152262->152161 152263->152169 152264->152173 152266 42369a 152265->152266 152268 4236a6 _wcsncpy 152265->152268 152266->152179 152269 4236d7 152268->152269 152273 423774 152268->152273 152419 48fc19 58 API calls 2 library calls 152268->152419 152269->152179 152270 4238fa 152270->152179 152271 4237e0 152271->152270 152274 423864 152271->152274 152275 42382c 152271->152275 152273->152269 152273->152271 152420 48fc19 58 API calls 2 library calls 152273->152420 152277 423878 152274->152277 152284 4238a2 152274->152284 152276 423680 58 API calls 152275->152276 152279 423847 152276->152279 152280 423680 58 API calls 152277->152280 152278 4238d7 152278->152270 152283 423680 58 API calls 152278->152283 152279->152179 152281 423895 152280->152281 152281->152179 152283->152270 152284->152278 152285 423913 152284->152285 152421 48fc19 58 API calls 2 library calls 152284->152421 152285->152179 152287 46f760 __crtLCMapStringA_stat 152286->152287 152288 491078 52 API calls 152287->152288 152289 46f79e 152288->152289 152291 40406c 152289->152291 152422 46fba0 49 API calls 2 library calls 152289->152422 152291->152195 152291->152201 152293 49af30 __write_nolock 152292->152293 152294 41708a GetModuleFileNameW 152293->152294 152423 477370 63 API calls __write_nolock 152294->152423 152296 417134 152296->152199 152297 4170c4 152299 4170ee _wcsrchr 152297->152299 152424 473700 52 API calls 152297->152424 152299->152296 152301 417169 152299->152301 152425 473680 52 API calls 152299->152425 152301->152296 152426 473680 52 API calls 152301->152426 152303 417188 152303->152296 152427 476360 79 API calls _vswprintf_s 152303->152427 152305 4171b0 152428 473680 52 API calls 152305->152428 152307 4171be 152307->152296 152308 4171cf GetModuleFileNameW 152307->152308 152308->152296 152309 4171f3 152308->152309 152429 473680 52 API calls 152309->152429 152311 41722d _wcsrchr 152311->152296 152430 473680 52 API calls 152311->152430 152314 418050 152313->152314 152315 417e36 152313->152315 152314->152202 152315->152314 152316 417e4c 152315->152316 152431 473770 152315->152431 152318 473770 52 API calls 152316->152318 152319 417e66 152316->152319 152318->152319 152319->152314 152436 418290 146 API calls _free 152319->152436 152321 417ecc 152321->152314 152437 41e960 90 API calls 3 library calls 152321->152437 152323 417ee4 152323->152314 152438 424030 77 API calls 152323->152438 152325 417f62 152328 417f76 152325->152328 152439 421a50 104 API calls 152325->152439 152327 417fa0 SetCurrentDirectoryW 152441 41e960 90 API calls 3 library calls 152327->152441 152328->152314 152328->152327 152440 430eb0 58 API calls 152328->152440 152331 417efa 152331->152314 152331->152325 152333 430e00 84 API calls 152331->152333 152332 417fbd 152332->152314 152442 41e960 90 API calls 3 library calls 152332->152442 152333->152331 152335 417fd0 152335->152314 152443 424570 84 API calls 2 library calls 152335->152443 152337 418008 152337->152314 152338 423620 90 API calls 152337->152338 152339 41801b 152338->152339 152339->152314 152340 418033 GetSystemTimeAsFileTime 152339->152340 152341 418047 152340->152341 152341->152202 152343 4172ae _memset 152342->152343 152349 417367 152342->152349 152343->152349 152444 4781c0 152343->152444 152345 4172fd GetSystemMetrics 152346 4781c0 14 API calls 152345->152346 152347 41731e LoadCursorW RegisterClassExW 152346->152347 152348 417393 RegisterClassExW 152347->152348 152347->152349 152348->152349 152350 4173af GetForegroundWindow 152348->152350 152349->152217 152351 4173b9 GetClassNameW 152350->152351 152352 4173da CreateWindowExW 152350->152352 152351->152352 152353 4173cb 152351->152353 152352->152349 152356 41745a GetMenu EnableMenuItem 152352->152356 152466 48fc19 58 API calls 2 library calls 152353->152466 152465 417690 EnableMenuItem EnableMenuItem EnableMenuItem EnableMenuItem 152356->152465 152358 41747b CreateWindowExW 152358->152349 152359 4174ae GetDC 152358->152359 152360 4174c5 152359->152360 152361 4174ca 8 API calls 152359->152361 152360->152361 152362 417560 ShowWindow SetWindowLongW 152361->152362 152363 41757b LoadAcceleratorsW 152361->152363 152362->152363 152364 4175a2 152363->152364 152365 4175ae 152363->152365 152367 4175c3 152364->152367 152368 4175bc 152364->152368 152467 4176c0 Shell_NotifyIconW _memset _wcsncpy 152365->152467 152367->152217 152468 4175e0 PostMessageW SetClipboardViewer ChangeClipboardChain 152368->152468 152373 490266 __wsopen_helper 152370->152373 152371 490278 152469 493c72 46 API calls __getptd_noexit 152371->152469 152373->152371 152375 4902b9 152373->152375 152374 49027d 152470 493c20 10 API calls __wsopen_helper 152374->152470 152471 490427 47 API calls __lock 152375->152471 152378 4902c8 152472 495697 77 API calls 2 library calls 152378->152472 152380 4902d3 152473 495666 46 API calls _free 152380->152473 152381 490288 __wsopen_helper 152381->152220 152383 4902d9 152384 4902fc 152383->152384 152386 4902ea 152383->152386 152474 495587 46 API calls _malloc 152384->152474 152475 490346 LeaveCriticalSection LeaveCriticalSection _setvbuf 152386->152475 152387 490302 152387->152386 152391 40a0e6 _memset __crtLCMapStringA_stat 152389->152391 152392 40a1dd 152391->152392 152394 40a16f UnregisterHotKey 152391->152394 152490 404b30 58 API calls __wcsicoll 152391->152490 152393 40a4b4 152392->152393 152396 40a45d UnregisterHotKey 152392->152396 152399 40a431 RegisterHotKey 152392->152399 152491 48fc19 58 API calls 2 library calls 152392->152491 152476 408140 152393->152476 152394->152391 152396->152392 152397 4042c0 152402 423620 152397->152402 152398 40a50e 152398->152397 152400 40a523 SetTimer 152398->152400 152399->152392 152400->152397 152403 423635 152402->152403 152404 42362e 152402->152404 152405 423680 58 API calls 152403->152405 152404->152228 152406 423653 152405->152406 152407 423675 152406->152407 152498 423930 90 API calls 5 library calls 152406->152498 152407->152228 152499 417870 152409->152499 152411 404345 152411->152230 152412->152185 152413->152185 152414->152185 152415->152185 152416->152185 152417->152186 152418->152190 152419->152268 152420->152273 152421->152284 152422->152291 152423->152297 152424->152299 152425->152301 152426->152303 152427->152305 152428->152307 152429->152311 152430->152296 152432 491078 52 API calls 152431->152432 152433 473778 152432->152433 152434 48fca4 _malloc 46 API calls 152433->152434 152435 473792 moneypunct 152433->152435 152434->152435 152435->152316 152436->152321 152437->152323 152438->152331 152439->152328 152440->152327 152441->152332 152442->152335 152443->152337 152445 4781d5 LoadLibraryExW 152444->152445 152447 4781e3 152444->152447 152445->152447 152446 478344 152449 478370 ExtractIconW 152446->152449 152450 47835b ExtractIconW 152446->152450 152458 47838d 152446->152458 152447->152446 152448 4781fb 152447->152448 152451 478209 EnumResourceNamesW 152447->152451 152452 47832c 152448->152452 152453 47823b FindResourceW 152448->152453 152449->152345 152450->152345 152451->152448 152452->152446 152455 47834c FreeLibrary 152452->152455 152453->152452 152454 47824d LoadResource 152453->152454 152454->152452 152456 47825d LockResource 152454->152456 152455->152446 152456->152452 152457 47826e 152456->152457 152459 478284 GetSystemMetrics 152457->152459 152460 478290 152457->152460 152458->152345 152459->152460 152460->152452 152461 4782de FindResourceW 152460->152461 152461->152452 152462 4782f2 LoadResource 152461->152462 152462->152452 152463 4782fe LockResource 152462->152463 152463->152452 152464 47830b SizeofResource CreateIconFromResourceEx 152463->152464 152464->152452 152465->152358 152466->152352 152467->152364 152468->152367 152469->152374 152470->152381 152471->152378 152472->152380 152473->152383 152474->152387 152475->152381 152477 408162 152476->152477 152480 408176 152476->152480 152492 408ed0 60 API calls 152477->152492 152479 40816b 152479->152398 152481 48fca4 _malloc 46 API calls 152480->152481 152489 408202 _memset 152480->152489 152481->152489 152482 4086fc 152488 40871d 152482->152488 152494 490b70 46 API calls __wsopen_helper 152482->152494 152483 408d37 152495 408ed0 60 API calls 152483->152495 152487 408d46 152487->152398 152488->152483 152488->152488 152489->152482 152489->152488 152493 404b30 58 API calls __wcsicoll 152489->152493 152490->152391 152491->152392 152492->152479 152496 409200 15 API calls 152492->152496 152493->152489 152494->152488 152495->152487 152497 409200 15 API calls 152495->152497 152498->152407 152500 48fca4 _malloc 46 API calls 152499->152500 152501 417888 152500->152501 152502 417896 152501->152502 152503 41789d SetTimer 152501->152503 152502->152411 152504 4178de GetTickCount 152503->152504 152508 4178d4 152503->152508 152505 417910 SetTimer 152504->152505 152506 41792c GetTickCount 152504->152506 152505->152506 152507 417958 152506->152507 152507->152508 152509 417968 KillTimer 152507->152509 152512 4179bb moneypunct 152508->152512 152514 490561 46 API calls 2 library calls 152508->152514 152509->152508 152511 417aa7 152511->152411 152512->152511 152515 417af0 98 API calls _wcsncpy 152512->152515 152514->152512 152515->152511
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040141F
                                            • CloseClipboard.USER32 ref: 0040142B
                                            • SetTimer.USER32(000201FC,00000009,0000000A), ref: 004014D4
                                            • GetTickCount.KERNEL32 ref: 004014F9
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 00401540
                                            • GetTickCount.KERNEL32 ref: 0040154B
                                            • GetFocus.USER32 ref: 004015E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseFocusGlobalMessageTimerUnlock
                                            • String ID: #32770$($
                                            • API String ID: 2919891889-2076150920
                                            • Opcode ID: 051e06493d8f332dcaa3daf75cbbeb1ac6d13b62581473dc23e4a76dd9f8ddae
                                            • Instruction ID: c17640c86631ef91bf924e6f65113a71a92f21ef9af2a24d404cb9c54e7460d8
                                            • Opcode Fuzzy Hash: 051e06493d8f332dcaa3daf75cbbeb1ac6d13b62581473dc23e4a76dd9f8ddae
                                            • Instruction Fuzzy Hash: F4928F705083419FD724CF68C988B6ABBE1BB85304F18457EE885A73F1D778E845CB9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 621 403d20-403d55 InitializeCriticalSection SetErrorMode call 442220 624 403dc7 621->624 625 403d57-403d5f 621->625 627 403dcc-403df3 624->627 625->624 626 403d61-403d65 625->626 626->624 628 403d67-403d6a 626->628 629 403f43-403f62 call 423680 627->629 630 403df9 627->630 632 403d70-403d79 628->632 640 403f64-403f87 call 423930 629->640 641 403f8d-403f91 629->641 631 403e00-403e0e 630->631 635 403e14-403e33 call 4901a6 631->635 636 403e98-403ea8 call 48fc19 631->636 632->632 634 403d7b-403d90 call 473700 632->634 654 403d92-403da8 call 430620 634->654 655 403daa-403dac 634->655 652 4042f8-404303 635->652 653 403e39-403e57 call 423680 635->653 649 403f31 636->649 650 403eae-403ebe call 48fc19 636->650 640->641 640->652 647 403f93-403f96 641->647 648 403f98 641->648 651 403f9a-403f9f 647->651 648->651 661 403f36-403f3d 649->661 650->649 672 403ec0-403ed0 call 48fc19 650->672 657 403fb0-403fc5 651->657 658 403fa1-403fad 651->658 675 403e82-403e93 call 4793e0 653->675 676 403e59-403e7c call 423930 653->676 654->627 663 403dbd-403dc5 655->663 664 403dae-403dba call 497c20 655->664 666 403fd4-403fdb 657->666 667 403fc7-403fd2 call 401160 657->667 658->657 661->629 661->631 663->627 664->663 673 403fe1-403fe8 666->673 674 403fdd-403fdf 666->674 682 403ff9-40401b call 423680 667->682 691 403ed2-403ee2 call 48fc19 672->691 692 403f28-403f2f 672->692 673->682 683 403fea-403fec 673->683 674->673 680 403fee-403ff0 674->680 675->661 676->652 676->675 680->682 688 403ff2-403ff4 call 401160 680->688 694 404047-40404b 682->694 695 40401d-404042 call 423930 682->695 683->680 683->682 688->682 691->692 701 403ee4-403ef6 call 48fe1d 691->701 692->661 694->652 698 404051-404071 call 46f750 694->698 695->694 698->652 704 404077-404097 call 479710 call 403bb0 call 417080 698->704 707 403ef8-403efd 701->707 708 403f19-403f26 701->708 704->652 719 40409d-4040b9 call 417e10 704->719 710 403f04 707->710 711 403eff-403f02 707->711 708->661 712 403f06-403f17 call 416700 710->712 711->712 712->661 719->652 722 4040bf-4040c1 719->722 723 4040c3-4040cb 722->723 724 4040ce-4040d5 722->724 725 404112-404115 724->725 726 4040d7-4040e0 724->726 729 404117-40411c 725->729 730 404189-40418e 725->730 727 4040e2-4040e8 726->727 728 404106-404110 726->728 727->728 733 4040ea-4040f0 727->733 728->729 731 404190-4041a6 FindWindowW 729->731 734 40411e-404125 729->734 730->731 732 40420f-404227 SystemParametersInfoW 730->732 731->732 738 4041a8 731->738 735 404229-404230 732->735 736 40423f-40424c call 417290 732->736 733->728 737 4040f2-4040f8 733->737 734->732 739 40412b-404141 FindWindowW 734->739 735->736 740 404232-40423d SystemParametersInfoW 735->740 736->652 751 404252-404271 call 490350 call 49025a 736->751 737->728 743 4040fa-404100 737->743 742 4041ad-4041ce PostMessageW Sleep IsWindow 738->742 739->732 744 404147-40414f 739->744 740->736 746 4041d0-4041d3 742->746 747 40420b-40420d Sleep 742->747 743->728 743->730 744->723 748 404155-404158 744->748 752 4041d5-4041f3 call 47afc0 746->752 753 4041fb-404209 Sleep IsWindow 746->753 747->732 749 404182-404187 748->749 750 40415a-40417c call 47afc0 748->750 749->742 750->723 750->749 763 404273-404289 call 48fca4 751->763 764 404297-40429e 751->764 752->652 761 4041f9 752->761 753->746 753->747 761->753 763->764 771 40428b-404294 call 498770 763->771 765 4042a0-4042b5 InitCommonControlsEx 764->765 766 4042bb-4042e3 call 40a0c0 call 423620 764->766 765->766 776 4042e5 call 403cf0 766->776 777 4042ea call 404310 766->777 771->764 776->777 780 4042ef-4042f5 777->780
                                            APIs
                                            • InitializeCriticalSection.KERNEL32(004C9458), ref: 00403D39
                                            • SetErrorMode.KERNEL32(00000001), ref: 00403D41
                                              • Part of subcall function 00442220: GetCurrentDirectoryW.KERNEL32(00008000,?,?,00403D4E), ref: 00442237
                                            • __wcsicoll.LIBCMT ref: 00403E9E
                                            • __wcsicoll.LIBCMT ref: 00403EB4
                                            • __wcsicoll.LIBCMT ref: 00403EC6
                                            • __wcsicoll.LIBCMT ref: 00403ED8
                                            • __wcsnicmp.LIBCMT ref: 00403EEC
                                            • FindWindowW.USER32(AutoHotkey,023B0158), ref: 00404137
                                            • FindWindowW.USER32(AutoHotkey,023B0158), ref: 0040419C
                                            • PostMessageW.USER32(00000000,00000044,00000406,00000000), ref: 004041B3
                                            • Sleep.KERNEL32(00000014), ref: 004041C3
                                            • IsWindow.USER32(00000000), ref: 004041C6
                                            • Sleep.KERNEL32(00000014), ref: 004041FE
                                            • IsWindow.USER32(00000000), ref: 00404201
                                            • Sleep.KERNEL32(00000064), ref: 0040420D
                                            • SystemParametersInfoW.USER32(00002000,00000000,004C90A4,00000000), ref: 00404223
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040423D
                                            • _setvbuf.LIBCMT ref: 00404261
                                            • _malloc.LIBCMT ref: 0040427A
                                            • _memset.LIBCMT ref: 0040428F
                                            • InitCommonControlsEx.COMCTL32 ref: 004042B5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window__wcsicoll$Sleep$FindInfoParametersSystem$CommonControlsCriticalCurrentDirectoryErrorInitInitializeMessageModePostSection__wcsnicmp_malloc_memset_setvbuf
                                            • String ID: /ErrorStdOut$/force$/restart$A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Clipboard$Could not close the previous instance of this script. Keep waiting?$Out of memory.
                                            • API String ID: 3533460038-3657834485
                                            • Opcode ID: ce4ae06d2b0e2b210ff19182fc2fc78c9cae346bf2a388d5097870e2ff097eae
                                            • Instruction ID: 19c657e957c55ece5ba3bdf52c417eb4c71f6cfeaee47b27091bc999d4e63d3a
                                            • Opcode Fuzzy Hash: ce4ae06d2b0e2b210ff19182fc2fc78c9cae346bf2a388d5097870e2ff097eae
                                            • Instruction Fuzzy Hash: C9E127B06043016BD720AF649C46F2B7BA89B95749F04053FFA41A73D1E7B8DE4087AE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 781 4545d0-4545df 782 4545e1-4545e7 781->782 783 4545ee-4545f1 782->783 784 4545e9-4545ec 782->784 783->782 784->783 785 4545f3-4545f7 784->785 786 454645-454660 InternetOpenW 785->786 787 4545f9-454605 call 40ec60 785->787 788 454662-45466e 786->788 789 4546b8-4546cb InternetOpenUrlW 786->789 798 454607-454614 call 491933 787->798 799 454616-45461c call 490f11 787->799 791 454670-454690 call 4793e0 788->791 792 454693-4546b5 call 42ff70 788->792 794 454705-45471e call 491f99 789->794 795 4546cd-4546e1 InternetCloseHandle 789->795 808 454746-45478a 794->808 809 454720-454743 InternetCloseHandle * 2 call 4329e0 794->809 795->792 801 4546e3-454702 call 4793e0 795->801 816 45461f-45462f call 4098d0 798->816 799->816 814 454790-454793 808->814 815 45483e-454854 InternetReadFileExA 808->815 814->815 820 454799-4547b5 InternetReadFile 814->820 818 454856-45485b 815->818 819 4548d2-4548ed InternetCloseHandle * 2 call 4921ee 815->819 816->786 830 454631 816->830 818->819 822 45485d-454877 GetTickCount 818->822 831 4548ff-45491d call 430010 819->831 832 4548ef-4548fd DeleteFileW 819->832 820->819 823 4547bb-4547c0 820->823 827 4548a3-4548d0 call 492107 InternetReadFileExA 822->827 828 454879-45488e PeekMessageW 822->828 823->819 829 4547c6-4547e0 GetTickCount 823->829 827->818 827->819 833 454890-454899 call 4013d0 828->833 834 45489c-45489e GetTickCount 828->834 835 4547e2-4547f7 PeekMessageW 829->835 836 45480c-454837 call 492107 InternetReadFile 829->836 838 454633-454639 830->838 832->831 833->834 834->827 844 454805-454807 GetTickCount 835->844 845 4547f9-454802 call 4013d0 835->845 836->823 851 454839 836->851 840 454640-454643 838->840 841 45463b-45463e 838->841 840->838 841->786 841->840 844->836 845->844 851->819
                                            APIs
                                            • __wcstoi64.LIBCMT ref: 0045460C
                                            • InternetOpenW.WININET(AutoHotkey,00000004,00000000,00000000,00000000), ref: 00454652
                                              • Part of subcall function 00490F11: __wcstoi64.LIBCMT ref: 00490F1D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcstoi64$InternetOpen
                                            • String ID: ($AutoHotkey
                                            • API String ID: 469112803-2766205875
                                            • Opcode ID: 45b75f5efd0c2ee69ebd9200eb4c0355ec10b853962da110a003773f4ad0e2e6
                                            • Instruction ID: 511ce2a3250b50d758c192210ccdfdc9710fa3806f5c0ae307ade1585caab08e
                                            • Opcode Fuzzy Hash: 45b75f5efd0c2ee69ebd9200eb4c0355ec10b853962da110a003773f4ad0e2e6
                                            • Instruction Fuzzy Hash: 129139726003006BD220EB54DC81F6B77D4ABD5719F14452FFE44AB2D1E7B9988887AE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2027 4781c0-4781d3 2028 4781d5-4781e1 LoadLibraryExW 2027->2028 2029 4781e3 2027->2029 2030 4781e9-4781ef 2028->2030 2029->2030 2031 478357-478359 2030->2031 2032 4781f5-4781f9 2030->2032 2035 478370-47838c ExtractIconW 2031->2035 2036 47835b-47836f ExtractIconW 2031->2036 2033 478202 2032->2033 2034 4781fb-478200 2032->2034 2038 478204 2033->2038 2039 478209-47822c EnumResourceNamesW 2033->2039 2037 478230-478235 2034->2037 2040 478334-47833e 2037->2040 2041 47823b-478247 FindResourceW 2037->2041 2038->2039 2039->2037 2042 478340-478342 2040->2042 2043 478348-47834a 2040->2043 2041->2040 2044 47824d-478257 LoadResource 2041->2044 2042->2043 2045 478344-478346 2042->2045 2046 478353-478355 2043->2046 2047 47834c-47834d FreeLibrary 2043->2047 2044->2040 2048 47825d-478268 LockResource 2044->2048 2045->2046 2046->2031 2050 47838d-478396 2046->2050 2047->2046 2048->2040 2049 47826e-478273 2048->2049 2051 478275-478279 2049->2051 2052 47827d-478282 2049->2052 2051->2052 2053 478284-47828c GetSystemMetrics 2052->2053 2054 478290-47829d 2052->2054 2053->2054 2055 4782a3 2054->2055 2056 47832c-478330 2054->2056 2057 4782a7-4782ac 2055->2057 2056->2040 2058 4782b3-4782b7 2057->2058 2059 4782ae 2057->2059 2060 4782c2-4782c6 2058->2060 2061 4782b9-4782c0 2058->2061 2059->2058 2062 4782c9-4782cb 2060->2062 2061->2062 2063 4782d1-4782d8 2062->2063 2064 4782cd-4782cf 2062->2064 2063->2057 2065 4782da-4782dc 2063->2065 2064->2063 2065->2056 2066 4782de-4782f0 FindResourceW 2065->2066 2066->2056 2067 4782f2-4782fc LoadResource 2066->2067 2067->2056 2068 4782fe-478309 LockResource 2067->2068 2068->2056 2069 47830b-478328 SizeofResource CreateIconFromResourceEx 2068->2069 2069->2056
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,753D4BD0,?,004CB508,00000000,FFFFFF61,00000000,00000000,00000000,004CB508,753D4BD0,004CB508), ref: 004781D9
                                            • EnumResourceNamesW.KERNEL32 ref: 00478226
                                            • FindResourceW.KERNEL32(00400000,00400000,0000000E), ref: 0047823F
                                            • LoadResource.KERNEL32(00400000,00000000), ref: 0047824F
                                            • LockResource.KERNEL32(00000000), ref: 0047825E
                                            • GetSystemMetrics.USER32(0000000B), ref: 00478286
                                            • FindResourceW.KERNEL32(00400000,?,00000003), ref: 004782E6
                                            • LoadResource.KERNEL32(00400000,00000000), ref: 004782F4
                                            • LockResource.KERNEL32(00000000), ref: 004782FF
                                            • SizeofResource.KERNEL32(00400000,00000000,00000001,00030000,00000000,00000000,00000000), ref: 0047831A
                                            • CreateIconFromResourceEx.USER32(00000000,00000000), ref: 00478322
                                            • FreeLibrary.KERNEL32(00400000), ref: 0047834D
                                            • ExtractIconW.SHELL32(00000000,?,?), ref: 00478362
                                            • ExtractIconW.SHELL32(00000000,?,-00000001), ref: 0047837F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$IconLoad$ExtractFindLibraryLock$CreateEnumFreeFromMetricsNamesSizeofSystem
                                            • String ID:
                                            • API String ID: 2349713634-0
                                            • Opcode ID: 048a3a54ad9021aff99276b9801c452cb05ba59a72117d3b1ce05db86fb240f6
                                            • Instruction ID: ddda88a0a171fd663872b22fb917e663124b121c35252d310746a5e8971c997b
                                            • Opcode Fuzzy Hash: 048a3a54ad9021aff99276b9801c452cb05ba59a72117d3b1ce05db86fb240f6
                                            • Instruction Fuzzy Hash: 065128356853106BD3205F689C4CBBBBB98EB89B51F44892FFD49D2291DB7CC80186A9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3387 477170-47718e 3388 477190-47719c 3387->3388 3389 47719d-4771a2 3387->3389 3390 4771a4-4771a9 3389->3390 3391 4771dc-4771ee call 491a25 3389->3391 3390->3391 3392 4771ab-4771b3 3390->3392 3391->3388 3399 4771f0-477200 call 490a41 3391->3399 3394 4771c7-4771da 3392->3394 3395 4771b5-4771c2 call 490ebe 3392->3395 3398 477237-477246 call 490a41 3394->3398 3395->3394 3404 4771c4 3395->3404 3408 4772df-4772e3 3398->3408 3409 47724c 3398->3409 3406 477217-477223 3399->3406 3407 477202-477212 call 490a41 3399->3407 3404->3394 3406->3388 3411 477229-477234 call 497c20 3406->3411 3407->3406 3419 477214 3407->3419 3412 477345-477361 3408->3412 3413 4772e5-4772fb FindFirstFileW 3408->3413 3414 477250-477273 FindFirstFileW 3409->3414 3411->3398 3413->3388 3417 477301-47730f FindClose 3413->3417 3414->3388 3418 477279-477284 FindClose 3414->3418 3421 477310-477319 3417->3421 3422 477287-477290 3418->3422 3419->3406 3421->3421 3424 47731b-477328 3421->3424 3422->3422 3423 477292-4772a2 3422->3423 3423->3388 3425 4772a8-4772d9 call 497c20 call 490a41 3423->3425 3424->3388 3426 47732e-477343 call 497c20 3424->3426 3425->3408 3425->3414 3426->3412
                                            APIs
                                            • _wcschr.LIBCMT ref: 0047723A
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004CB508), ref: 00477262
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004CB508), ref: 0047727A
                                            • _wcschr.LIBCMT ref: 004772CD
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004CB508), ref: 004772F2
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004CB508), ref: 00477302
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFileFirst_wcschr
                                            • String ID:
                                            • API String ID: 1717823228-0
                                            • Opcode ID: bb8840001aca15b1d9c53c9927e5d2b3bef0dcdd194a184511ab2478488e10e6
                                            • Instruction ID: 83c57101cf1baddc5cda1578e358c0cd2aa86382bd672b015f0fc99a57747e32
                                            • Opcode Fuzzy Hash: bb8840001aca15b1d9c53c9927e5d2b3bef0dcdd194a184511ab2478488e10e6
                                            • Instruction Fuzzy Hash: 93512B365043019BCB10AB60CC85BE777A8EF94314F85C92AFD589B392F778D90987D9
                                            APIs
                                            • CLSIDFromString.OLE32(?,?), ref: 0045648F
                                            • CLSIDFromProgID.COMBASE(004A3890,?), ref: 004564B8
                                            • CLSIDFromString.OLE32(004A3890,?), ref: 0045654E
                                            • CoCreateInstance.OLE32(?,00000000,00000015,?,?), ref: 0045656F
                                            • CoCreateInstance.OLE32(?,00000000,00000015,004BF1B0,?), ref: 004565A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: From$CreateInstanceString$Prog
                                            • String ID:
                                            • API String ID: 3834119650-0
                                            • Opcode ID: 2caf9f07a21217bbb55fc8bc2def97bde76f671f012690214e3d876ce7572556
                                            • Instruction ID: 1e2d796b76f7073d299edd74a2dbae3de67f53d7d8225a3891cb984c16471ea0
                                            • Opcode Fuzzy Hash: 2caf9f07a21217bbb55fc8bc2def97bde76f671f012690214e3d876ce7572556
                                            • Instruction Fuzzy Hash: 9E51F1706042049BDB148F18D844B27B7E4AB4631AF9581AFFC498B352D339ED4AC79E
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,?), ref: 0047711E
                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 0047712A
                                            • GetFileAttributesW.KERNEL32(00000000,?,?,?), ref: 00477145
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID: \\?\
                                            • API String ID: 48322524-4282027825
                                            • Opcode ID: f9d28f410f3c2a2c6cffb47fcff3e5785957c4cdb329ea3f69a4ebec03519aa5
                                            • Instruction ID: 67e671ad70fb2bd755f551236e9da5c240c8b9bf29b10deae060ea40fdc1fb43
                                            • Opcode Fuzzy Hash: f9d28f410f3c2a2c6cffb47fcff3e5785957c4cdb329ea3f69a4ebec03519aa5
                                            • Instruction Fuzzy Hash: 8401F735600A1157D7216A249C896EB3754EF85320FD4C626EC6CD23D0EB3C8C46939D
                                            APIs
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0043B7A1
                                            • DefWindowProcW.USER32(?,?,?,?), ref: 0043BE23
                                              • Part of subcall function 00417AF0: _wcsncpy.LIBCMT ref: 00417B43
                                              • Part of subcall function 00417AF0: SetCurrentDirectoryW.KERNEL32(004A3890,00000000,?,023A50F0,00000000), ref: 00417BAF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$CurrentDirectoryMessageProcRegister_wcsncpy
                                            • String ID: TaskbarCreated
                                            • API String ID: 4277639754-2362178303
                                            • Opcode ID: 14646357b3904c74b70c3b3d10b4d36e829de5070795bf67238526b000b841a3
                                            • Instruction ID: 7ec160cd6dff5e23fdfc1ff990be64f2ab95c3da9a6b7e6da61a6dd844015197
                                            • Opcode Fuzzy Hash: 14646357b3904c74b70c3b3d10b4d36e829de5070795bf67238526b000b841a3
                                            • Instruction Fuzzy Hash: 2852C3727002049FD720DF69EC85FAB77A8EB88311F14452BFA46D7391D735AC508BA9

                                            Control-flow Graph

                                            APIs
                                            • _memset.LIBCMT ref: 004172C1
                                              • Part of subcall function 004781C0: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,753D4BD0,?,004CB508,00000000,FFFFFF61,00000000,00000000,00000000,004CB508,753D4BD0,004CB508), ref: 004781D9
                                              • Part of subcall function 004781C0: FindResourceW.KERNEL32(00400000,00400000,0000000E), ref: 0047823F
                                              • Part of subcall function 004781C0: LoadResource.KERNEL32(00400000,00000000), ref: 0047824F
                                              • Part of subcall function 004781C0: LockResource.KERNEL32(00000000), ref: 0047825E
                                              • Part of subcall function 004781C0: GetSystemMetrics.USER32(0000000B), ref: 00478286
                                              • Part of subcall function 004781C0: FindResourceW.KERNEL32(00400000,?,00000003), ref: 004782E6
                                              • Part of subcall function 004781C0: LoadResource.KERNEL32(00400000,00000000), ref: 004782F4
                                              • Part of subcall function 004781C0: LockResource.KERNEL32(00000000), ref: 004782FF
                                            • GetSystemMetrics.USER32(00000031), ref: 0041730B
                                              • Part of subcall function 004781C0: EnumResourceNamesW.KERNEL32 ref: 00478226
                                              • Part of subcall function 004781C0: SizeofResource.KERNEL32(00400000,00000000,00000001,00030000,00000000,00000000,00000000), ref: 0047831A
                                              • Part of subcall function 004781C0: CreateIconFromResourceEx.USER32(00000000,00000000), ref: 00478322
                                              • Part of subcall function 004781C0: ExtractIconW.SHELL32(00000000,?,?), ref: 00478362
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0041733B
                                            • RegisterClassExW.USER32 ref: 00417360
                                            • RegisterClassExW.USER32(?), ref: 004173A8
                                            • GetForegroundWindow.USER32 ref: 004173AF
                                            • GetClassNameW.USER32(00000000,?,00000040), ref: 004173C1
                                            • __wcsicoll.LIBCMT ref: 004173D5
                                            • CreateWindowExW.USER32(00000001,AutoHotkey,?,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00400000,00000000), ref: 00417434
                                            • GetMenu.USER32(00000000), ref: 0041745B
                                            • EnableMenuItem.USER32(00000000,0000FF79,00000003), ref: 0041746B
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50A00804,00000000,00000000,00000000,00000000,000201FC,00000001,00400000,00000000), ref: 004174A3
                                            • GetDC.USER32(00000000), ref: 004174AF
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004174E8
                                            • MulDiv.KERNEL32(0000000A,00000000), ref: 004174F1
                                            • CreateFontW.GDI32(00000000), ref: 004174FA
                                            • ReleaseDC.USER32(0003043A,00000000), ref: 0041750C
                                            • SendMessageW.USER32(0003043A,00000030,9E0A0E42,00000000), ref: 0041752A
                                            • SendMessageW.USER32(0003043A,000000C5,00000000,00000000), ref: 0041753B
                                            • ShowWindow.USER32(000201FC,00000000), ref: 0041754C
                                            • ShowWindow.USER32(000201FC,00000000), ref: 00417557
                                            • ShowWindow.USER32(000201FC,00000006), ref: 00417568
                                            • SetWindowLongW.USER32(000201FC,000000EC,00000000), ref: 00417575
                                            • LoadAcceleratorsW.USER32(00400000,000000D4), ref: 00417587
                                              • Part of subcall function 004176C0: _memset.LIBCMT ref: 004176D0
                                              • Part of subcall function 004176C0: _wcsncpy.LIBCMT ref: 00417742
                                              • Part of subcall function 004176C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00417755
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$Window$Load$Create$ClassIconShow$FindLockMenuMessageMetricsRegisterSendSystem_memset$AcceleratorsCapsCursorDeviceEnableEnumExtractFontForegroundFromItemLibraryLongNameNamesNotifyReleaseShell_Sizeof__wcsicoll_wcsncpy
                                            • String ID: 0$AutoHotkey$AutoHotkey2$Consolas$CreateWindow$Lucida Console$RegClass$Shell_TrayWnd$edit
                                            • API String ID: 2663150501-3882032541
                                            • Opcode ID: a859c8a00cbc69611a0eea23d238f97866340177c1da3e387591ca0d7fc89e2c
                                            • Instruction ID: c4a391df5bc3dd0045b20c79f103117fff068bb8be1f86ddeed78df9e62d10ae
                                            • Opcode Fuzzy Hash: a859c8a00cbc69611a0eea23d238f97866340177c1da3e387591ca0d7fc89e2c
                                            • Instruction Fuzzy Hash: C881F670B48300BFE7209B64DC4AF967BB4EB45744F14452EFA44A72D0D7B8A854CB6E
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 004014F9
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 00401540
                                            • GetTickCount.KERNEL32 ref: 0040154B
                                            • GetForegroundWindow.USER32 ref: 00401C8E
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401CA1
                                            • GetClassNameW.USER32(00000000,?,00000020), ref: 00401CBE
                                            • IsDialogMessageW.USER32(00000000,?), ref: 00402F39
                                            • SetCurrentDirectoryW.KERNEL32(004A3890), ref: 00402F61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountMessageTickWindow$ClassCurrentDialogDirectoryForegroundNameProcessThread
                                            • String ID: #32770$($
                                            • API String ID: 3752270653-2076150920
                                            • Opcode ID: 891610f23284f0dc155f3508c5861c2f589933b7554299101bf17fe4d1020f28
                                            • Instruction ID: c717b072d53977dded448c521543f2fdc67cbae5896261c1b276aef6ab5f8f43
                                            • Opcode Fuzzy Hash: 891610f23284f0dc155f3508c5861c2f589933b7554299101bf17fe4d1020f28
                                            • Instruction Fuzzy Hash: A4129E719083418BD7218F68C588A6BB7E1BB85304F59457FE885A73F1D778EC42CB8A
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                              • Part of subcall function 00416240: __fassign.LIBCMT ref: 00416250
                                            • __wcsicoll.LIBCMT ref: 004276EE
                                              • Part of subcall function 0042EA90: _wcsncpy.LIBCMT ref: 0042EB43
                                              • Part of subcall function 0042EA90: _wcschr.LIBCMT ref: 0042EB8A
                                              • Part of subcall function 0042EA90: _memmove.LIBCMT ref: 0042EBD6
                                              • Part of subcall function 0042EA90: _wcschr.LIBCMT ref: 0042EBE3
                                            • __wcsicoll.LIBCMT ref: 0042747E
                                              • Part of subcall function 004159B0: __wcsicoll.LIBCMT ref: 00415ABC
                                              • Part of subcall function 004159B0: __wcsicoll.LIBCMT ref: 00415AD4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$CountTick_wcschr$ClipboardCloseGlobalMessagePeekUnlock__fassign_memmove_wcsncpy
                                            • String ID: $cJ$CSV$Parameter #2 invalid.$Parameter #3 invalid.$Read$v1j
                                            • API String ID: 1197092883-423423522
                                            • Opcode ID: 95d4efba3d1e22a3e1b8d808e35dae841c55cf83beddb207a5a14c445dc76007
                                            • Instruction ID: 81533ff737187c5554f09210e9d8bf06e33d38ca1a8986d2c8c61e5f12c412f5
                                            • Opcode Fuzzy Hash: 95d4efba3d1e22a3e1b8d808e35dae841c55cf83beddb207a5a14c445dc76007
                                            • Instruction Fuzzy Hash: 9B32CB71608350DFD724CF64E880F6BB7E5AB88314F50892EF98587391D778E885CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID: A$SMHD$v1j
                                            • API String ID: 269201875-3925140012
                                            • Opcode ID: 978318b576444ef6d9f0e20db79651e2ce52bdda614da1b976fbec298f6571a8
                                            • Instruction ID: 1966955e6f4b4ddd05699856f2ef6d4797c23de199e38c924a273258681dba29
                                            • Opcode Fuzzy Hash: 978318b576444ef6d9f0e20db79651e2ce52bdda614da1b976fbec298f6571a8
                                            • Instruction Fuzzy Hash: 9842CF70708360CBD724DF21E881B6BB7E1BB84314F95496EF48597392DB38D885CB9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1788 42ac4d-42ac65 call 48fe1d 1791 42ad36-42ad4d call 48fe1d 1788->1791 1792 42ac6b-42ac78 call 4230d0 1788->1792 1797 42ad87-42b3f2 call 430370 call 4779a0 1791->1797 1798 42ad4f-42ad5e 1791->1798 1799 42ac7e-42aca3 call 423160 call 490a41 1792->1799 1800 42826d-428271 1792->1800 1821 428bb9-428bc2 1797->1821 1864 42b3f8-42b402 1797->1864 1798->1797 1803 42ad60-42ad67 1798->1803 1817 42acb3-42acb5 1799->1817 1818 42aca5-42acb1 call 414d50 1799->1818 1801 428277 1800->1801 1802 42b49d-42b4b3 1800->1802 1807 42827a 1801->1807 1803->1797 1808 42ad6e-42ad75 1803->1808 1809 42ad7f-42ad81 1803->1809 1812 42827e-428284 1807->1812 1808->1809 1809->1797 1815 427121 1812->1815 1816 42828a-42828e 1812->1816 1819 427126-42713a 1815->1819 1820 426e50-426e57 1816->1820 1816->1821 1824 42acb7-42acc5 1817->1824 1818->1824 1825 426e8a-426ea4 GetTickCount 1820->1825 1826 426e59-426e60 1820->1826 1830 42acc7 1824->1830 1831 42acd9-42acf5 call 4761c0 1824->1831 1827 426ea6-426ebe PeekMessageW 1825->1827 1828 426ed7-426ede 1825->1828 1832 426e62-426e6e GlobalUnlock 1826->1832 1833 426e78-426e85 CloseClipboard 1826->1833 1834 426ec0-426ec9 call 4013d0 1827->1834 1835 426ecc-426ed2 GetTickCount 1827->1835 1836 426ee0-426ee7 1828->1836 1837 426f08-426f10 1828->1837 1830->1821 1838 42accd-42acd3 1830->1838 1853 42acf7 1831->1853 1854 42acfc-42ad03 1831->1854 1832->1833 1833->1825 1834->1835 1835->1828 1836->1837 1842 426ee9-426ef2 1836->1842 1843 426f12 1837->1843 1844 426f2b-426f31 1837->1844 1838->1821 1838->1831 1842->1837 1850 426ef4-426ef9 1842->1850 1851 426f14-426f17 1843->1851 1852 426f19-426f1f 1843->1852 1847 426f33-426f3b 1844->1847 1848 426f49-426f50 1844->1848 1847->1848 1856 426f3d-426f46 call 4013d0 1847->1856 1857 426f52-426f68 call 4013d0 1848->1857 1858 426f6a-426f77 1848->1858 1859 426f04-426f05 1850->1859 1860 426efb-426f02 1850->1860 1851->1844 1851->1852 1852->1856 1861 426f21 1852->1861 1853->1854 1862 42ad05 1854->1862 1863 42ad0a-42ad31 call 4901a6 1854->1863 1856->1848 1857->1858 1868 426fb2-426fb6 1858->1868 1869 426f79-426fa6 GetTickCount 1858->1869 1859->1837 1860->1837 1861->1844 1870 426f23-426f29 1861->1870 1862->1863 1863->1800 1875 426fb8-426fba 1868->1875 1876 426fd9-426fe5 1868->1876 1869->1868 1874 426fa8 1869->1874 1870->1844 1870->1856 1874->1868 1875->1876 1879 426fbc-426fbe 1875->1879 1877 426feb-426fee 1876->1877 1878 42713d-427155 1876->1878 1877->1878 1880 426ff4-42700b call 42be00 1877->1880 1885 427226-42723d 1878->1885 1886 42715c-427173 1878->1886 1879->1876 1882 426fc0-426fd3 call 45c280 1879->1882 1896 427011-427017 1880->1896 1897 42709f-4270a9 1880->1897 1882->1802 1882->1876 1891 427257-427261 1885->1891 1892 42723f-427251 call 444790 1885->1892 1889 427175-427187 1886->1889 1890 4271e9-4271fd call 444790 1886->1890 1898 427189-427195 1889->1898 1899 42719f-4271aa call 401290 1889->1899 1910 42b7f4-42b80a 1890->1910 1911 427203-42720a 1890->1911 1893 427267-427274 1891->1893 1894 42b4dd 1891->1894 1892->1891 1892->1910 1893->1894 1901 42727a-42727e 1893->1901 1907 42b4e0-42b4e6 1894->1907 1905 427019-42701c 1896->1905 1906 42703f-427051 call 426df0 1896->1906 1903 427117-42711b 1897->1903 1904 4270ab-4270b1 1897->1904 1898->1899 1923 4271c2-4271c4 1899->1923 1924 4271ac-4271b8 1899->1924 1901->1812 1903->1812 1903->1815 1912 4270b3 1904->1912 1913 4270d5-4270e7 call 426df0 1904->1913 1914 427020-42703b call 426df0 1905->1914 1930 427055-427057 1906->1930 1917 42721f-427221 1911->1917 1918 42720c-427216 call 444850 1911->1918 1919 4270b6-4270d1 call 426df0 1912->1919 1935 4270eb-4270ef 1913->1935 1934 42703d 1914->1934 1917->1899 1918->1917 1939 427218-42721a 1918->1939 1940 4270d3 1919->1940 1923->1802 1925 4271ca-4271cd 1923->1925 1924->1923 1925->1802 1931 4271d3-4271d7 1925->1931 1930->1812 1936 42705d-427061 1930->1936 1937 42b4b6-42b4be 1931->1937 1938 4271dd-4271e4 1931->1938 1934->1930 1941 42b497-42b49b 1935->1941 1942 4270f5-4270f8 1935->1942 1936->1941 1943 427067-42706a 1936->1943 1937->1819 1946 42b4c4-42b4da 1937->1946 1938->1807 1939->1898 1940->1935 1941->1802 1942->1941 1944 4270fe-427100 1942->1944 1943->1941 1945 427070-427072 1943->1945 1947 427106-42710c 1944->1947 1948 427f0a-427f11 1944->1948 1949 427074-42707a 1945->1949 1950 427085-42708f 1945->1950 1947->1907 1951 427112 1947->1951 1948->1807 1948->1812 1949->1907 1952 427080 1949->1952 1950->1812 1953 427095-42709a 1950->1953 1951->1807 1952->1807 1953->1807
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • GetTickCount.KERNEL32 ref: 00426F86
                                            • __wcsnicmp.LIBCMT ref: 0042AC5B
                                            • _wcschr.LIBCMT ref: 0042AC93
                                              • Part of subcall function 00414D50: __wcstoi64.LIBCMT ref: 00414D60
                                            • __wcsnicmp.LIBCMT ref: 0042AD43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$__wcsnicmp$ClipboardCloseGlobalMessagePeekUnlock__wcstoi64_wcschr
                                            • String ID: $cJ$%%%s%s%s$Float$Integer$v1j
                                            • API String ID: 3735567320-2576696436
                                            • Opcode ID: 5c807fafef20308e732769182f0a2e435d3454c7f3d810d725c8fd0866ded791
                                            • Instruction ID: 4b65478055d3a066ae23ab8b16bd8b60f94c82c132972d64c1aa03a91121abf7
                                            • Opcode Fuzzy Hash: 5c807fafef20308e732769182f0a2e435d3454c7f3d810d725c8fd0866ded791
                                            • Instruction Fuzzy Hash: 219122317043619BDB24CF61FC85B6A37A2AB41318F96052EF955873E2D77CA840CB9E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1954 472da0-472dc3 call 414dc0 1957 472dc5 1954->1957 1958 472df8-472e23 RegOpenKeyExW 1954->1958 1959 472dcd 1957->1959 1960 472e25-472e43 RegQueryValueExW 1958->1960 1961 472e98-472e9d 1958->1961 1963 472dd1-472df5 call 430010 1959->1963 1964 472e45-472e4d 1960->1964 1965 472e8d-472e91 1960->1965 1961->1959 1962 472ea3-472ea9 GetLastError 1961->1962 1962->1963 1968 473117-47312a RegCloseKey 1964->1968 1969 472e53 1964->1969 1966 472e92 RegCloseKey 1965->1966 1966->1961 1968->1959 1969->1968 1971 472eae-472ec8 RegQueryValueExW 1969->1971 1972 472fee-473008 1969->1972 1973 472e5a-472e7c 1969->1973 1974 472fe4-472fe9 1971->1974 1975 472ece-472ed4 1971->1975 1972->1974 1979 47300a-473010 1972->1979 1973->1965 1981 472e7e-472e88 call 4010e0 1973->1981 1974->1966 1975->1974 1977 472eda-472eef call 4793e0 1975->1977 1986 472f07-472f3b call 401220 RegQueryValueExW RegCloseKey 1977->1986 1987 472ef1-472f04 RegCloseKey 1977->1987 1979->1974 1982 473012-473025 call 4793e0 1979->1982 1981->1965 1990 473027-47303a RegCloseKey 1982->1990 1991 47303d-473081 call 401220 RegCloseKey 1982->1991 1994 472f3d-472f43 1986->1994 1995 472f7a-472f80 1986->1995 1991->1961 2007 473087-4730a1 1991->2007 1994->1995 1998 472f45-472f5b 1994->1998 1996 472f83-472f88 1995->1996 1999 472f90-472f99 1996->1999 1998->1996 2000 472f5d-472f5f 1998->2000 1999->1999 2002 472f9b-472fac call 4151d0 1999->2002 2001 472f60-472f64 2000->2001 2004 472f66-472f73 2001->2004 2005 472f75-472f78 2001->2005 2013 472fb1-472fb5 2002->2013 2014 472fae 2002->2014 2004->1996 2004->2005 2005->2001 2008 4730d3-4730e0 2007->2008 2009 4730a3-4730d1 2007->2009 2011 4730e5-4730e9 2008->2011 2012 4730e2 2008->2012 2009->2008 2009->2009 2015 47310e-473112 2011->2015 2016 4730eb-4730f1 2011->2016 2012->2011 2017 472fb7-472fbe 2013->2017 2018 472fdb-472fdf 2013->2018 2014->2013 2015->1959 2016->2015 2019 4730f3-4730ff call 4046c0 2016->2019 2017->2018 2020 472fc0-472fcc call 4046c0 2017->2020 2018->1961 2019->1959 2025 473105-47310b 2019->2025 2020->1961 2026 472fd2-472fd8 2020->2026
                                            APIs
                                            • RegOpenKeyExW.KERNEL32(?,?,00000000,00000000,?), ref: 00472E17
                                            • RegQueryValueExW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,?), ref: 00472E39
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenQueryValue
                                            • String ID: 0123456789ABCDEF$W
                                            • API String ID: 4153817207-1680953536
                                            • Opcode ID: 5b8f8fb0e62c09d1a26544afe6ace262212e2574f0744f00af8e3db05eef9e6f
                                            • Instruction ID: 3d0b4e3b83c5a0b3213536c5a8a83579687e3827d1c13e2dbf78f5734f0e1225
                                            • Opcode Fuzzy Hash: 5b8f8fb0e62c09d1a26544afe6ace262212e2574f0744f00af8e3db05eef9e6f
                                            • Instruction Fuzzy Hash: 78B1A0716083019BD724DF24DC85FAB77E8EB88344F00892EF589DB291D6B8D945C7AA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2070 427284-42729d 2071 4272cf-4272de 2070->2071 2072 42729f-4272a9 2070->2072 2075 4273d7-4273f4 call 430010 2071->2075 2076 4272e4-4272ed 2071->2076 2073 4272ab-4272b3 2072->2073 2074 4272cd 2072->2074 2073->2074 2077 4272b5-4272c4 call 48fc19 2073->2077 2074->2071 2086 42b4b6-42b4be 2075->2086 2087 4273fa-427405 2075->2087 2079 427305 2076->2079 2080 4272ef-4272ff call 48fc19 2076->2080 2077->2071 2090 4272c6-4272cb 2077->2090 2084 427307-42731f call 47c410 2079->2084 2080->2079 2094 427301-427303 2080->2094 2084->2075 2096 427325-42732d 2084->2096 2092 427126-42713a 2086->2092 2093 42b4c4-42b4da 2086->2093 2091 42827e-428284 2087->2091 2090->2074 2090->2077 2097 427121 2091->2097 2098 42828a-42828e 2091->2098 2094->2084 2099 427375-42737d 2096->2099 2100 42732f-427338 2096->2100 2097->2092 2101 426e50-426e57 2098->2101 2102 428bb9-428bc2 2098->2102 2105 427383-42738a call 444850 2099->2105 2106 42740a-42740c 2099->2106 2103 42733a 2100->2103 2104 42734b-427372 call 430370 2100->2104 2107 426e8a-426ea4 GetTickCount 2101->2107 2108 426e59-426e60 2101->2108 2111 427340-427342 2103->2111 2105->2106 2130 42738c-427397 2105->2130 2113 4273a1-4273ae call 401290 2106->2113 2114 42827a 2106->2114 2109 426ea6-426ebe PeekMessageW 2107->2109 2110 426ed7-426ede 2107->2110 2116 426e62-426e6e GlobalUnlock 2108->2116 2117 426e78-426e85 CloseClipboard 2108->2117 2118 426ec0-426ec9 call 4013d0 2109->2118 2119 426ecc-426ed2 GetTickCount 2109->2119 2121 426ee0-426ee7 2110->2121 2122 426f08-426f10 2110->2122 2111->2099 2120 427344-427349 2111->2120 2132 4273b0-4273bc 2113->2132 2133 4273c6-4273c8 2113->2133 2114->2091 2116->2117 2117->2107 2118->2119 2119->2110 2120->2104 2120->2111 2121->2122 2127 426ee9-426ef2 2121->2127 2128 426f12 2122->2128 2129 426f2b-426f31 2122->2129 2127->2122 2137 426ef4-426ef9 2127->2137 2138 426f14-426f17 2128->2138 2139 426f19-426f1f 2128->2139 2134 426f33-426f3b 2129->2134 2135 426f49-426f50 2129->2135 2130->2113 2132->2133 2140 4273ce-4273d1 2133->2140 2141 42b49d-42b4b3 2133->2141 2134->2135 2142 426f3d-426f46 call 4013d0 2134->2142 2143 426f52-426f68 call 4013d0 2135->2143 2144 426f6a-426f77 2135->2144 2145 426f04-426f05 2137->2145 2146 426efb-426f02 2137->2146 2138->2129 2138->2139 2139->2142 2147 426f21 2139->2147 2140->2075 2140->2141 2142->2135 2143->2144 2150 426fb2-426fb6 2144->2150 2151 426f79-426fa6 GetTickCount 2144->2151 2145->2122 2146->2122 2147->2129 2152 426f23-426f29 2147->2152 2156 426fb8-426fba 2150->2156 2157 426fd9-426fe5 2150->2157 2151->2150 2155 426fa8 2151->2155 2152->2129 2152->2142 2155->2150 2156->2157 2160 426fbc-426fbe 2156->2160 2158 426feb-426fee 2157->2158 2159 42713d-427155 2157->2159 2158->2159 2161 426ff4-42700b call 42be00 2158->2161 2166 427226-42723d 2159->2166 2167 42715c-427173 2159->2167 2160->2157 2163 426fc0-426fd3 call 45c280 2160->2163 2177 427011-427017 2161->2177 2178 42709f-4270a9 2161->2178 2163->2141 2163->2157 2172 427257-427261 2166->2172 2173 42723f-427251 call 444790 2166->2173 2170 427175-427187 2167->2170 2171 4271e9-4271fd call 444790 2167->2171 2179 427189-427195 2170->2179 2180 42719f-4271aa call 401290 2170->2180 2191 42b7f4-42b80a 2171->2191 2192 427203-42720a 2171->2192 2174 427267-427274 2172->2174 2175 42b4dd 2172->2175 2173->2172 2173->2191 2174->2175 2182 42727a-42727e 2174->2182 2188 42b4e0-42b4e6 2175->2188 2186 427019-42701c 2177->2186 2187 42703f-427051 call 426df0 2177->2187 2184 427117-42711b 2178->2184 2185 4270ab-4270b1 2178->2185 2179->2180 2204 4271c2-4271c4 2180->2204 2205 4271ac-4271b8 2180->2205 2182->2091 2184->2091 2184->2097 2193 4270b3 2185->2193 2194 4270d5-4270e7 call 426df0 2185->2194 2195 427020-42703b call 426df0 2186->2195 2211 427055-427057 2187->2211 2198 42721f-427221 2192->2198 2199 42720c-427216 call 444850 2192->2199 2200 4270b6-4270d1 call 426df0 2193->2200 2216 4270eb-4270ef 2194->2216 2215 42703d 2195->2215 2198->2180 2199->2198 2219 427218-42721a 2199->2219 2220 4270d3 2200->2220 2204->2141 2206 4271ca-4271cd 2204->2206 2205->2204 2206->2141 2212 4271d3-4271d7 2206->2212 2211->2091 2217 42705d-427061 2211->2217 2212->2086 2218 4271dd-4271e4 2212->2218 2215->2211 2221 42b497-42b49b 2216->2221 2222 4270f5-4270f8 2216->2222 2217->2221 2223 427067-42706a 2217->2223 2218->2114 2219->2179 2220->2216 2221->2141 2222->2221 2224 4270fe-427100 2222->2224 2223->2221 2225 427070-427072 2223->2225 2226 427106-42710c 2224->2226 2227 427f0a-427f11 2224->2227 2228 427074-42707a 2225->2228 2229 427085-42708f 2225->2229 2226->2188 2230 427112 2226->2230 2227->2091 2227->2114 2228->2188 2231 427080 2228->2231 2229->2091 2232 427095-42709a 2229->2232 2230->2114 2231->2114 2232->2114
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • __wcsicoll.LIBCMT ref: 004272BA
                                            • __wcsicoll.LIBCMT ref: 004272F5
                                            Strings
                                            • A Goto/Gosub must not jump into a block that doesn't enclose it., xrefs: 00427352
                                            • $cJ, xrefs: 0042729F
                                            • v1j, xrefs: 00426EA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick__wcsicoll$ClipboardCloseGlobalMessagePeekUnlock
                                            • String ID: $cJ$A Goto/Gosub must not jump into a block that doesn't enclose it.$v1j
                                            • API String ID: 3567954741-3836395255
                                            • Opcode ID: 55f36eeaf0d086d39213d42289d4d105e4e73a9abe3f5039bb3b30855ece2361
                                            • Instruction ID: 1d1e4a4402f9fb7a7c5af05af5215c105d02ba1cf2fa55c2ece5096d2f24686a
                                            • Opcode Fuzzy Hash: 55f36eeaf0d086d39213d42289d4d105e4e73a9abe3f5039bb3b30855ece2361
                                            • Instruction Fuzzy Hash: E2B10F317083608BDB24CF65F880B6B77A6FB81314F96452EE959873A2D738E840CB5D
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • _free.LIBCMT ref: 00427ACC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_free
                                            • String ID: Jumps cannot exit a FINALLY block.$v1j
                                            • API String ID: 1585972641-1623723626
                                            • Opcode ID: d2a66fd0cc74bb7ed28043191c92915ac62bdabfee8337be8665f4c07e45aeb8
                                            • Instruction ID: 243a7bb7935039845f492452cca96680bd2741c6a1556b804308f8f06d32d09a
                                            • Opcode Fuzzy Hash: d2a66fd0cc74bb7ed28043191c92915ac62bdabfee8337be8665f4c07e45aeb8
                                            • Instruction Fuzzy Hash: 6BD1C371B08350CFDB24CF64E880B6B77E1FB85314F91496EE89987391D779A840CB5A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2419 42b16b-42b173 2420 42b194-42b1b5 call 4159b0 2419->2420 2421 42b175-42b17a 2419->2421 2427 42b1b7-42b1c6 2420->2427 2428 42b1c8 2420->2428 2421->2420 2422 42b17c-42b18f call 472da0 2421->2422 2422->2420 2429 42b1cd-42b1dd call 472da0 2427->2429 2428->2429 2432 42b1e3-42b1e5 2429->2432 2433 428265-428267 2429->2433 2432->2433 2434 42b1eb-42b1f2 RegCloseKey 2432->2434 2435 42b49d-42b4b3 2433->2435 2436 42826d-428271 2433->2436 2434->2433 2436->2435 2437 428277 2436->2437 2438 42827a 2437->2438 2439 42827e-428284 2438->2439 2440 427121 2439->2440 2441 42828a-42828e 2439->2441 2442 427126-42713a 2440->2442 2443 426e50-426e57 2441->2443 2444 428bb9-428bc2 2441->2444 2445 426e8a-426ea4 GetTickCount 2443->2445 2446 426e59-426e60 2443->2446 2447 426ea6-426ebe PeekMessageW 2445->2447 2448 426ed7-426ede 2445->2448 2449 426e62-426e6e GlobalUnlock 2446->2449 2450 426e78-426e85 CloseClipboard 2446->2450 2451 426ec0-426ec4 call 4013d0 2447->2451 2452 426ecc-426ed2 GetTickCount 2447->2452 2453 426ee0-426ee7 2448->2453 2454 426f08-426f10 2448->2454 2449->2450 2450->2445 2461 426ec9 2451->2461 2452->2448 2453->2454 2456 426ee9-426ef2 2453->2456 2457 426f12 2454->2457 2458 426f2b-426f31 2454->2458 2456->2454 2462 426ef4-426ef9 2456->2462 2463 426f14-426f17 2457->2463 2464 426f19-426f1f 2457->2464 2459 426f33-426f3b 2458->2459 2460 426f49-426f50 2458->2460 2459->2460 2465 426f3d-426f41 call 4013d0 2459->2465 2466 426f52-426f68 call 4013d0 2460->2466 2467 426f6a-426f77 2460->2467 2461->2452 2468 426f04-426f05 2462->2468 2469 426efb-426f02 2462->2469 2463->2458 2463->2464 2464->2465 2470 426f21 2464->2470 2476 426f46 2465->2476 2466->2467 2473 426fb2-426fb6 2467->2473 2474 426f79-426fa6 GetTickCount 2467->2474 2468->2454 2469->2454 2470->2458 2475 426f23-426f29 2470->2475 2479 426fb8-426fba 2473->2479 2480 426fd9-426fe5 2473->2480 2474->2473 2478 426fa8 2474->2478 2475->2458 2475->2465 2476->2460 2478->2473 2479->2480 2483 426fbc-426fbe 2479->2483 2481 426feb-426fee 2480->2481 2482 42713d-427155 2480->2482 2481->2482 2484 426ff4-42700b call 42be00 2481->2484 2489 427226-42723d 2482->2489 2490 42715c-427173 2482->2490 2483->2480 2486 426fc0-426fd3 call 45c280 2483->2486 2500 427011-427017 2484->2500 2501 42709f-4270a9 2484->2501 2486->2435 2486->2480 2495 427257-427261 2489->2495 2496 42723f-427251 call 444790 2489->2496 2493 427175-427187 2490->2493 2494 4271e9-4271fd call 444790 2490->2494 2502 427189-427195 2493->2502 2503 42719f-4271aa call 401290 2493->2503 2514 42b7f4-42b80a 2494->2514 2515 427203-42720a 2494->2515 2497 427267-427274 2495->2497 2498 42b4dd 2495->2498 2496->2495 2496->2514 2497->2498 2505 42727a-42727e 2497->2505 2511 42b4e0-42b4e6 2498->2511 2509 427019-42701c 2500->2509 2510 42703f-427051 call 426df0 2500->2510 2507 427117-42711b 2501->2507 2508 4270ab-4270b1 2501->2508 2502->2503 2527 4271c2-4271c4 2503->2527 2528 4271ac-4271b8 2503->2528 2505->2439 2507->2439 2507->2440 2516 4270b3 2508->2516 2517 4270d5-4270e7 call 426df0 2508->2517 2518 427020-42703b call 426df0 2509->2518 2534 427055-427057 2510->2534 2521 42721f-427221 2515->2521 2522 42720c-427216 call 444850 2515->2522 2523 4270b6-4270d1 call 426df0 2516->2523 2539 4270eb-4270ef 2517->2539 2538 42703d 2518->2538 2521->2503 2522->2521 2543 427218-42721a 2522->2543 2544 4270d3 2523->2544 2527->2435 2529 4271ca-4271cd 2527->2529 2528->2527 2529->2435 2535 4271d3-4271d7 2529->2535 2534->2439 2540 42705d-427061 2534->2540 2541 42b4b6-42b4be 2535->2541 2542 4271dd-4271e4 2535->2542 2538->2534 2545 42b497-42b49b 2539->2545 2546 4270f5-4270f8 2539->2546 2540->2545 2547 427067-42706a 2540->2547 2541->2442 2550 42b4c4-42b4da 2541->2550 2542->2438 2543->2502 2544->2539 2545->2435 2546->2545 2548 4270fe-427100 2546->2548 2547->2545 2549 427070-427072 2547->2549 2551 427106-42710c 2548->2551 2552 427f0a-427f11 2548->2552 2553 427074-42707a 2549->2553 2554 427085-42708f 2549->2554 2551->2511 2555 427112 2551->2555 2552->2438 2552->2439 2553->2511 2556 427080 2553->2556 2554->2439 2557 427095-42709a 2554->2557 2555->2438 2556->2438 2557->2438
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0042B1EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
                                            • String ID: v1j
                                            • API String ID: 4107439908-3288809988
                                            • Opcode ID: 8f20c42e93d9edfc0ed6a1f8652c54da14efeb5a92a6470ae0d73085c23f9334
                                            • Instruction ID: 5aa98a78301c45bdef57c640f86ef0b8025277831813cdf329ea322fb6bf0166
                                            • Opcode Fuzzy Hash: 8f20c42e93d9edfc0ed6a1f8652c54da14efeb5a92a6470ae0d73085c23f9334
                                            • Instruction Fuzzy Hash: 91711630704261DBDB24CF24FD94B6B7BA2EB41318F96462EE455873E1D738A840CB9E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2558 211003c-2110047 2559 2110049 2558->2559 2560 211004c-2110263 call 2110a3f call 2110df8 call 2110d90 VirtualAlloc 2558->2560 2559->2560 2575 2110265-2110289 call 2110a69 2560->2575 2576 211028b-2110292 2560->2576 2581 21102ce-21103c2 VirtualProtect call 2110cce call 2110ce7 2575->2581 2578 21102a1-21102b0 2576->2578 2580 21102b2-21102cc 2578->2580 2578->2581 2580->2578 2587 21103d1-21103e0 2581->2587 2588 21103e2-2110437 call 2110ce7 2587->2588 2589 2110439-21104b8 VirtualFree 2587->2589 2588->2587 2591 21105f4-21105fe 2589->2591 2592 21104be-21104cd 2589->2592 2595 2110604-211060d 2591->2595 2596 211077f-2110789 2591->2596 2594 21104d3-21104dd 2592->2594 2594->2591 2600 21104e3-2110505 LoadLibraryA 2594->2600 2595->2596 2601 2110613-2110637 2595->2601 2598 21107a6-21107b0 2596->2598 2599 211078b-21107a3 2596->2599 2602 21107b6-21107cb 2598->2602 2603 211086e-21108be LoadLibraryA 2598->2603 2599->2598 2604 2110517-2110520 2600->2604 2605 2110507-2110515 2600->2605 2606 211063e-2110648 2601->2606 2607 21107d2-21107d5 2602->2607 2610 21108c7-21108f9 2603->2610 2608 2110526-2110547 2604->2608 2605->2608 2606->2596 2609 211064e-211065a 2606->2609 2611 2110824-2110833 2607->2611 2612 21107d7-21107e0 2607->2612 2613 211054d-2110550 2608->2613 2609->2596 2614 2110660-211066a 2609->2614 2615 2110902-211091d 2610->2615 2616 21108fb-2110901 2610->2616 2622 2110839-211083c 2611->2622 2617 21107e2 2612->2617 2618 21107e4-2110822 2612->2618 2619 21105e0-21105ef 2613->2619 2620 2110556-211056b 2613->2620 2621 211067a-2110689 2614->2621 2616->2615 2617->2611 2618->2607 2619->2594 2623 211056d 2620->2623 2624 211056f-211057a 2620->2624 2625 2110750-211077a 2621->2625 2626 211068f-21106b2 2621->2626 2622->2603 2627 211083e-2110847 2622->2627 2623->2619 2629 211059b-21105bb 2624->2629 2630 211057c-2110599 2624->2630 2625->2606 2631 21106b4-21106ed 2626->2631 2632 21106ef-21106fc 2626->2632 2633 2110849 2627->2633 2634 211084b-211086c 2627->2634 2641 21105bd-21105db 2629->2641 2630->2641 2631->2632 2635 211074b 2632->2635 2636 21106fe-2110748 2632->2636 2633->2603 2634->2622 2635->2621 2636->2635 2641->2613
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0211024D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: cess$kernel32.dll
                                            • API String ID: 4275171209-1230238691
                                            • Opcode ID: 1bc5c981d6fea912fcc7dcc340e60fde74e519195c6ec5c7e407c243dd4fdd56
                                            • Instruction ID: cb6e4576c6f42de689f56335750bf445eb49197ef0e401d2b033a5892e155ae3
                                            • Opcode Fuzzy Hash: 1bc5c981d6fea912fcc7dcc340e60fde74e519195c6ec5c7e407c243dd4fdd56
                                            • Instruction Fuzzy Hash: AF525874E41229DFDB64CF58C984BA8BBB1BF09304F1580E9E94DAB351DB30AA85CF15

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2642 426e22-426e44 2643 427121 2642->2643 2644 426e4a-426e4e 2642->2644 2645 427126-42713a 2643->2645 2646 426e50-426e57 2644->2646 2647 426e8a-426ea4 GetTickCount 2646->2647 2648 426e59-426e60 2646->2648 2649 426ea6-426ebe PeekMessageW 2647->2649 2650 426ed7-426ede 2647->2650 2651 426e62-426e6e GlobalUnlock 2648->2651 2652 426e78-426e85 CloseClipboard 2648->2652 2653 426ec0-426ec9 call 4013d0 2649->2653 2654 426ecc-426ed2 GetTickCount 2649->2654 2655 426ee0-426ee7 2650->2655 2656 426f08-426f10 2650->2656 2651->2652 2652->2647 2653->2654 2654->2650 2655->2656 2658 426ee9-426ef2 2655->2658 2659 426f12 2656->2659 2660 426f2b-426f31 2656->2660 2658->2656 2664 426ef4-426ef9 2658->2664 2665 426f14-426f17 2659->2665 2666 426f19-426f1f 2659->2666 2661 426f33-426f3b 2660->2661 2662 426f49-426f50 2660->2662 2661->2662 2667 426f3d-426f46 call 4013d0 2661->2667 2668 426f52-426f68 call 4013d0 2662->2668 2669 426f6a-426f77 2662->2669 2670 426f04-426f05 2664->2670 2671 426efb-426f02 2664->2671 2665->2660 2665->2666 2666->2667 2672 426f21 2666->2672 2667->2662 2668->2669 2675 426fb2-426fb6 2669->2675 2676 426f79-426fa6 GetTickCount 2669->2676 2670->2656 2671->2656 2672->2660 2677 426f23-426f29 2672->2677 2681 426fb8-426fba 2675->2681 2682 426fd9-426fe5 2675->2682 2676->2675 2680 426fa8 2676->2680 2677->2660 2677->2667 2680->2675 2681->2682 2685 426fbc-426fbe 2681->2685 2683 426feb-426fee 2682->2683 2684 42713d-427155 2682->2684 2683->2684 2686 426ff4-42700b call 42be00 2683->2686 2691 427226-42723d 2684->2691 2692 42715c-427173 2684->2692 2685->2682 2688 426fc0-426fd3 call 45c280 2685->2688 2703 427011-427017 2686->2703 2704 42709f-4270a9 2686->2704 2688->2682 2701 42b49d-42b4b3 2688->2701 2697 427257-427261 2691->2697 2698 42723f-427251 call 444790 2691->2698 2695 427175-427187 2692->2695 2696 4271e9-4271fd call 444790 2692->2696 2705 427189-427195 2695->2705 2706 42719f-4271aa call 401290 2695->2706 2717 42b7f4-42b80a 2696->2717 2719 427203-42720a 2696->2719 2699 427267-427274 2697->2699 2700 42b4dd 2697->2700 2698->2697 2698->2717 2699->2700 2708 42727a-42727e 2699->2708 2714 42b4e0-42b4e6 2700->2714 2712 427019-42701c 2703->2712 2713 42703f-427051 call 426df0 2703->2713 2710 427117-42711b 2704->2710 2711 4270ab-4270b1 2704->2711 2705->2706 2732 4271c2-4271c4 2706->2732 2733 4271ac-4271b8 2706->2733 2718 42827e-428284 2708->2718 2710->2643 2710->2718 2720 4270b3 2711->2720 2721 4270d5-4270e7 call 426df0 2711->2721 2722 427020-42703b call 426df0 2712->2722 2740 427055-427057 2713->2740 2718->2643 2725 42828a-42828e 2718->2725 2726 42721f-427221 2719->2726 2727 42720c-427216 call 444850 2719->2727 2728 4270b6-4270d1 call 426df0 2720->2728 2745 4270eb-4270ef 2721->2745 2744 42703d 2722->2744 2725->2646 2735 428bb9-428bc2 2725->2735 2726->2706 2727->2726 2749 427218-42721a 2727->2749 2750 4270d3 2728->2750 2732->2701 2734 4271ca-4271cd 2732->2734 2733->2732 2734->2701 2741 4271d3-4271d7 2734->2741 2740->2718 2746 42705d-427061 2740->2746 2747 42b4b6-42b4be 2741->2747 2748 4271dd-4271e4 2741->2748 2744->2740 2751 42b497-42b49b 2745->2751 2752 4270f5-4270f8 2745->2752 2746->2751 2753 427067-42706a 2746->2753 2747->2645 2757 42b4c4-42b4da 2747->2757 2756 42827a 2748->2756 2749->2705 2750->2745 2751->2701 2752->2751 2754 4270fe-427100 2752->2754 2753->2751 2755 427070-427072 2753->2755 2758 427106-42710c 2754->2758 2759 427f0a-427f11 2754->2759 2760 427074-42707a 2755->2760 2761 427085-42708f 2755->2761 2756->2718 2758->2714 2762 427112 2758->2762 2759->2718 2759->2756 2760->2714 2763 427080 2760->2763 2761->2718 2764 427095-42709a 2761->2764 2762->2756 2763->2756 2764->2756
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                              • Part of subcall function 00444790: __wcsicoll.LIBCMT ref: 004447BA
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • GetTickCount.KERNEL32 ref: 00426F86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock__wcsicoll
                                            • String ID: v1j
                                            • API String ID: 2029973422-3288809988
                                            • Opcode ID: ac74217368039711589757d3ed3ce7c752e1035cf5d995391c515213f47e51cd
                                            • Instruction ID: 577d209b60b0e305f694127d93cb4f9e212cf47ed499887f71f8cd5782e9f476
                                            • Opcode Fuzzy Hash: ac74217368039711589757d3ed3ce7c752e1035cf5d995391c515213f47e51cd
                                            • Instruction Fuzzy Hash: 07D1BD31708351CBDB24CF65E880B6B77E2FB84314F95456EE8598B392D738D841CB9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2765 427eb1-427eb3 2766 427ec1-427ecf call 426df0 2765->2766 2767 427eb5-427ebc 2765->2767 2772 427ed4-427edc 2766->2772 2768 42827e-428284 2767->2768 2770 427121 2768->2770 2771 42828a-42828e 2768->2771 2773 427126-42713a 2770->2773 2774 426e50-426e57 2771->2774 2775 428bb9-428bc2 2771->2775 2772->2768 2776 427ee2-427ee6 2772->2776 2779 426e8a-426ea4 GetTickCount 2774->2779 2780 426e59-426e60 2774->2780 2777 42b497-42b49b 2776->2777 2778 427eec-427eef 2776->2778 2783 42b49d-42b4b3 2777->2783 2778->2777 2784 427ef5-427ef7 2778->2784 2781 426ea6-426ebe PeekMessageW 2779->2781 2782 426ed7-426ede 2779->2782 2785 426e62-426e6e GlobalUnlock 2780->2785 2786 426e78-426e85 CloseClipboard 2780->2786 2787 426ec0-426ec4 call 4013d0 2781->2787 2788 426ecc-426ed2 GetTickCount 2781->2788 2789 426ee0-426ee7 2782->2789 2790 426f08-426f10 2782->2790 2791 427f0a-427f11 2784->2791 2792 427ef9-427eff 2784->2792 2785->2786 2786->2779 2802 426ec9 2787->2802 2788->2782 2789->2790 2795 426ee9-426ef2 2789->2795 2796 426f12 2790->2796 2797 426f2b-426f31 2790->2797 2791->2768 2794 42827a 2791->2794 2798 42b4e0-42b4e6 2792->2798 2799 427f05 2792->2799 2794->2768 2795->2790 2803 426ef4-426ef9 2795->2803 2804 426f14-426f17 2796->2804 2805 426f19-426f1f 2796->2805 2800 426f33-426f3b 2797->2800 2801 426f49-426f50 2797->2801 2799->2791 2799->2794 2800->2801 2806 426f3d-426f41 call 4013d0 2800->2806 2807 426f52-426f68 call 4013d0 2801->2807 2808 426f6a-426f77 2801->2808 2802->2788 2809 426f04-426f05 2803->2809 2810 426efb-426f02 2803->2810 2804->2797 2804->2805 2805->2806 2811 426f21 2805->2811 2817 426f46 2806->2817 2807->2808 2814 426fb2-426fb6 2808->2814 2815 426f79-426fa6 GetTickCount 2808->2815 2809->2790 2810->2790 2811->2797 2816 426f23-426f29 2811->2816 2820 426fb8-426fba 2814->2820 2821 426fd9-426fe5 2814->2821 2815->2814 2819 426fa8 2815->2819 2816->2797 2816->2806 2817->2801 2819->2814 2820->2821 2824 426fbc-426fbe 2820->2824 2822 426feb-426fee 2821->2822 2823 42713d-427155 2821->2823 2822->2823 2825 426ff4-42700b call 42be00 2822->2825 2830 427226-42723d 2823->2830 2831 42715c-427173 2823->2831 2824->2821 2827 426fc0-426fd3 call 45c280 2824->2827 2841 427011-427017 2825->2841 2842 42709f-4270a9 2825->2842 2827->2783 2827->2821 2836 427257-427261 2830->2836 2837 42723f-427251 call 444790 2830->2837 2834 427175-427187 2831->2834 2835 4271e9-4271fd call 444790 2831->2835 2843 427189-427195 2834->2843 2844 42719f-4271aa call 401290 2834->2844 2854 42b7f4-42b80a 2835->2854 2855 427203-42720a 2835->2855 2838 427267-427274 2836->2838 2839 42b4dd 2836->2839 2837->2836 2837->2854 2838->2839 2846 42727a-42727e 2838->2846 2839->2798 2850 427019-42701c 2841->2850 2851 42703f-427051 call 426df0 2841->2851 2848 427117-42711b 2842->2848 2849 4270ab-4270b1 2842->2849 2843->2844 2867 4271c2-4271c4 2844->2867 2868 4271ac-4271b8 2844->2868 2846->2768 2848->2768 2848->2770 2856 4270b3 2849->2856 2857 4270d5-4270e7 call 426df0 2849->2857 2858 427020-42703b call 426df0 2850->2858 2874 427055-427057 2851->2874 2861 42721f-427221 2855->2861 2862 42720c-427216 call 444850 2855->2862 2863 4270b6-4270d1 call 426df0 2856->2863 2879 4270eb-4270ef 2857->2879 2878 42703d 2858->2878 2861->2844 2862->2861 2883 427218-42721a 2862->2883 2884 4270d3 2863->2884 2867->2783 2869 4271ca-4271cd 2867->2869 2868->2867 2869->2783 2875 4271d3-4271d7 2869->2875 2874->2768 2880 42705d-427061 2874->2880 2881 42b4b6-42b4be 2875->2881 2882 4271dd-4271e4 2875->2882 2878->2874 2879->2777 2885 4270f5-4270f8 2879->2885 2880->2777 2886 427067-42706a 2880->2886 2881->2773 2889 42b4c4-42b4da 2881->2889 2882->2794 2883->2843 2884->2879 2885->2777 2887 4270fe-427100 2885->2887 2886->2777 2888 427070-427072 2886->2888 2887->2791 2890 427106-42710c 2887->2890 2891 427074-42707a 2888->2891 2892 427085-42708f 2888->2892 2890->2798 2893 427112 2890->2893 2891->2798 2894 427080 2891->2894 2892->2768 2895 427095-42709a 2892->2895 2893->2794 2894->2794 2895->2794
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                                            • String ID: v1j
                                            • API String ID: 1623861271-3288809988
                                            • Opcode ID: 2835f73984154a3414e95f4a748b9add606521c8e6b154603e247de07738a9b3
                                            • Instruction ID: 31c2687664371598502a5b531453e8e1439d8a9e852998b8438cba0f908d182f
                                            • Opcode Fuzzy Hash: 2835f73984154a3414e95f4a748b9add606521c8e6b154603e247de07738a9b3
                                            • Instruction Fuzzy Hash: A8710531704361CBDB24CF64F984B6A3BA2FB45314F92066EE856873E1C7389841CB9D
                                            APIs
                                            • SetTimer.USER32(000201FC,00000009,0000000A), ref: 004014D4
                                            • GetTickCount.KERNEL32 ref: 004014F9
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 00401540
                                            • GetTickCount.KERNEL32 ref: 0040154B
                                            • GetFocus.USER32 ref: 004015E4
                                              • Part of subcall function 00403380: joyGetPosEx.WINMM ref: 004033AF
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0040162A
                                            • IsDialogMessageW.USER32(?,?), ref: 00401BBB
                                              • Part of subcall function 0046A850: SendMessageW.USER32(00000000,00001304,00000000,00000000), ref: 0046A86A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$CountTick$AcceleratorDialogFocusSendTimerTranslate
                                            • String ID: ($
                                            • API String ID: 3283625497-2238701287
                                            • Opcode ID: f4061c6a45dc52200af8a418c29571a8dbdb8272d0c418b773f43cd224975d58
                                            • Instruction ID: d580d6ea65c684af17787d48f7abcc2f526893975b6fad532898008a2ea5a279
                                            • Opcode Fuzzy Hash: f4061c6a45dc52200af8a418c29571a8dbdb8272d0c418b773f43cd224975d58
                                            • Instruction Fuzzy Hash: E4517071A043409BD7219F28C884B6F7AE4AB95708F08093FF585A73F1D77D9885CB9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3265 427b52-427b59 3266 42827a 3265->3266 3267 42827e-428284 3265->3267 3266->3267 3268 427121 3267->3268 3269 42828a-42828e 3267->3269 3270 427126-42713a 3268->3270 3271 426e50-426e57 3269->3271 3272 428bb9-428bc2 3269->3272 3273 426e8a-426ea4 GetTickCount 3271->3273 3274 426e59-426e60 3271->3274 3275 426ea6-426ebe PeekMessageW 3273->3275 3276 426ed7-426ede 3273->3276 3277 426e62-426e6e GlobalUnlock 3274->3277 3278 426e78-426e85 CloseClipboard 3274->3278 3279 426ec0-426ec9 call 4013d0 3275->3279 3280 426ecc-426ed2 GetTickCount 3275->3280 3281 426ee0-426ee7 3276->3281 3282 426f08-426f10 3276->3282 3277->3278 3278->3273 3279->3280 3280->3276 3281->3282 3284 426ee9-426ef2 3281->3284 3285 426f12 3282->3285 3286 426f2b-426f31 3282->3286 3284->3282 3290 426ef4-426ef9 3284->3290 3291 426f14-426f17 3285->3291 3292 426f19-426f1f 3285->3292 3287 426f33-426f3b 3286->3287 3288 426f49-426f50 3286->3288 3287->3288 3293 426f3d-426f46 call 4013d0 3287->3293 3294 426f52-426f68 call 4013d0 3288->3294 3295 426f6a-426f77 3288->3295 3296 426f04-426f05 3290->3296 3297 426efb-426f02 3290->3297 3291->3286 3291->3292 3292->3293 3298 426f21 3292->3298 3293->3288 3294->3295 3301 426fb2-426fb6 3295->3301 3302 426f79-426fa6 GetTickCount 3295->3302 3296->3282 3297->3282 3298->3286 3303 426f23-426f29 3298->3303 3307 426fb8-426fba 3301->3307 3308 426fd9-426fe5 3301->3308 3302->3301 3306 426fa8 3302->3306 3303->3286 3303->3293 3306->3301 3307->3308 3311 426fbc-426fbe 3307->3311 3309 426feb-426fee 3308->3309 3310 42713d-427155 3308->3310 3309->3310 3312 426ff4-42700b call 42be00 3309->3312 3317 427226-42723d 3310->3317 3318 42715c-427173 3310->3318 3311->3308 3314 426fc0-426fd3 call 45c280 3311->3314 3329 427011-427017 3312->3329 3330 42709f-4270a9 3312->3330 3314->3308 3327 42b49d-42b4b3 3314->3327 3323 427257-427261 3317->3323 3324 42723f-427251 call 444790 3317->3324 3321 427175-427187 3318->3321 3322 4271e9-4271fd call 444790 3318->3322 3331 427189-427195 3321->3331 3332 42719f-4271aa call 401290 3321->3332 3343 42b7f4-42b80a 3322->3343 3344 427203-42720a 3322->3344 3325 427267-427274 3323->3325 3326 42b4dd 3323->3326 3324->3323 3324->3343 3325->3326 3334 42727a-42727e 3325->3334 3340 42b4e0-42b4e6 3326->3340 3338 427019-42701c 3329->3338 3339 42703f-427051 call 426df0 3329->3339 3336 427117-42711b 3330->3336 3337 4270ab-4270b1 3330->3337 3331->3332 3356 4271c2-4271c4 3332->3356 3357 4271ac-4271b8 3332->3357 3334->3267 3336->3267 3336->3268 3345 4270b3 3337->3345 3346 4270d5-4270e7 call 426df0 3337->3346 3347 427020-42703b call 426df0 3338->3347 3363 427055-427057 3339->3363 3350 42721f-427221 3344->3350 3351 42720c-427216 call 444850 3344->3351 3352 4270b6-4270d1 call 426df0 3345->3352 3368 4270eb-4270ef 3346->3368 3367 42703d 3347->3367 3350->3332 3351->3350 3372 427218-42721a 3351->3372 3373 4270d3 3352->3373 3356->3327 3358 4271ca-4271cd 3356->3358 3357->3356 3358->3327 3364 4271d3-4271d7 3358->3364 3363->3267 3369 42705d-427061 3363->3369 3370 42b4b6-42b4be 3364->3370 3371 4271dd-4271e4 3364->3371 3367->3363 3374 42b497-42b49b 3368->3374 3375 4270f5-4270f8 3368->3375 3369->3374 3376 427067-42706a 3369->3376 3370->3270 3379 42b4c4-42b4da 3370->3379 3371->3266 3372->3331 3373->3368 3374->3327 3375->3374 3377 4270fe-427100 3375->3377 3376->3374 3378 427070-427072 3376->3378 3380 427106-42710c 3377->3380 3381 427f0a-427f11 3377->3381 3382 427074-42707a 3378->3382 3383 427085-42708f 3378->3383 3380->3340 3384 427112 3380->3384 3381->3266 3381->3267 3382->3340 3385 427080 3382->3385 3383->3267 3386 427095-42709a 3383->3386 3384->3266 3385->3266 3386->3266
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00426E68
                                            • CloseClipboard.USER32 ref: 00426E78
                                            • GetTickCount.KERNEL32 ref: 00426E8A
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00426EB6
                                            • GetTickCount.KERNEL32 ref: 00426ECC
                                            • GetTickCount.KERNEL32 ref: 00426F86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                                            • String ID: v1j
                                            • API String ID: 1623861271-3288809988
                                            • Opcode ID: 88ffd0a27205ac72f16484c5f9186b0db8d7d728dabc208a82813e14528db1ff
                                            • Instruction ID: 276ea68a65f414a29b9231cd5f2a7ef4dd815cb13fef6da4b65e5c1804468698
                                            • Opcode Fuzzy Hash: 88ffd0a27205ac72f16484c5f9186b0db8d7d728dabc208a82813e14528db1ff
                                            • Instruction Fuzzy Hash: 1B51D630704361CBDF64CF65FD85B6A3BA2AB01314F96062EE465973E1C7389845CB5D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3433 417870-417894 call 48fca4 3436 417896-41789c 3433->3436 3437 41789d-4178d2 SetTimer 3433->3437 3438 4178d4-4178d9 3437->3438 3439 4178de-41790e GetTickCount 3437->3439 3440 417987-417998 3438->3440 3441 417910-417926 SetTimer 3439->3441 3442 41792c-417953 GetTickCount call 426df0 3439->3442 3443 4179d0-417a71 call 4793e0 3440->3443 3444 41799a-4179a0 3440->3444 3441->3442 3449 417958-417966 3442->3449 3457 417a73-417a79 3443->3457 3458 417aa7-417ab0 3443->3458 3446 4179a2-4179a9 3444->3446 3447 4179ac-4179b3 3444->3447 3446->3447 3450 4179b5-4179bb call 490561 3447->3450 3451 4179be-4179ce call 490556 3447->3451 3453 417981 3449->3453 3454 417968-417979 KillTimer 3449->3454 3450->3451 3451->3443 3453->3440 3454->3453 3459 41797b 3454->3459 3457->3458 3460 417a7b-417a81 3457->3460 3459->3453 3460->3458 3463 417a83-417a89 3460->3463 3463->3458 3464 417a8b-417a91 3463->3464 3464->3458 3465 417a93-417aa2 call 417af0 3464->3465 3465->3458
                                            APIs
                                            • _malloc.LIBCMT ref: 00417883
                                              • Part of subcall function 0048FCA4: __FF_MSGBANNER.LIBCMT ref: 0048FCBD
                                              • Part of subcall function 0048FCA4: __NMSG_WRITE.LIBCMT ref: 0048FCC4
                                              • Part of subcall function 0048FCA4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00495598,004011D4,00000001,004011D4,?,00494023,00000018,004C1C20,0000000C,004940B3), ref: 0048FCE9
                                            • SetTimer.USER32(000201FC,0000000E,04EF6D80,00403BA0), ref: 004178CA
                                            • _free.LIBCMT ref: 004179B6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeapTimer_free_malloc
                                            • String ID:
                                            • API String ID: 92111083-0
                                            • Opcode ID: 9d8263df4cbc072d8507a47316a4b4a09a1eb0e44a88d49c6767c5e0d3393ce5
                                            • Instruction ID: fbe78b82f48f7f733fea3c01a39f5578ea0d00d6650b71bacc94d44b1de2376f
                                            • Opcode Fuzzy Hash: 9d8263df4cbc072d8507a47316a4b4a09a1eb0e44a88d49c6767c5e0d3393ce5
                                            • Instruction Fuzzy Hash: 6C51B0B1A042449FD350DF29EC84FA27BB5FB15308F5980BEE5498B362D3799884CF59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3467 416a90-416cf6 call 498770 call 46cad0 3472 416d17 3467->3472 3473 416cf8-416d15 call 430620 call 417af0 3467->3473 3475 416d1b-416d38 OleInitialize 3472->3475 3473->3475
                                            APIs
                                            • _memset.LIBCMT ref: 00416CD2
                                            • OleInitialize.OLE32(00000000), ref: 00416D1C
                                              • Part of subcall function 00417AF0: _wcsncpy.LIBCMT ref: 00417B43
                                              • Part of subcall function 00417AF0: SetCurrentDirectoryW.KERNEL32(004A3890,00000000,?,023A50F0,00000000), ref: 00417BAF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentDirectoryInitialize_memset_wcsncpy
                                            • String ID: No tray mem$Tray$%E
                                            • API String ID: 613146505-1286056905
                                            • Opcode ID: 0f4f20f2888725397845d3e26465219afce152eca6e053a07f023b2c469328d6
                                            • Instruction ID: aaab1662004d8440c1c75f66d450961280571f6039720277f048bb5b25b5375a
                                            • Opcode Fuzzy Hash: 0f4f20f2888725397845d3e26465219afce152eca6e053a07f023b2c469328d6
                                            • Instruction Fuzzy Hash: AA6150B4802384EAC3908F6AADD2E15BAA8F759309F90823FE448C3361D7B801448FDD
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$Timer_malloc
                                            • String ID: Out of memory.
                                            • API String ID: 2288515124-4087320997
                                            • Opcode ID: 8b42eef779f5021ae25284b8053e9d349c125c261127b9f0fb9699a20262a356
                                            • Instruction ID: 49bb5786690396244c9ba4e0863c8e9ec505ffb6c14bf44d43acb8d3a775e7c9
                                            • Opcode Fuzzy Hash: 8b42eef779f5021ae25284b8053e9d349c125c261127b9f0fb9699a20262a356
                                            • Instruction Fuzzy Hash: 3431B271A083099FD744CF29A881B6A37E4E79430AF04803BEC85D7352E73E9559DB9D
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?), ref: 004428FC
                                            • SetLastError.KERNEL32(000000B7), ref: 0044290E
                                            • _wcsrchr.LIBCMT ref: 00442927
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00442990
                                            • SetLastError.KERNEL32(00000057), ref: 004429A5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$AttributesCreateDirectoryFile_wcsrchr
                                            • String ID:
                                            • API String ID: 1861573484-0
                                            • Opcode ID: 2e8b3f2ca5c88a69b3a2a066295587a62f8c89f17cd218adf8a81c392199c089
                                            • Instruction ID: 201aa1d45fc2b5c267c7c5c3f8dcc34e55949bf9b4c780faeebfaa4df4c5171f
                                            • Opcode Fuzzy Hash: 2e8b3f2ca5c88a69b3a2a066295587a62f8c89f17cd218adf8a81c392199c089
                                            • Instruction Fuzzy Hash: 55214572B00300ABEB202F64DD457DBF7A4EB44365F48853AFA1997290D3B88945CBD9
                                            APIs
                                              • Part of subcall function 00458010: VariantClear.OLEAUT32(?), ref: 00458025
                                            • SysAllocString.OLEAUT32(?), ref: 00458779
                                            • SysFreeString.OLEAUT32(00000000), ref: 00458797
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String$AllocClearFreeVariant
                                            • String ID: _NewEnum
                                            • API String ID: 1665868789-1628654690
                                            • Opcode ID: 4c4994b1da5992b47152a213289a29bb39b461c10b0b39ec9186dc46d79ca9b8
                                            • Instruction ID: c2668fa6f6fad35b8756d28ed0efac4badd6527d9cd6525d23c6b130372f5c06
                                            • Opcode Fuzzy Hash: 4c4994b1da5992b47152a213289a29bb39b461c10b0b39ec9186dc46d79ca9b8
                                            • Instruction Fuzzy Hash: 4FE18F75E002099FDB04DF99D881AAEB7B5FF88311F10816EED04AB351DB39AD49CB94
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick__wcstoi64
                                            • String ID: $cJ
                                            • API String ID: 1339278519-417114052
                                            • Opcode ID: 738700d3e8f00f8505546d4b3544afa0d16049c911eb0461f3829c3c9b244dd5
                                            • Instruction ID: bef6d51c6ff47f481dd1438523297b6b7c5e2ae73701c27c6a0695669888bc1f
                                            • Opcode Fuzzy Hash: 738700d3e8f00f8505546d4b3544afa0d16049c911eb0461f3829c3c9b244dd5
                                            • Instruction Fuzzy Hash: C7412370B002116ADB289B15BC85F3F3765EB92715F60802FF4498A7D1D7BA9841CA5E
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0042981A
                                            • PostMessageW.USER32(00000000), ref: 00429821
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FindMessagePostWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 2578315405-2988720461
                                            • Opcode ID: 6926a05c434e0ba5dc9a93a737fb233ac6880a8a52adbda75f70410a32ebccde
                                            • Instruction ID: ebd0a3946cb67554b6160152ff8e4069b5e72b06b152f5631506da9ccc4beb04
                                            • Opcode Fuzzy Hash: 6926a05c434e0ba5dc9a93a737fb233ac6880a8a52adbda75f70410a32ebccde
                                            • Instruction Fuzzy Hash: A8E02B30F802007BF2001721FD47F9936019B06B10F200121F611FA2E2C5F9E840821E
                                            APIs
                                              • Part of subcall function 004716C0: __wcsicoll.LIBCMT ref: 004716E8
                                            • __wcsicoll.LIBCMT ref: 00471C3E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: base
                                            • API String ID: 3832890014-3233087073
                                            • Opcode ID: 041a1525aa314a719f7fd6378d1b0e383f0442330399e793b57acd6ce698c038
                                            • Instruction ID: 34630770a3e52e1c2c4bcfa53fad844edd7e2a3b7524a3fdc5e8edb9de452a6b
                                            • Opcode Fuzzy Hash: 041a1525aa314a719f7fd6378d1b0e383f0442330399e793b57acd6ce698c038
                                            • Instruction Fuzzy Hash: 7C51E0706042059FD721DF9CC880FAB77A5EF85354F24814AE8499B361D338FC81CBAA
                                            APIs
                                            • SetCurrentDirectoryW.KERNEL32(004A6324), ref: 004421D5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentDirectory
                                            • String ID: :
                                            • API String ID: 1611563598-336475711
                                            • Opcode ID: 4700560e11ba25c23d9192ab955168636ae4106476855d529c354684ca59f343
                                            • Instruction ID: bb1a0e2f6ef9a9da7fc0a3520f49256627144e11ff800699070c311a2d583478
                                            • Opcode Fuzzy Hash: 4700560e11ba25c23d9192ab955168636ae4106476855d529c354684ca59f343
                                            • Instruction Fuzzy Hash: C3F0F42050425065EF21EB986D02FA776E0AF4171AF84849FF884A72D0F3F89888C39E
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 9fdce0842d93cf44065fb8ac07dbfb2e74a91ed261ad68d49ccd2a1a9ebfcf00
                                            • Instruction ID: b4e3c6e9d4dc25af992b957f1612e206b02c8cfd6410816648f2569a6619da82
                                            • Opcode Fuzzy Hash: 9fdce0842d93cf44065fb8ac07dbfb2e74a91ed261ad68d49ccd2a1a9ebfcf00
                                            • Instruction Fuzzy Hash: C1915D71A002159FDB24CF54C881BAEB7B5FF45315F28819AE809AB343D739DC49CB99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6e01596d711b1d3c656434c00f8e2c6b912cb9ac7392919ac9f6a4686bf3c1db
                                            • Instruction ID: 4ddbf8b0e37a36613ad0fc08a91a580f2c302b5f0ef6ca8762b65f60e1103e05
                                            • Opcode Fuzzy Hash: 6e01596d711b1d3c656434c00f8e2c6b912cb9ac7392919ac9f6a4686bf3c1db
                                            • Instruction Fuzzy Hash: 3B5117356087128BD714EF29D490767B7A0FF88304F64C8AED89987762E339D854CB89
                                            APIs
                                            • _free.LIBCMT ref: 0045C5E0
                                            • SetTimer.USER32(000201FC,0000000D,00002710,0043D4E0), ref: 0045C62C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Timer_free
                                            • String ID:
                                            • API String ID: 2702591383-0
                                            • Opcode ID: 7ffefa2201147f186b4651fd50c9cb71d59206d04f266079f65ba9c50ea6470b
                                            • Instruction ID: 1aeeb222a3b3ab5ba74e445a33930422449077a2eb704a29599955a7c0ceee65
                                            • Opcode Fuzzy Hash: 7ffefa2201147f186b4651fd50c9cb71d59206d04f266079f65ba9c50ea6470b
                                            • Instruction Fuzzy Hash: F441DDB15083049FD714CF15E894F6B77E4BB9430AF08852FE88687252E738D949CB8A
                                            APIs
                                            • _free.LIBCMT ref: 0045C5E0
                                            • SetTimer.USER32(000201FC,0000000D,00002710,0043D4E0), ref: 0045C62C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Timer_free
                                            • String ID:
                                            • API String ID: 2702591383-0
                                            • Opcode ID: 86f813f019eddccca512adee127f64c1b5059cb4e45481856e6560f412819d70
                                            • Instruction ID: 70b59a4e492b68ac8dbe2a30065a2a426509558463175c2685b7247edac3cbb2
                                            • Opcode Fuzzy Hash: 86f813f019eddccca512adee127f64c1b5059cb4e45481856e6560f412819d70
                                            • Instruction Fuzzy Hash: A2419F71508354AFC714CF14D8C4BAB77E4BB9530AF04892FE88697252E338E94ADB5E
                                            APIs
                                            • _free.LIBCMT ref: 0045C5E0
                                              • Part of subcall function 00490561: HeapFree.KERNEL32(00000000,00000000,?,00493723,00000000,?,004949B2,?,~cG), ref: 00490577
                                              • Part of subcall function 00490561: GetLastError.KERNEL32(00000000,?,00493723,00000000,?,004949B2,?,~cG), ref: 00490589
                                            • SetTimer.USER32(000201FC,0000000D,00002710,0043D4E0), ref: 0045C62C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFreeHeapLastTimer_free
                                            • String ID:
                                            • API String ID: 702773638-0
                                            • Opcode ID: d39b96cd37cb6071c1c10a5d7a4c98bb6bb898730ad8e8d70dc662939826db9d
                                            • Instruction ID: 1ddeaebf6c08e647a2b7eed64485f68ee4913f570c514a41a13423e0aca1610c
                                            • Opcode Fuzzy Hash: d39b96cd37cb6071c1c10a5d7a4c98bb6bb898730ad8e8d70dc662939826db9d
                                            • Instruction Fuzzy Hash: 9E316FB1508304AFD304DF15E884F5B77E4FB9430AF04892EF88697252E339E949CB9A
                                            APIs
                                            • _free.LIBCMT ref: 0045C5E0
                                            • SetTimer.USER32(000201FC,0000000D,00002710,0043D4E0), ref: 0045C62C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Timer_free
                                            • String ID:
                                            • API String ID: 2702591383-0
                                            • Opcode ID: 4c0d08aa7e5de1a2c3f5023af2b5c3023b24443eebc7dab2293c221aabf72939
                                            • Instruction ID: 8f70222fbd286e1074c05fff3599318cbb111fc6b1464ce7e2581ebbd233ff0f
                                            • Opcode Fuzzy Hash: 4c0d08aa7e5de1a2c3f5023af2b5c3023b24443eebc7dab2293c221aabf72939
                                            • Instruction Fuzzy Hash: DB2150B1508304AFD314CF15D885F5B77E4FB94709F04892EF88597252E339E949CB9A
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0056CE5E
                                            • Module32First.KERNEL32(00000000,00000224), ref: 0056CE7E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0056C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_56c000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 3833638111-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: 5539b1d95d85a06048579fc0349efe06e2df85b610a407ba51a8b978f4640b36
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 96F06231200715ABD7217AF9988DA7B7EFCBF49725F100628E692D24C0DB71EC458661
                                            APIs
                                              • Part of subcall function 004428E0: GetFileAttributesW.KERNEL32(?), ref: 004428FC
                                              • Part of subcall function 004428E0: SetLastError.KERNEL32(000000B7), ref: 0044290E
                                            • GetLastError.KERNEL32 ref: 0042A2A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$AttributesFile
                                            • String ID: $cJ
                                            • API String ID: 2642427456-417114052
                                            • Opcode ID: 94b655aa1d4b974b7336a02c0b3d8f49292e02ab474d041341b466ee093eb01d
                                            • Instruction ID: a41f4e7d21578ee3dd49418d9290a1123cd8fecee42b2950285fb270d79969ff
                                            • Opcode Fuzzy Hash: 94b655aa1d4b974b7336a02c0b3d8f49292e02ab474d041341b466ee093eb01d
                                            • Instruction Fuzzy Hash: 7AD0C2759042009FE2509B30AD80B193BD8EB04344F14485EB950D3222C234D0008B2A
                                            APIs
                                            • SetErrorMode.KERNEL32(00000400,?,?,02110223,?,?), ref: 02110E02
                                            • SetErrorMode.KERNEL32(00000000,?,?,02110223,?,?), ref: 02110E07
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorMode
                                            • String ID:
                                            • API String ID: 2340568224-0
                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction ID: 3dc0d650258f77e74df07641c15034dff2f9eaa93d2b56bfa814fc505f0da8b3
                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction Fuzzy Hash: 54D0123154512C77D7002A95DC09BCD7B1C9F05B66F108021FB0DD9181CB70994046E5
                                            APIs
                                            • _malloc.LIBCMT ref: 00473ADD
                                              • Part of subcall function 0048FCA4: __FF_MSGBANNER.LIBCMT ref: 0048FCBD
                                              • Part of subcall function 0048FCA4: __NMSG_WRITE.LIBCMT ref: 0048FCC4
                                              • Part of subcall function 0048FCA4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00495598,004011D4,00000001,004011D4,?,00494023,00000018,004C1C20,0000000C,004940B3), ref: 0048FCE9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap_malloc
                                            • String ID:
                                            • API String ID: 501242067-0
                                            • Opcode ID: fbd788fde5c7a03836223f0ebbbba8f0bfb339def231a07eec2ac87ceef1a1be
                                            • Instruction ID: 93d676223c3575ddf1ffbfd14c61795bc367894d3b16f047fe3352ec2489d9c7
                                            • Opcode Fuzzy Hash: fbd788fde5c7a03836223f0ebbbba8f0bfb339def231a07eec2ac87ceef1a1be
                                            • Instruction Fuzzy Hash: 95F05E716006028FEBA0CB39D891B2BB3E6BFD0310B14852EE48E83B45E738F945CA04
                                            APIs
                                              • Part of subcall function 00491078: _malloc.LIBCMT ref: 00491092
                                            • _malloc.LIBCMT ref: 0047378D
                                              • Part of subcall function 0048FCA4: __FF_MSGBANNER.LIBCMT ref: 0048FCBD
                                              • Part of subcall function 0048FCA4: __NMSG_WRITE.LIBCMT ref: 0048FCC4
                                              • Part of subcall function 0048FCA4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00495598,004011D4,00000001,004011D4,?,00494023,00000018,004C1C20,0000000C,004940B3), ref: 0048FCE9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _malloc$AllocateHeap
                                            • String ID:
                                            • API String ID: 680241177-0
                                            • Opcode ID: 46071de27b3b18367afdd9e5638da9c5a82c5076efc544d57178a87389760198
                                            • Instruction ID: 75d2558b1877979aae163230b704275fd009bd8c4d7380a67554ebce3f4d9ff1
                                            • Opcode Fuzzy Hash: 46071de27b3b18367afdd9e5638da9c5a82c5076efc544d57178a87389760198
                                            • Instruction Fuzzy Hash: DDE09BF19056114ED760AF65BC0278775D09F00B64F05843FF88987312E779D58487CA
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0056CB46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0056C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_56c000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: e2ab7184e6fbd645d531c4f978019bbad4f883721467c356a00210fe53393fc0
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: 6E113F79A00208EFDB01DF98C985E98BFF5AF08351F058094F9489B361D371EA50DF90
                                            APIs
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004630DF
                                            • GetWindowLongW.USER32(?,000000EC), ref: 004630EA
                                            • __wcsnicmp.LIBCMT ref: 00463183
                                            • __wcsnicmp.LIBCMT ref: 004631A4
                                            • __wcsicoll.LIBCMT ref: 004631BA
                                            • SetWindowPos.USER32(?,-000000FE,00000000,00000000,00000000,00000000,00000013,?,?,?,?,?,00000000,00000000,00000000), ref: 004631EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Long__wcsnicmp$__wcsicoll
                                            • String ID: AlwaysOnTop$Border$Caption$DPIScale$Delimiter$Disabled$Hwnd$Invalid option.$Invalid or nonexistent owner or parent window.$Label$LastFound$MaxSize$MaximizeBox$MinSize$MinimizeBox$OwnDialogs$Owner$Parent$Resize$Space$SysMenu$Tab$Theme$ToolWindow
                                            • API String ID: 736084551-994823521
                                            • Opcode ID: 5b487a832655923f534c1a5e646aab6b536ed262329e1ab32c2ce9f372ee5bc0
                                            • Instruction ID: 7ca6eb842a226a16558028c00db40ef4785d1c4c8fca12bfa1af7e9f57d7095e
                                            • Opcode Fuzzy Hash: 5b487a832655923f534c1a5e646aab6b536ed262329e1ab32c2ce9f372ee5bc0
                                            • Instruction Fuzzy Hash: B84217B1604380ABD7609F218C41B6777E4AF40716F14452FF88697392F7ACEE498B5B
                                            APIs
                                            • SetTimer.USER32(004CA564,00000009,0000000A), ref: 02111724
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorFocusMessageTimerTranslate
                                            • String ID: #32770$D
                                            • API String ID: 2746933510-405636740
                                            • Opcode ID: e3e3c9259a20f72c680b5485f64fd1a51d5160d60657c960e92df5ece4d21830
                                            • Instruction ID: a79ed07c59ab696291c6cf0a457864a3f41630dc9591afdc5ba53016cd3d7a14
                                            • Opcode Fuzzy Hash: e3e3c9259a20f72c680b5485f64fd1a51d5160d60657c960e92df5ece4d21830
                                            • Instruction Fuzzy Hash: 80823D30684354AFDB24CF28DC88BAAFBF5BF85308F084579EA49872A0D774D485CB56
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$__snwprintf_memmove_wcschr_wcsncpy
                                            • String ID: %s.%s$, :=*)$, =)$A label must not point to a function.$Blank parameter$ByRef$Duplicate declaration.$Duplicate function definition.$Duplicate parameter.$Expected ":="$Function name too long.$Invalid function declaration.$Missing ")"$Missing close-quote$Missing comma$Out of memory.$Parameter default required.$Parameters of hotkey functions must be optional.$Too many params.$Unsupported parameter default.$false$this$true$value
                                            • API String ID: 1179507668-1825772190
                                            • Opcode ID: 72dbb3c72d424932b573dd88278363bafa185e5ab1e2bb86c4ecbf75d679d8e8
                                            • Instruction ID: 516ed0bf7d3a7bf17d1c41303015cf4e5c152632f94a89df11198284350d979b
                                            • Opcode Fuzzy Hash: 72dbb3c72d424932b573dd88278363bafa185e5ab1e2bb86c4ecbf75d679d8e8
                                            • Instruction Fuzzy Hash: 1752D171704221ABD724DF14E881A6BB3E0EF94304F94852FE8459B393E778ED81C79A
                                            APIs
                                            • RegisterClipboardFormatW.USER32(004AD358), ref: 0214B9F1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClipboardFormatRegister
                                            • String ID:
                                            • API String ID: 1228543026-0
                                            • Opcode ID: 34a3b431461120e8628017451c978d94467888d3a0bbf673c14f2cc8e63f2920
                                            • Instruction ID: fa09c67c9a5cb0b36f190da7a69d09aec0c521c4b3c3349c1f7da96ef71dd34a
                                            • Opcode Fuzzy Hash: 34a3b431461120e8628017451c978d94467888d3a0bbf673c14f2cc8e63f2920
                                            • Instruction Fuzzy Hash: 5212F776B44204AFD720CF68EC88F6777A9EB84715F14853AF94AD7250DB31E900CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign__wcsicoll$Window__wcsnicmp$ClientForegroundIconicRectScreen_wcsncpy_wcsrchr
                                            • String ID:
                                            • API String ID: 4100256352-0
                                            • Opcode ID: 7f73180a36183d9854ac139516008d3652771ef7370f1e036a3c3c470a3f04ec
                                            • Instruction ID: 263efa3eed0c564fe9bc524b3c013f1f0e88629ac3a27bbb15daf5ca5605a1ef
                                            • Opcode Fuzzy Hash: 7f73180a36183d9854ac139516008d3652771ef7370f1e036a3c3c470a3f04ec
                                            • Instruction Fuzzy Hash: EF62E17198C3419FC724CF28C890B6FBBE1AF89718F14492DF89997290DB74DA45CB92
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 0214A7CF
                                            • IsIconic.USER32(00000000), ref: 0214A7DC
                                            • GetWindowRect.USER32(00000000,?), ref: 0214A7F0
                                            • ClientToScreen.USER32(00000000,?), ref: 0214A808
                                            • GetDC.USER32(00000000), ref: 0214A8B4
                                            • CreateCompatibleDC.GDI32(?), ref: 0214A8F3
                                            • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0214A90E
                                            • SelectObject.GDI32(00000000,00000000), ref: 0214A924
                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 0214A951
                                            • ReleaseDC.USER32(00000000,?), ref: 0214ABFF
                                            • SelectObject.GDI32(?,?), ref: 0214AC17
                                            • DeleteDC.GDI32(?), ref: 0214AC1E
                                            • DeleteObject.GDI32(?), ref: 0214AC2D
                                            • _free.LIBCMT ref: 0214AC43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Object$CompatibleCreateDeleteSelectWindow$BitmapClientForegroundIconicRectReleaseScreen_free
                                            • String ID: 9J$$cJ$$cJ$Fast$RGB$|hJ
                                            • API String ID: 2647761896-1257331509
                                            • Opcode ID: 019b84ae6b11314afa46737dc391902eaa07c72c87b9d5374cad2353dff5aed2
                                            • Instruction ID: 3055a89713978d5f9f3373f45ac3a2726831c84c2d47bf645ef59b2df6cdde23
                                            • Opcode Fuzzy Hash: 019b84ae6b11314afa46737dc391902eaa07c72c87b9d5374cad2353dff5aed2
                                            • Instruction Fuzzy Hash: BB32F63168C3815FD724CF2888A076BBBE2AFC5214F16495DF8D997281CB75C949CB92
                                            APIs
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0217A4B9
                                            • IsWindowVisible.USER32(?), ref: 0217A4DA
                                            • IsIconic.USER32(?), ref: 0217A4ED
                                            • GetFocus.USER32 ref: 0217A521
                                            • GetWindowRect.USER32(?,?), ref: 0217A551
                                            • GetPropW.USER32(?,004BF710), ref: 0217A560
                                            • ShowWindow.USER32(00000000,00000000,?,004BF710,?,?), ref: 0217A574
                                            • GetUpdateRect.USER32(?,?,00000000), ref: 0217A59C
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0217A61D
                                            • ShowWindow.USER32(00000000,?,?,004BF710,?,?), ref: 0217A64D
                                            • EnableWindow.USER32(00000000,00000000), ref: 0217A664
                                            • GetWindowRect.USER32(00000000,?), ref: 0217A678
                                            • SetFocus.USER32(00000000,?,004BF710,?,?), ref: 0217A6EA
                                            • ShowWindow.USER32(00000000,00000005,?,004BF710,?,?), ref: 0217A735
                                            • SetFocus.USER32(?,?,004BF710,?,?), ref: 0217A749
                                            • InvalidateRect.USER32(?,00000000,00000001,?,004BF710,?,?), ref: 0217A765
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0217A79E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Rect$FocusShow$Long$EnableIconicInvalidatePointsPropUpdateVisible
                                            • String ID:
                                            • API String ID: 805697895-0
                                            • Opcode ID: 06d737ea6ea5637906f4b3aca56556984f50b29f047ed9fe22b60b96950088e3
                                            • Instruction ID: b101e033dc8c82d8e85d47cc7c6c20da8ee1bdf0273b66c824f2ef7aee99825d
                                            • Opcode Fuzzy Hash: 06d737ea6ea5637906f4b3aca56556984f50b29f047ed9fe22b60b96950088e3
                                            • Instruction Fuzzy Hash: 31A18D75548380AFD710CB64C858B6ABFF8AFC6348F08890DF9D587291C7B5E548CB92
                                            APIs
                                            • __wcsicoll.LIBCMT ref: 0211DA46
                                            • _malloc.LIBCMT ref: 0211DA85
                                              • Part of subcall function 0219FEF4: __FF_MSGBANNER.LIBCMT ref: 0219FF0D
                                              • Part of subcall function 0219FEF4: __NMSG_WRITE.LIBCMT ref: 0219FF14
                                              • Part of subcall function 0219FEF4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0219FF39
                                            • _wcsncpy.LIBCMT ref: 0211DAD9
                                            • __wcsicoll.LIBCMT ref: 0211DAF6
                                            • __wcsicoll.LIBCMT ref: 0211DC0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$AllocateHeap_malloc_wcsncpy
                                            • String ID: -()[]{}:;'"/\,.?! $EndChars$Hotstring not found.$Parameter #1 invalid.$Parameter #2 must not be blank in this case.
                                            • API String ID: 482388181-1465017980
                                            • Opcode ID: dd940c8f0a8e8bfbcab3c84c176e3b0f666027bbf811c1331efad9ad837fa628
                                            • Instruction ID: 37ca407b0413fd37104f807751dbd193168f80619d09609c31b79129fadf3610
                                            • Opcode Fuzzy Hash: dd940c8f0a8e8bfbcab3c84c176e3b0f666027bbf811c1331efad9ad837fa628
                                            • Instruction Fuzzy Hash: 1A1257756843029FC720DF68E880B6BB7E1EFD5358F18897DE88987280E771D905CB96
                                            APIs
                                              • Part of subcall function 00432850: __wcsicoll.LIBCMT ref: 0043286B
                                              • Part of subcall function 00432850: __wcsicoll.LIBCMT ref: 00432881
                                            • GetForegroundWindow.USER32 ref: 004391F9
                                            • IsWindowVisible.USER32(00000000), ref: 00439214
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window__wcsicoll$ForegroundVisible
                                            • String ID: %s1$0x%06X$0x%08X$GetLayeredWindowAttributes$Parameter #2 invalid.$user32
                                            • API String ID: 1910143062-141734719
                                            • Opcode ID: 8fb82d22e399b84acd34a95c0c670a96e6b4e883b32cfc8f925c40b0a79fbf20
                                            • Instruction ID: 7139e1a205a3835274907bc1a73ee8bbe098f6ac71207684c2b1641db0ecd920
                                            • Opcode Fuzzy Hash: 8fb82d22e399b84acd34a95c0c670a96e6b4e883b32cfc8f925c40b0a79fbf20
                                            • Instruction Fuzzy Hash: FCD145727083052BD720DA69AC81F6B73D8ABDD314F14496FFA44972C1D6F8DC4487AA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$CloseEmptyGlobalUnlock
                                            • String ID: GlobalLock
                                            • API String ID: 219879227-2848605275
                                            • Opcode ID: 2efe591a42643f5ca382abad1f116e147d7ae98fa6ecd258224c72993317b6cc
                                            • Instruction ID: 939b3fbf25376577d98090dbb04e64af16a5a6f3fd3a2530a7c816d8e30ce8b9
                                            • Opcode Fuzzy Hash: 2efe591a42643f5ca382abad1f116e147d7ae98fa6ecd258224c72993317b6cc
                                            • Instruction Fuzzy Hash: D44181B6A40310DBC750AFA9FCC4B6A7BA4F785B49F00053AF80992360E7788845CB9D
                                            APIs
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047A1EA
                                            • GetForegroundWindow.USER32(?,00000000,753C5170,?,?,?,?,00000000,?,?,00000000,0040FFFD,?,00000000,?,00000002), ref: 0047A207
                                            • IsIconic.USER32(00000000), ref: 0047A210
                                            • ShowWindow.USER32(00000000,00000009,?,00000000,753C5170,?,?,?,?,00000000,?,?,00000000,0040FFFD,?,00000000), ref: 0047A21D
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047A25C
                                            • AttachThreadInput.USER32(00001E3C,00000000,00000001), ref: 0047A284
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0047A2A1
                                            • SetForegroundWindow.USER32(00000000), ref: 0047A2BD
                                            • GetForegroundWindow.USER32(?,?,?,00000000,753C5170,?,?,?,?,00000000,?,?,00000000,0040FFFD,?,00000000), ref: 0047A2DF
                                            • GetWindow.USER32(00000000,00000004), ref: 0047A2F6
                                            • AttachThreadInput.USER32(00001E3C,?,00000000), ref: 0047A35A
                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0047A373
                                            • BringWindowToTop.USER32(00000000), ref: 0047A37E
                                              • Part of subcall function 0047A170: SetForegroundWindow.USER32(00000000), ref: 0047A172
                                              • Part of subcall function 0047A170: GetForegroundWindow.USER32(?,?,?,?,?,00000000,753C5170,?,?,?,?,00000000,?,?,00000000,0040FFFD), ref: 0047A198
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Thread$Foreground$AttachInput$Process$BringIconicShow
                                            • String ID:
                                            • API String ID: 2800171079-0
                                            • Opcode ID: 8547cf8a207538732f5142beff319aa9c362607ebd2652fa2b0a1477a5643b86
                                            • Instruction ID: 17429e58e888e940572dc26b2deb07df03c943be040ae62c52dc4e4a82a2be25
                                            • Opcode Fuzzy Hash: 8547cf8a207538732f5142beff319aa9c362607ebd2652fa2b0a1477a5643b86
                                            • Instruction Fuzzy Hash: 994119717443046BE320AF61AC45BAF7B98ABC1704F44446EFD09963A2E7BDD81486AF
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __snwprintf_wcschr
                                            • String ID: , :=*)$, =)$ByRef$Parameters of hotkey functions must be optional.
                                            • API String ID: 1333472643-784389657
                                            • Opcode ID: 799778324e15fd4bd9d564c5f87624465aec5e8ed1b12ff5ac35523e9795f330
                                            • Instruction ID: b290463534c11296cfd57a345b14ccd30676217268b28ea82a0911d2843220d5
                                            • Opcode Fuzzy Hash: 799778324e15fd4bd9d564c5f87624465aec5e8ed1b12ff5ac35523e9795f330
                                            • Instruction Fuzzy Hash: EA423571A84301AFC735DF14D880BBBB3E6EF88314F14856DE8898B291E775E945CB92
                                            APIs
                                            • LoadLibraryW.KERNEL32(uxtheme,?,?,?,00000000,?,00465C4F,?,00000000,?,0000041D,00000000,00000000,?,0000000B,00000000), ref: 0046A04F
                                            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0046A061
                                            • FreeLibrary.KERNEL32(00000000,?,0000041D,00000000,00000000,?,0000000B,00000000,00000000), ref: 0046A079
                                            • SendMessageW.USER32(?,00000406,?,?), ref: 0046A0D1
                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0046A0EA
                                            • SendMessageW.USER32(?,00002001,00000000,?), ref: 0046A107
                                            • GetSysColor.USER32(0000000F), ref: 0046A121
                                            • SendMessageW.USER32(?,00002001,00000000,?), ref: 0046A137
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$Library$AddressColorFreeLoadProc
                                            • String ID: SetWindowTheme$uxtheme
                                            • API String ID: 2745204275-1369271589
                                            • Opcode ID: bc8fd5fb37f945784390bae8e6c4ebbbed511f63bcebccefae0619b0e65411b7
                                            • Instruction ID: 0c98885233e324aa85396c276109a4b44d240bcd2a1bbc61294b01052b2a8841
                                            • Opcode Fuzzy Hash: bc8fd5fb37f945784390bae8e6c4ebbbed511f63bcebccefae0619b0e65411b7
                                            • Instruction Fuzzy Hash: 5431C671200B00AEE6209A258C85B67B798EF01324F20061FF652A76D1F7B9EC91CB5F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: $$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$Error text not found (please report)$LF)$NO_START_OPT)$UCP)$UTF16)$no error
                                            • API String ID: 0-3688278424
                                            • Opcode ID: dc7e4e8ba2595484d4e9e087d88513841886303a6c139d61aa3aab16971cf310
                                            • Instruction ID: 37e14a606ab9763c8f5fa3ac6e83a0b70d418c8b95a2605c59632c980a919b2c
                                            • Opcode Fuzzy Hash: dc7e4e8ba2595484d4e9e087d88513841886303a6c139d61aa3aab16971cf310
                                            • Instruction Fuzzy Hash: 1762F471A487859FCB298F18C8507BBB7E1FF84304F954A2EE4DA87380E7749545CB92
                                            APIs
                                            • PostMessageW.USER32(004CA564,0000041E,004CAD70,00000000), ref: 021170DA
                                            • GetForegroundWindow.USER32 ref: 02117155
                                            • GetGUIThreadInfo.USER32(00000000,?), ref: 02117181
                                            • GetKeyboardLayout.USER32(00000000), ref: 0211719B
                                            • GetClassNameW.USER32(00000000,?,0000001C), ref: 021171BC
                                            • __wcsicoll.LIBCMT ref: 021171CF
                                            • GetKeyState.USER32(00000014), ref: 0211729B
                                            • _memset.LIBCMT ref: 021174FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClassForegroundInfoKeyboardLayoutMessageNamePostStateThreadWindow__wcsicoll_memset
                                            • String ID: 0
                                            • API String ID: 2278213348-4108050209
                                            • Opcode ID: d090e6ca451d25e10e170e707db30bd7b9c7091e9048aa6b59827ed99cb335eb
                                            • Instruction ID: 09d53d2c72c86dc8646bf9adaca991f90b649d20b04a87a508ef8d7fb606c3e8
                                            • Opcode Fuzzy Hash: d090e6ca451d25e10e170e707db30bd7b9c7091e9048aa6b59827ed99cb335eb
                                            • Instruction Fuzzy Hash: B2E133319883819FE735CB65D854FA7BBE4AB86308F08447CE888473D2D774954BCBA6
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,0214D50F), ref: 0218A457
                                            • IsIconic.USER32(?), ref: 0218A460
                                            • ShowWindow.USER32(?,00000009,?,?,?,?,?,?,0214D50F), ref: 0218A46D
                                            • AttachThreadInput.USER32(004CB4F0,00000000,00000001), ref: 0218A4D4
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0218A4F1
                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,0214D50F), ref: 0218A52F
                                            • GetWindow.USER32(00000000,00000004), ref: 0218A546
                                            • AttachThreadInput.USER32(004CB4F0,?,00000000), ref: 0218A5AA
                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0218A5C3
                                            • BringWindowToTop.USER32(?), ref: 0218A5CE
                                              • Part of subcall function 0218A3C0: SetForegroundWindow.USER32(?), ref: 0218A3C2
                                              • Part of subcall function 0218A3C0: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,0214D50F), ref: 0218A3E8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$AttachForegroundInputThread$BringIconicShow
                                            • String ID:
                                            • API String ID: 2023223573-0
                                            • Opcode ID: c7ec9a2515987fbe8d7cf564c87f77003f22eba3ced6b31050cb7459ae62b522
                                            • Instruction ID: 1d7780c8a965a85a411677b153d9b626d3d2e08fbfcf4642c8e0b79f55981c9f
                                            • Opcode Fuzzy Hash: c7ec9a2515987fbe8d7cf564c87f77003f22eba3ced6b31050cb7459ae62b522
                                            • Instruction Fuzzy Hash: EA4128717C43446FD720BF64AC89B2A7BD9AF81705F08043AFE41961A2EBB5D4448FA9
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 004560D5
                                            • Process32FirstW.KERNEL32(00000000,00000000), ref: 004560E7
                                            • __wcstoi64.LIBCMT ref: 00456113
                                              • Part of subcall function 00491933: wcstoxq.LIBCMT ref: 00491954
                                            • Process32NextW.KERNEL32(00000000,?), ref: 00456134
                                            • __wsplitpath.LIBCMT ref: 00456175
                                            • __wcsicoll.LIBCMT ref: 004561C5
                                            • Process32NextW.KERNEL32(?,?), ref: 004561DB
                                            • CloseHandle.KERNEL32(00000000), ref: 004561EE
                                            • CloseHandle.KERNEL32(00000000), ref: 00456201
                                            • CloseHandle.KERNEL32(?), ref: 00456218
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleProcess32$Next$CreateFirstSnapshotToolhelp32__wcsicoll__wcstoi64__wsplitpathwcstoxq
                                            • String ID:
                                            • API String ID: 2291101207-0
                                            • Opcode ID: 88545c9bef7bae8dc7d8807c7e105aa4174bab01dd0a21c669607c046b9bf7f7
                                            • Instruction ID: 036c12701fcd6cf66a8ce1279056cbf7d6e515b3a8726fccb7ba67edbfa94fc8
                                            • Opcode Fuzzy Hash: 88545c9bef7bae8dc7d8807c7e105aa4174bab01dd0a21c669607c046b9bf7f7
                                            • Instruction Fuzzy Hash: A23102726043056BD720EB609C45BFF77A8EB85301F44492EFA06D7282E779DA0CC79A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd0ca851aa29bbd844c3614b23e5e271a1bbac944d08adabe11153cbb632429f
                                            • Instruction ID: c75cc6158a59c1ff333161c73fd5d610ddbc1b685a1fd413a4c5d4899e3f4584
                                            • Opcode Fuzzy Hash: dd0ca851aa29bbd844c3614b23e5e271a1bbac944d08adabe11153cbb632429f
                                            • Instruction Fuzzy Hash: F87112726842189FD720EF68E888FAA77B9EBC5324F044566FD058B290D770DC18CBE1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID: $cJ$`vD
                                            • API String ID: 269201875-1441683293
                                            • Opcode ID: 8ad9f42f84856b013ef9741288a65e88980550c3beaab711370d3bbcc8bdc435
                                            • Instruction ID: ceccd541e07986a7797d0d166aa8ad5706ac3e011f42f891716df568f8786b5a
                                            • Opcode Fuzzy Hash: 8ad9f42f84856b013ef9741288a65e88980550c3beaab711370d3bbcc8bdc435
                                            • Instruction Fuzzy Hash: E4B29B71944205CFDB24CF58C888BBEB7B2EF49318F2981A9D809AB355D735E991CF90
                                            APIs
                                            • _malloc.LIBCMT ref: 004081FD
                                            • _memset.LIBCMT ref: 0040821F
                                            • _memset.LIBCMT ref: 00408231
                                              • Part of subcall function 00408ED0: CreateThread.KERNEL32(00000000,00002000,00409200,00000000,00000000,004C9470), ref: 00408F2A
                                              • Part of subcall function 00408ED0: SetThreadPriority.KERNEL32(00000000,0000000F,?,?,?,?,?,?,?,?,?,00000000,00408D46,?,00000000), ref: 00408F40
                                              • Part of subcall function 00408ED0: PostThreadMessageW.USER32(00000000,00000417,?,00000000), ref: 00408F64
                                              • Part of subcall function 00408ED0: Sleep.KERNEL32(0000000A,?,?,?,?,?,?,?,?,?,00000000,00408D46,?,00000000,?,00000000), ref: 00408F70
                                              • Part of subcall function 00408ED0: GetTickCount.KERNEL32 ref: 00408F87
                                              • Part of subcall function 00408ED0: PeekMessageW.USER32(?,00000000,00000417,00000417,00000001), ref: 00408FAA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Thread$Message_memset$CountCreatePeekPostPrioritySleepTick_malloc
                                            • String ID: HjL$LjL$PjL$t{L
                                            • API String ID: 2797994793-938905590
                                            • Opcode ID: f7dac126c0f655bff1d16471c5db8f6fc25da5ac3cd5f33c276d3626b51e7ba6
                                            • Instruction ID: ffa0d5355a4f67753e3a21702c250b05d4e2a096a4fe72fb4fc13edf58fa1f0e
                                            • Opcode Fuzzy Hash: f7dac126c0f655bff1d16471c5db8f6fc25da5ac3cd5f33c276d3626b51e7ba6
                                            • Instruction Fuzzy Hash: 3C7235704083818EE725CF24C5547B2BBE1AF51308F0981BED8C95B3E2DB7DA999C75A
                                            APIs
                                            • _wcschr.LIBCMT ref: 02164F98
                                            • _wcschr.LIBCMT ref: 02164FAA
                                            • GetFileAttributesW.KERNEL32(?), ref: 02164FBA
                                            • FindFirstFileW.KERNEL32(?,?), ref: 02164FD6
                                            • FindClose.KERNEL32(00000000), ref: 02164FE6
                                            • CoInitialize.OLE32(00000000), ref: 02164FEE
                                            • CoCreateInstance.COMBASE(004A17C8,00000000,00000001,004A17B8,?), ref: 02165007
                                            • CoUninitialize.COMBASE ref: 021651CB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind_wcschr$AttributesCloseCreateFirstInitializeInstanceUninitialize
                                            • String ID:
                                            • API String ID: 1700229770-0
                                            • Opcode ID: cb5910261d48cb7db90d4ddefa7eb160039014c3355fab72c523a965e632ac90
                                            • Instruction ID: 69f6c7e916579d5f57ceff15a805698520dbc81bc3facfc6ab6e448d5d175eba
                                            • Opcode Fuzzy Hash: cb5910261d48cb7db90d4ddefa7eb160039014c3355fab72c523a965e632ac90
                                            • Instruction Fuzzy Hash: 67B1BB71284301AFD614EF68CC84F7A73AAABC8B14F50861CF9559B2D0DB70E8198B96
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 0214D788
                                            • GetForegroundWindow.USER32 ref: 0214D7B0
                                            • IsIconic.USER32(00000000), ref: 0214D7BF
                                            • GetWindowRect.USER32(?,?), ref: 0214D7D7
                                            • ClientToScreen.USER32(?,?), ref: 0214D805
                                            • WindowFromPoint.USER32(?,?), ref: 0214D869
                                            • _memset.LIBCMT ref: 0214D8D6
                                            • GetClassNameW.USER32(00000000,?,000000FC), ref: 0214D94A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ClassClientCursorForegroundFromIconicNamePointRectScreen_memset
                                            • String ID:
                                            • API String ID: 247462549-0
                                            • Opcode ID: 5a07e403cf189baff5b24ab41dfe8479df392b4fca16e53a58607d2a5a948e72
                                            • Instruction ID: 58bb438d2958c19ca6ce7446a1335f10c63c045e3608d4ed0883ea489c56d66d
                                            • Opcode Fuzzy Hash: 5a07e403cf189baff5b24ab41dfe8479df392b4fca16e53a58607d2a5a948e72
                                            • Instruction Fuzzy Hash: 9871D0726483019BC714DF68E884B7BB7E9ABC9714F044A3EF989C7250DB75D808CB96
                                            APIs
                                            • _wcschr.LIBCMT ref: 0218748A
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004CB508), ref: 021874B2
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004CB508), ref: 021874CA
                                            • _wcschr.LIBCMT ref: 0218751D
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004CB508), ref: 02187542
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004CB508), ref: 02187552
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFileFirst_wcschr
                                            • String ID:
                                            • API String ID: 1717823228-0
                                            • Opcode ID: c8c1045d508bce00743c90e9b0b0598b8ee3e344abcbea2d898b3a5c5e9f3741
                                            • Instruction ID: 2ae82f41a5307b82dd890833c76a781ba42dc7c12878d6ad3390b7ff2984498e
                                            • Opcode Fuzzy Hash: c8c1045d508bce00743c90e9b0b0598b8ee3e344abcbea2d898b3a5c5e9f3741
                                            • Instruction Fuzzy Hash: D151293A9403019BC710BB60CCC5FABB7A9EF84355F598A28ED549B1D0F774E50ACBA1
                                            APIs
                                            • CreateFileW.KERNEL32(?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0215463B
                                            • GetFileSizeEx.KERNEL32(00000000,?,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0215464E
                                            • CloseHandle.KERNEL32(00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 02154657
                                            • FindFirstFileW.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 02154667
                                            • GetLastError.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 02154672
                                            • FindClose.KERNEL32(00000000,?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 021546AE
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0215471A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseFind$CreateErrorFirstHandleLastSizeUnothrow_t@std@@@__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1680075938-0
                                            • Opcode ID: cd8f7bcb35db625a6ed9b051ebb112c66d3d8faf1ac26d9a42cb608c12cfdbfb
                                            • Instruction ID: bc948bff01e802047e76058ff51b67cec5a488b5061aec3d1471667d61ae3298
                                            • Opcode Fuzzy Hash: cd8f7bcb35db625a6ed9b051ebb112c66d3d8faf1ac26d9a42cb608c12cfdbfb
                                            • Instruction Fuzzy Hash: 82414A31794310BFD220DF68DC85F6AB7E5EB8A725F108359FE64AB2D0C7B094408B99
                                            APIs
                                            • EmptyClipboard.USER32 ref: 02114933
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0211494A
                                            • CloseClipboard.USER32 ref: 02114953
                                            • GlobalFree.KERNEL32(00000000), ref: 0211499C
                                            • CloseClipboard.USER32 ref: 021149B7
                                              • Part of subcall function 02114A10: CloseClipboard.USER32 ref: 02114A31
                                              • Part of subcall function 02114A10: GlobalFree.KERNEL32(00000000), ref: 02114A55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$CloseGlobal$Free$EmptyUnlock
                                            • String ID:
                                            • API String ID: 3602016276-0
                                            • Opcode ID: 6e0d18064490e9cc9fc47cac1d4288dd2eeab42c5373861d4703ab5c7c3b8c66
                                            • Instruction ID: e1511e2ffa5a823880f564f3b138b6d2211e6710e3b125618d4211edce40bfc3
                                            • Opcode Fuzzy Hash: 6e0d18064490e9cc9fc47cac1d4288dd2eeab42c5373861d4703ab5c7c3b8c66
                                            • Instruction Fuzzy Hash: 273161B26447069FD7309FA6E8C0516FBE4FF99B15B20893FE18782A64C730E480CB55
                                            APIs
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 00476117
                                            • GetSystemTimeAsFileTime.KERNEL32(?,023B2640,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 0047612D
                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 0047613D
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 00476162
                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 00476176
                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00428364,00000000,00000001,00000000), ref: 00476186
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004761A8
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475E69
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475E95
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475ECD
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F01
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F36
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F6B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$File$_wcsncpy$System$Local$Unothrow_t@std@@@__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1899144181-0
                                            • Opcode ID: de809b3cdc4eab887e5475d36ad2b7d2b50763ecfed09794ae83ccc3c9da1975
                                            • Instruction ID: b4b5e26bd7235a2b9c8f8a9be33654a6ff7a6b78bf7fa078ce0078da724f1c59
                                            • Opcode Fuzzy Hash: de809b3cdc4eab887e5475d36ad2b7d2b50763ecfed09794ae83ccc3c9da1975
                                            • Instruction Fuzzy Hash: 0621F1726043015BD700EB29DC44BEB7BA9EBC8344F44892DF548D2211E678E60CCBA6
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,?), ref: 02182D2C
                                            • FindClose.KERNEL32(00000000), ref: 02182D38
                                            • GetFileAttributesW.KERNEL32(?,?), ref: 02182D4C
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000000,00000000,?,?), ref: 02182D6C
                                            • CloseHandle.KERNEL32(00000000), ref: 02182DEB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseFind$AttributesCreateFirstHandle
                                            • String ID:
                                            • API String ID: 2368773240-0
                                            • Opcode ID: 8ef67fb86e7cfb53ddda021e31bd1e255b2da095c10377ed57261963219d52de
                                            • Instruction ID: 01e537d12e607b8fdeaf4441d8b6e19c5f10601977c1a0876b67749352e86346
                                            • Opcode Fuzzy Hash: 8ef67fb86e7cfb53ddda021e31bd1e255b2da095c10377ed57261963219d52de
                                            • Instruction Fuzzy Hash: 3F312435280341ABE331AB18DC84BAB7BA8EF85764F10072AFE50D71E0F775D9068A95
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 021AAF51
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 021AAF66
                                            • UnhandledExceptionFilter.KERNEL32(004A37EC), ref: 021AAF71
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 021AAF8D
                                            • TerminateProcess.KERNEL32(00000000), ref: 021AAF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: d79cb2de0cd95a64b14553f2be4021d180462ae28f75077c9fd83984ff13d5bb
                                            • Instruction ID: 0c935445a9c792f757ae424ac163d9603852ee9df887303b520ca572e50bbe5e
                                            • Opcode Fuzzy Hash: d79cb2de0cd95a64b14553f2be4021d180462ae28f75077c9fd83984ff13d5bb
                                            • Instruction Fuzzy Hash: 8B21CAB9841324DFD780EF64E888A597BB4BB59355F61403EE50AC72B0EBB199808F4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                            • API String ID: 0-1546025612
                                            • Opcode ID: d686b31caea2ab6f13d2d795aa8851bc5ec71db7b80f89c2f618eff3f2bac86a
                                            • Instruction ID: 89d6118a49da0458fb10577f4954dd61b875f20353b4a729b9844f91f6d8c61c
                                            • Opcode Fuzzy Hash: d686b31caea2ab6f13d2d795aa8851bc5ec71db7b80f89c2f618eff3f2bac86a
                                            • Instruction Fuzzy Hash: 918271716483418BDF34CF18C4907AAB7E2FB84319F188A2FE99987390D775D885CB92
                                            APIs
                                            • FindFirstFileW.KERNEL32(023B2640,?), ref: 0044409C
                                            • GetLastError.KERNEL32 ref: 004440A7
                                            • FindClose.KERNEL32(00000000), ref: 004440E5
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0044413C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$FindTime$CloseErrorFirstLastLocal
                                            • String ID:
                                            • API String ID: 1380247339-0
                                            • Opcode ID: ca23051393882d4136f75d9a3ee6569a51491ec7af40c4a0d427826f3cfb1cc1
                                            • Instruction ID: e4b9cdb8433bc524a64689125bc5d6290bfd951b95cd09f2084f24f87c0194b9
                                            • Opcode Fuzzy Hash: ca23051393882d4136f75d9a3ee6569a51491ec7af40c4a0d427826f3cfb1cc1
                                            • Instruction Fuzzy Hash: 523168721043016BE320DB24DC46FE737A8ABA532DF14872FF9546A2E0D7B89540C38D
                                            APIs
                                            • GetForegroundWindow.USER32(00000000,00000000,0047C4FA,023A50F0,?,00000001,00000000,00000000), ref: 0047A0BE
                                            • IsWindowVisible.USER32(00000000), ref: 0047A0D8
                                            • IsIconic.USER32(00000000), ref: 0047A0F0
                                            • ShowWindow.USER32(00000000,00000009), ref: 0047A0FD
                                              • Part of subcall function 0047A720: GetForegroundWindow.USER32(?,?,?,00409D0F,004C91B0,004A3890,00000000,00000000,00000000,00000000), ref: 0047A761
                                              • Part of subcall function 0047A720: IsWindowVisible.USER32(00000000), ref: 0047A776
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundVisible$IconicShow
                                            • String ID:
                                            • API String ID: 4166660966-0
                                            • Opcode ID: 9fd2a1f583c8370908ad67f14b09a1257fb0a0e02fc4437555c4086be6048092
                                            • Instruction ID: ae7e11206276414c0d485b99f2c00ecbcac3dcdcd5e6f38e61c5981dbb390e15
                                            • Opcode Fuzzy Hash: 9fd2a1f583c8370908ad67f14b09a1257fb0a0e02fc4437555c4086be6048092
                                            • Instruction Fuzzy Hash: BD216020A042055EFB209F15D8007AF77E8EBD2355F94C81BE88D87391E778DCA5866B
                                            APIs
                                            • GetForegroundWindow.USER32(00000000,00000000,?), ref: 02187A2F
                                            • IsIconic.USER32(00000000), ref: 02187A3C
                                            • GetWindowRect.USER32(00000000,?), ref: 02187A50
                                            • ClientToScreen.USER32 ref: 02187A6E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ClientForegroundIconicRectScreen
                                            • String ID:
                                            • API String ID: 4031265896-0
                                            • Opcode ID: 760de7af4a8b37d3d73448798450031f28f3f25e901512f845b8e37386971a51
                                            • Instruction ID: 3693a17d2a89e70deeec68000a289c5811e4d3f97bbcab12201c52fe997ac24e
                                            • Opcode Fuzzy Hash: 760de7af4a8b37d3d73448798450031f28f3f25e901512f845b8e37386971a51
                                            • Instruction Fuzzy Hash: 9301A2395442119BD310EF68CC88BBBBBF8EFC5654F19852CFC9592261E730C906CB92
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,0212024D,?), ref: 021879B4
                                            • IsIconic.USER32(00000000), ref: 021879C1
                                            • GetWindowRect.USER32(00000000,?), ref: 021879D7
                                            • ClientToScreen.USER32 ref: 021879F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ClientForegroundIconicRectScreen
                                            • String ID:
                                            • API String ID: 4031265896-0
                                            • Opcode ID: 3ebc524c6c6a218fc2b62e2b68d5937c10ba475563134175d26723ce69d41a63
                                            • Instruction ID: a0a64610c3c7187f26920eb529055fab86d898a604a69a0b7791468f1176a1f3
                                            • Opcode Fuzzy Hash: 3ebc524c6c6a218fc2b62e2b68d5937c10ba475563134175d26723ce69d41a63
                                            • Instruction Fuzzy Hash: B1F09038404312DFD312EF14CC8479BBBE8AF85398F448828E84181260E334CA068FA6
                                            APIs
                                            • GetKeyboardLayout.USER32(00000000), ref: 02123DDC
                                            • _memset.LIBCMT ref: 02123DFD
                                            • MapVirtualKeyExW.USER32(?,00000002,00000000), ref: 02123EC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutVirtual_memset
                                            • String ID:
                                            • API String ID: 864426193-0
                                            • Opcode ID: 8513564c3313c591a2c7cca2330690e911b8bcfccf49020e5d82ee4055b193a1
                                            • Instruction ID: 4a8fd7a4cc7c171f40e3c840b34b90bfe5d60f4fcb58cfde51d98312e13628c8
                                            • Opcode Fuzzy Hash: 8513564c3313c591a2c7cca2330690e911b8bcfccf49020e5d82ee4055b193a1
                                            • Instruction Fuzzy Hash: ED31D1326813107AE324DB529C46FEB77A8EBC5F14F444819B6919A0C0E379E61DC7B6
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,?), ref: 0218736E
                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 0218737A
                                            • GetFileAttributesW.KERNEL32(00000000,?,?,?), ref: 02187395
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: dca11533afd82922be7dd366876d59251fd28c1c61952bd83731f9f2bffba0a9
                                            • Instruction ID: 1ddb499040ccb4bd1baa85fa9be625553f76f63906d451394bb41ef18cc16899
                                            • Opcode Fuzzy Hash: dca11533afd82922be7dd366876d59251fd28c1c61952bd83731f9f2bffba0a9
                                            • Instruction Fuzzy Hash: 90014E3D5C0A0157D7217B24DCC57AFB755AF85331F744224EC68922D0F73C80479A66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .$GetProcAddress.$l
                                            • API String ID: 0-2784972518
                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction ID: d486d75307bc883e2e3f020181736d47453b96a2fc3586c5d122d2491ae3b294
                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction Fuzzy Hash: DD316CB6900609DFDB10CF99C880AAEBBF5FF48324F15405AD845AB314D771EA85CFA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick
                                            • String ID:
                                            • API String ID: 536389180-0
                                            • Opcode ID: 09e10f347fb4de67ab11833470fbe0e5969e7ce1195d3ab2e3671124570c9cea
                                            • Instruction ID: 3f1b71a485ae7ad70e678dc47a2973ba57dc96c8f551c34710cbbe170beb5e59
                                            • Opcode Fuzzy Hash: 09e10f347fb4de67ab11833470fbe0e5969e7ce1195d3ab2e3671124570c9cea
                                            • Instruction Fuzzy Hash: 1011E6325755218BE324CF3ACC81556B7E2EBD4304724CBADE4A3872D5DA39A906DB88
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick
                                            • String ID:
                                            • API String ID: 536389180-0
                                            • Opcode ID: fdef99ca3e814b9f2efecba622b042c935186b35e85c4f31d65665be6ffd0582
                                            • Instruction ID: 4f15ce218b470de870cec51280ad78f8b60257648f5f467b4911db22c36a48b6
                                            • Opcode Fuzzy Hash: fdef99ca3e814b9f2efecba622b042c935186b35e85c4f31d65665be6ffd0582
                                            • Instruction Fuzzy Hash: D111E9315715208BE314CF3ADC8165673E2E7D4305B24CB7DE4A3832D4DB39A906DB88
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000981B0), ref: 004981F7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: cf844d523f961588a1c7548d3fa2ebb8ae1b6a6ed957c2ff30a3db27bc0a8a02
                                            • Instruction ID: 021c6d52382ca28787a27ed5fc3266060751a9f8a54b99470d6765a1e8ab81d2
                                            • Opcode Fuzzy Hash: cf844d523f961588a1c7548d3fa2ebb8ae1b6a6ed957c2ff30a3db27bc0a8a02
                                            • Instruction Fuzzy Hash: 9B9002662521104ACB4017765C0A6457D905BCA642B5584B5A001D5078DF6480155519
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e1b6c8dcd1fa6505b02d100f0cfa9bebda4992a6bc8538c07f690c2cb3bc5d55
                                            • Instruction ID: d4626f5f6baadc693402effd8bcbd379ad1abf2815bd1abf302eef3871043d73
                                            • Opcode Fuzzy Hash: e1b6c8dcd1fa6505b02d100f0cfa9bebda4992a6bc8538c07f690c2cb3bc5d55
                                            • Instruction Fuzzy Hash: C041E962B5011657D70C983DCDD6392A98BEBD8604F9AC636E284CF3D9EF20ED054AC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627243778.000000000056C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0056C000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_56c000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: e56d2326fb955286f1f2067dba04c89630adfeb1ee9054b31f2d78cd8f903110
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: 91117C72340100AFDB54DE55DC81EA67BEAFB89320B2980A9ED44CB312D775E841CB60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                                            • Instruction ID: 26b807cc2e022fa720d3a71b3601b917d4ef4b55e9eba8d944ae4e56a50321b7
                                            • Opcode Fuzzy Hash: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                                            • Instruction Fuzzy Hash: A6F0CD76A406149FDF21CF24C805BAE73F9FB89215F0441B8DC0AD7242D331E9828B90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: ActiveX$Button$Checkbox$ComboBox$Custom$DDL$DateTime$DropDownList$Edit$GroupBox$Hotkey$Link$ListBox$ListView$MonthCal$Pic$Picture$Progress$Radio$Slider$StatusBar$Tab$Tab2$Tab3$Text$TreeView$UpDown
                                            • API String ID: 3832890014-2446625512
                                            • Opcode ID: 05998e2bf40298e05412c69ee4ccec4e51171e1a594c8263a79989ee3e2bf4cd
                                            • Instruction ID: b644e71329dbc9069807f060f6f62ee20423c9fd87c4a688b797254deea0c125
                                            • Opcode Fuzzy Hash: 05998e2bf40298e05412c69ee4ccec4e51171e1a594c8263a79989ee3e2bf4cd
                                            • Instruction Fuzzy Hash: FB516A4DE41A15215DA035362D03BDF22482C71B4FBC8547BFD0895743F68EA7AEA2BE
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 69694fa98078b1d067c214e58a306f53fd20f2fecaf1e339aacc250acb128ac1
                                            • Instruction ID: 637ddcdb99d92791a1c683680b8f7625544094a31117aacfced32aeb4612390c
                                            • Opcode Fuzzy Hash: 69694fa98078b1d067c214e58a306f53fd20f2fecaf1e339aacc250acb128ac1
                                            • Instruction Fuzzy Hash: 3F517075BC162576EF1121394C02B9E204EEF62747FE58078FC08C56C2FB8DD62B61AA
                                            APIs
                                            • __fassign.LIBCMT ref: 02150F8B
                                            • __wcstoi64.LIBCMT ref: 02150FC3
                                            • mixerOpen.WINMM(?,00000000,00000000,00000000,00000000), ref: 0215102F
                                            • mixerGetDevCapsW.WINMM(?,?,00000050), ref: 02151092
                                            • _memset.LIBCMT ref: 021510BB
                                            • mixerGetLineInfoW.WINMM(?,?,00000003), ref: 021510ED
                                            • mixerClose.WINMM(?), ref: 02151100
                                            • mixerGetLineInfoW.WINMM(?,?,00000000), ref: 0215114C
                                            • mixerGetLineInfoW.WINMM(?,?,00000001), ref: 02151189
                                            • mixerClose.WINMM(?), ref: 021511CF
                                            • mixerGetLineControlsW.WINMM(?,?,00000002), ref: 02151260
                                            • mixerClose.WINMM(?), ref: 0215126F
                                            • mixerGetControlDetailsW.WINMM(?,?,00000000), ref: 02151341
                                            • mixerClose.WINMM(?), ref: 02151350
                                            • mixerSetControlDetails.WINMM(?,?,00000000), ref: 021513EF
                                            • mixerClose.WINMM(?), ref: 021513FC
                                            • mixerClose.WINMM(?), ref: 021514A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: mixer$Close$Line$Info$ControlDetails$CapsControlsOpen__fassign__wcstoi64_memset
                                            • String ID: 9J$Can't Change Setting$Can't Get Current Setting$Off
                                            • API String ID: 1407323690-312032509
                                            • Opcode ID: 617bc19ba311237f7e83c4fabe314323277bb2985cc1e831e26138c74418c644
                                            • Instruction ID: 04e17d082bb4f31ed8132b5957e89c400da1e2d74149ff7a6c32ee35bcdee885
                                            • Opcode Fuzzy Hash: 617bc19ba311237f7e83c4fabe314323277bb2985cc1e831e26138c74418c644
                                            • Instruction Fuzzy Hash: DB024471688350EFC721DF54D880BAEB7E1BBC8710F004AAEF9A997290D7719844CB96
                                            APIs
                                            • _memset.LIBCMT ref: 02127511
                                              • Part of subcall function 02188410: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004A1654,?,004CB508,00000000,FFFFFF61,00000000,00000000,00000000,004CB508,004A1654,004CB508), ref: 02188429
                                              • Part of subcall function 02188410: FindResourceW.KERNEL32(004CA55C,004CA55C,0000000E), ref: 0218848F
                                              • Part of subcall function 02188410: LoadResource.KERNEL32(004CA55C,00000000), ref: 0218849F
                                              • Part of subcall function 02188410: LockResource.KERNEL32(00000000), ref: 021884AE
                                              • Part of subcall function 02188410: GetSystemMetrics.USER32(0000000B), ref: 021884D6
                                              • Part of subcall function 02188410: FindResourceW.KERNEL32(004CA55C,?,00000003), ref: 02188536
                                              • Part of subcall function 02188410: LoadResource.KERNEL32(004CA55C,00000000), ref: 02188544
                                              • Part of subcall function 02188410: LockResource.KERNEL32(00000000), ref: 0218854F
                                            • GetSystemMetrics.USER32(00000031), ref: 0212755B
                                              • Part of subcall function 02188410: EnumResourceNamesW.KERNEL32 ref: 02188476
                                              • Part of subcall function 02188410: SizeofResource.KERNEL32(004CA55C,00000000,00000001,00030000,00000000,00000000,00000000), ref: 0218856A
                                              • Part of subcall function 02188410: CreateIconFromResourceEx.USER32(00000000,00000000), ref: 02188572
                                              • Part of subcall function 02188410: ExtractIconW.SHELL32(00000000,?,?), ref: 021885B2
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0212758B
                                            • GetForegroundWindow.USER32 ref: 021275FF
                                            • GetClassNameW.USER32(00000000,?,00000040), ref: 02127611
                                            • __wcsicoll.LIBCMT ref: 02127625
                                            • GetMenu.USER32(00000000), ref: 021276AB
                                            • EnableMenuItem.USER32(00000000,0000FF79,00000003), ref: 021276BB
                                            • GetDC.USER32(00000000), ref: 021276FF
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 02127738
                                            • MulDiv.KERNEL32(0000000A,00000000), ref: 02127741
                                            • CreateFontW.GDI32(00000000), ref: 0212774A
                                            • ReleaseDC.USER32(004CA568,00000000), ref: 0212775C
                                            • SetWindowLongW.USER32(004CA564,000000EC,00000000), ref: 021277C5
                                            • LoadAcceleratorsW.USER32(004CA55C,000000D4), ref: 021277D7
                                              • Part of subcall function 02127910: _memset.LIBCMT ref: 02127920
                                              • Part of subcall function 02127910: _wcsncpy.LIBCMT ref: 02127992
                                              • Part of subcall function 02127910: Shell_NotifyIconW.SHELL32(00000000,?), ref: 021279A5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$Load$Icon$CreateFindLockMenuMetricsSystemWindow_memset$AcceleratorsCapsClassCursorDeviceEnableEnumExtractFontForegroundFromItemLibraryLongNameNamesNotifyReleaseShell_Sizeof__wcsicoll_wcsncpy
                                            • String ID: 0$AutoHotkey$Consolas$Lucida Console
                                            • API String ID: 2593902739-2828415984
                                            • Opcode ID: 0fcba408fbe9a4d6741a8c3944e1225a8a43b2592bf6812f5b7c7262be9d5cbe
                                            • Instruction ID: f6fa811abb4c940f8218a48c817ab56d0955d66a3774838e1c80b94484a2f07b
                                            • Opcode Fuzzy Hash: 0fcba408fbe9a4d6741a8c3944e1225a8a43b2592bf6812f5b7c7262be9d5cbe
                                            • Instruction Fuzzy Hash: 91810670A84310BFF3209B64DC49F67BBA8EB45B44F14442AF641A72E0D7B4A415CFAE
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CursorInfo_wcsncpy
                                            • String ID: Unknown
                                            • API String ID: 437400337-1654365787
                                            • Opcode ID: fc493116bc683cded7e268044b68874f89d91ff70af54ca53691fd7c4bd50eaa
                                            • Instruction ID: 46b3d5fbc9bfc14c85e7ed5a46a3168f958799a1367b2d0f904bd814c3e03f3a
                                            • Opcode Fuzzy Hash: fc493116bc683cded7e268044b68874f89d91ff70af54ca53691fd7c4bd50eaa
                                            • Instruction Fuzzy Hash: A241E9B0E48305AAE7509FB99C86F573E94E741B50F040577E50D9F2D1E6BE9004CF9A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcstoui64
                                            • String ID: %sH$%sW$%sX$%sY
                                            • API String ID: 3882282163-2562685033
                                            • Opcode ID: daedca77e798d1172f481326697df5ce9e249a18959a95b72b764f077cf6f8e8
                                            • Instruction ID: 1d4e8a5fa73456e31df366311e2d192d29e107d47f06bc0ba10bff167f73240c
                                            • Opcode Fuzzy Hash: daedca77e798d1172f481326697df5ce9e249a18959a95b72b764f077cf6f8e8
                                            • Instruction Fuzzy Hash: 69E1E371708205ABD714DF24DC81F6B77A9EB88715F104A2EF8459B392D778EC08CB9A
                                            APIs
                                            • RtlInitializeCriticalSection.NTDLL(004C9458), ref: 02113F89
                                            • SetErrorMode.KERNEL32(00000001), ref: 02113F91
                                              • Part of subcall function 02152470: GetCurrentDirectoryW.KERNEL32(00008000,?,?,02113F9E), ref: 02152487
                                            • __wcsicoll.LIBCMT ref: 021140EE
                                            • __wcsicoll.LIBCMT ref: 02114104
                                            • __wcsicoll.LIBCMT ref: 02114116
                                            • __wcsicoll.LIBCMT ref: 02114128
                                            • __wcsnicmp.LIBCMT ref: 0211413C
                                            • FindWindowW.USER32(AutoHotkey,004CBFE4), ref: 02114387
                                            • FindWindowW.USER32(AutoHotkey,004CBFE4), ref: 021143EC
                                            • PostMessageW.USER32(00000000,00000044,00000406,00000000), ref: 02114403
                                            • IsWindow.USER32(00000000), ref: 02114416
                                            • IsWindow.USER32(00000000), ref: 02114451
                                            • _setvbuf.LIBCMT ref: 021144B1
                                            • _malloc.LIBCMT ref: 021144CA
                                            • _memset.LIBCMT ref: 021144DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window__wcsicoll$Find$CriticalCurrentDirectoryErrorInitializeMessageModePostSection__wcsnicmp_malloc_memset_setvbuf
                                            • String ID: AutoHotkey
                                            • API String ID: 3985478116-348589305
                                            • Opcode ID: f9ca806fb31f3e95242ba44cfadcbdc757ea43321a82213c7a6d103d435f31fb
                                            • Instruction ID: 272dd86065aace173afafe891f7d7a4ffe689ab194ac9696c9703fcf77740012
                                            • Opcode Fuzzy Hash: f9ca806fb31f3e95242ba44cfadcbdc757ea43321a82213c7a6d103d435f31fb
                                            • Instruction Fuzzy Hash: 85E15871684300AFE760AB649C46F2B77A5DB85B08F08053DF945DB2D1EBB4D904CB9A
                                            APIs
                                            • CreateWindowExW.USER32(?,SysMonthCal32,004A3890,?,?,?,?,?,?,?,00400000,00000000), ref: 0046211C
                                            • SendMessageW.USER32(00000000,00001004,0000016E,00000000), ref: 00462145
                                            • SendMessageW.USER32(?,00001012,?,?), ref: 00462168
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 004621E2
                                            • SendMessageW.USER32(?,0000100A,00000001,?), ref: 00462204
                                            • SendMessageW.USER32(?,00000030,?,?), ref: 0046222F
                                            • SendMessageW.USER32(?,00001009,00000000,?), ref: 00462264
                                            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00462290
                                            • GetDC.USER32(?), ref: 0046231F
                                            • SelectObject.GDI32(00000000,?), ref: 00462341
                                            • GetTextMetricsW.GDI32(00000000,?), ref: 00462358
                                            • MoveWindow.USER32(00000000,?,?,00000000,?,00000001,?,00001009,00000000,?,?,?,00400000,00000000), ref: 004623EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$Window$CreateMetricsMoveObjectSelectText
                                            • String ID: Can't create control.$SysMonthCal32
                                            • API String ID: 291046171-3692857110
                                            • Opcode ID: 99232d5ea3048cd0cee8d1d62dca7b0721d93b94c7fabca8c0f0c58578985b5b
                                            • Instruction ID: efd519e78a8c8aa6ab9e6559d19160f9a86486466bc844c10a5d886b8cb9d41f
                                            • Opcode Fuzzy Hash: 99232d5ea3048cd0cee8d1d62dca7b0721d93b94c7fabca8c0f0c58578985b5b
                                            • Instruction Fuzzy Hash: BBA17E74A08741AFD734CF54C985FAB77E5FB89700F10891EE98987390E7B89840CB5A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsnicmp_wcsncpy$Window__wcsicoll__wcstoi64__wcstoui64wcstoxq
                                            • String ID: ahk_
                                            • API String ID: 3421470534-2579966955
                                            • Opcode ID: fb6d2e8ffca4b7901bfa4ce3410d003090297f37bda1653f95d9fc307ca779c0
                                            • Instruction ID: d31051cd4303d8fa7046e99ce13dcb489c4db9e7ae538bf1553a2fc76bc7ce08
                                            • Opcode Fuzzy Hash: fb6d2e8ffca4b7901bfa4ce3410d003090297f37bda1653f95d9fc307ca779c0
                                            • Instruction Fuzzy Hash: 4FC1E6759883029AD738AF2488D57BB73E5EF85708F14482DE89AC72A0F774D684CF52
                                            APIs
                                            • _wcschr.LIBCMT ref: 00432059
                                            • __fassign.LIBCMT ref: 0043209B
                                              • Part of subcall function 00490F06: __fassign.LIBCMT ref: 00490EFC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign$_wcschr
                                            • String ID: Analog$Aux$Digital$Headphones$Line$Master$Microphone$N/A$PCSpeaker$Speakers$Synth$Telephone$Wave
                                            • API String ID: 3927346847-2477456585
                                            • Opcode ID: d598d0e755e760c58cc40369a864a245b9900337e6e8afd83d07863273dcf1c1
                                            • Instruction ID: d02e9d1e3281b1cdde8dd7962346593324612ce12881eaee76393b94655b3876
                                            • Opcode Fuzzy Hash: d598d0e755e760c58cc40369a864a245b9900337e6e8afd83d07863273dcf1c1
                                            • Instruction Fuzzy Hash: 6751A7B271452112DF20101D2E416FB318E4BAA33EF15936BF86DDA3C2FA8DC955529D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign$__wcsicoll__wcsnicmp
                                            • String ID: $cJ
                                            • API String ID: 3933591233-417114052
                                            • Opcode ID: f655f65f083e092cdd04ce75a72253164f90d290f96cbc9c0dd1bad7d30e1469
                                            • Instruction ID: b8d8f98436dd330efed69a17bbc15dc03a76a9f8b0d6825abcb8bd1d130a8883
                                            • Opcode Fuzzy Hash: f655f65f083e092cdd04ce75a72253164f90d290f96cbc9c0dd1bad7d30e1469
                                            • Instruction Fuzzy Hash: 0B41B463AC022076EF21212E7C45BFE529E4FA2766F194476FC1CD9381F788D5A384D6
                                            APIs
                                            • GetIconInfo.USER32(?,?), ref: 02188731
                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 02188756
                                            • CreateCompatibleDC.GDI32(00000000), ref: 0218876C
                                            • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 021887C0
                                            • SelectObject.GDI32(00000000,00000000), ref: 021887D3
                                            • DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003), ref: 021887F7
                                            • GdiFlush.GDI32 ref: 021887FD
                                            • GetDIBits.GDI32(?,?,00000000,?,?,00000028,00000000), ref: 0218883E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateIconObject$BitsCompatibleDrawFlushInfoSectionSelect
                                            • String ID: (
                                            • API String ID: 1804173336-3887548279
                                            • Opcode ID: 061f37e25bd5a33774d6968a2fc616f16147bd4721569f5703f99e6527a25c30
                                            • Instruction ID: 0f8c19bb263fe16550255c36540a6197d9003e7f419d8736b48760dfb672c2bc
                                            • Opcode Fuzzy Hash: 061f37e25bd5a33774d6968a2fc616f16147bd4721569f5703f99e6527a25c30
                                            • Instruction Fuzzy Hash: F1513BB5E40319AFEB10DFA4DC85BAEBBB8FB49705F114429E906E7290D770A940CF64
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: d0c358ebf6895ff03f568f9c1efc16f68fc90612bc43564d6cc40a0cdb50b885
                                            • Instruction ID: 50c5970cddb8f27a87814a1bc98fd37f3a28c1f9bcaa7cfe5103489b06e93fe7
                                            • Opcode Fuzzy Hash: d0c358ebf6895ff03f568f9c1efc16f68fc90612bc43564d6cc40a0cdb50b885
                                            • Instruction Fuzzy Hash: 8131391DAC1A15A2DF5132381C42BAE504A5F62747FF58179EC18D16C2FB8CC21B99FA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$MessageSend__wcsnicmp
                                            • String ID: "$$cJ
                                            • API String ID: 3944189851-3052326342
                                            • Opcode ID: 30395a9efb1ca5d06cdf862ba683e6d18385a395c962001bcf11521cf6fdee94
                                            • Instruction ID: c39b575dfa3f98b2ba80b2848f2ee7a37ab75ef53f7c82fe03ffd4341d95808b
                                            • Opcode Fuzzy Hash: 30395a9efb1ca5d06cdf862ba683e6d18385a395c962001bcf11521cf6fdee94
                                            • Instruction Fuzzy Hash: 94F1F571A84351EFD720CF24C845B2AB7E5EF86344F1488AEFCA997681E374D942CB52
                                            APIs
                                              • Part of subcall function 02119120: CreateThread.KERNEL32(00000000,00002000,00409200,00000000,00000000,004C9470), ref: 0211917A
                                              • Part of subcall function 02119120: SetThreadPriority.KERNEL32(00000000,0000000F,?,00000100,00000000,02128051,02127F1F,?,00000100,?,00000000,02127F1F,00000100,004CB508,021406F5), ref: 02119190
                                              • Part of subcall function 02119120: PostThreadMessageW.USER32(004C9470,00000417,00000002,00000000), ref: 021191B4
                                              • Part of subcall function 02119120: Sleep.KERNEL32(0000000A,?,00000100,00000000,02128051,02127F1F,?,00000100,?,00000000,02127F1F,00000100,004CB508,021406F5), ref: 021191C0
                                            • Shell_NotifyIconW.SHELL32(00000002,004CB782), ref: 02126FD9
                                            • IsWindow.USER32(00000000), ref: 02126FF7
                                            • DestroyWindow.USER32(00000000,?,?,?,00000000,00000000), ref: 02127004
                                            • IsWindow.USER32(00000000), ref: 0212705B
                                            • DestroyWindow.USER32(00000000,?,?,?,?,00000000,00000000), ref: 02127069
                                            • IsWindow.USER32(004CC02C), ref: 02127137
                                            • DestroyWindow.USER32(00000000,?,?,?,00000000,00000000), ref: 02127144
                                            • ChangeClipboardChain.USER32(004CA564,004CBF9C), ref: 021271A6
                                            • RtlDeleteCriticalSection.NTDLL(004C9458), ref: 021271EF
                                            • OleUninitialize.OLE32(?,?,?,00000000,00000000), ref: 021271F5
                                            • _free.LIBCMT ref: 0212722B
                                            • _free.LIBCMT ref: 02127267
                                              • Part of subcall function 021A07B1: HeapFree.KERNEL32(00000000,00000000,?,021A3973,00000000,?,021A4C02,?,021865CE), ref: 021A07C7
                                              • Part of subcall function 021A07B1: GetLastError.KERNEL32(00000000,?,021A3973,00000000,?,021A4C02,?,021865CE), ref: 021A07D9
                                            • _free.LIBCMT ref: 021272A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$DestroyThread_free$ChainChangeClipboardCreateCriticalDeleteErrorFreeHeapIconLastMessageNotifyPostPrioritySectionShell_SleepUninitialize
                                            • String ID: %E
                                            • API String ID: 1476608191-175436132
                                            • Opcode ID: 7e77eac20b4c0cf51beb5c6c381c3f11989bd2a3d91e0a1f1543f48f627b3eba
                                            • Instruction ID: b342ba918245ad33015cfeb3c29497289aa86f796126f2ea0a8f37624a865536
                                            • Opcode Fuzzy Hash: 7e77eac20b4c0cf51beb5c6c381c3f11989bd2a3d91e0a1f1543f48f627b3eba
                                            • Instruction Fuzzy Hash: 1F918FB5A803219BDB60DF69DC89F57B7E8AF45748F040428F845D32D0DB34E45ACBA9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$__wcsicmp_l
                                            • String ID:
                                            • API String ID: 3172861507-0
                                            • Opcode ID: 9e641ab71462be267643f0b24931c8af59533eae0b7323605385d8d3933f82e4
                                            • Instruction ID: 41b87d0a12caae35bb1f23fdb71a31ed57f51f906c865dc9b878a54ddf86f640
                                            • Opcode Fuzzy Hash: 9e641ab71462be267643f0b24931c8af59533eae0b7323605385d8d3933f82e4
                                            • Instruction Fuzzy Hash: 8931BC6AAC171579EF2126359D02B5F108E0F32747FAE0175BC08E09C1FB9DD61B84BA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c1655106ba314d673acc3bc3302a9c729f680f589154d6060e59c09f1f7b20a0
                                            • Instruction ID: 1d34444655bc006b1c11f2b43f043e0cbce228db965fb49176aa8ceef5937283
                                            • Opcode Fuzzy Hash: c1655106ba314d673acc3bc3302a9c729f680f589154d6060e59c09f1f7b20a0
                                            • Instruction Fuzzy Hash: 36514D79EC0206EACB20B7319CC1F6A72685B21709F164169DD08F7141FBA6F915CEE5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 9ffbb126177cbce27a919969c034249650b9f1fd56411891ef97f50f950c4977
                                            • Instruction ID: 6132077dc19e244dc4d448c8e4a438ff68469318adcd9992ad6038d111ff165a
                                            • Opcode Fuzzy Hash: 9ffbb126177cbce27a919969c034249650b9f1fd56411891ef97f50f950c4977
                                            • Instruction Fuzzy Hash: 8031A255FC161976EF2120396C16BAE204E9F72B0BFE58070FC08D5682F79DD32684AB
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$_wcsncpy
                                            • String ID: *pP
                                            • API String ID: 1630244902-2395943462
                                            • Opcode ID: dfda745490470ced70b8fd5104b1091128ecafbf68f93390c581268ebf96236c
                                            • Instruction ID: 1f846aff57d94378dd59fcb66bcbf82afb6516010dcf77055f9385861507b1f1
                                            • Opcode Fuzzy Hash: dfda745490470ced70b8fd5104b1091128ecafbf68f93390c581268ebf96236c
                                            • Instruction Fuzzy Hash: 08613B72A80315DACB20DE24DC827AEF395EF91355F54447AEC29862C0E77AD14EC6A2
                                            APIs
                                            • DestroyCursor.USER32(00000000), ref: 0216F8B3
                                            • IsWindow.USER32(00000000), ref: 0216F8C2
                                            • ShowWindow.USER32(00000000,00000000,?,004CA9EC,004A1104,004A14F0,021270B1,00000000,?,?,?,?,00000000,00000000), ref: 0216F8D2
                                            • SetMenu.USER32(00000000,00000000), ref: 0216F8DE
                                            • DestroyWindow.USER32(00000000,?,004CA9EC,004A1104,004A14F0,021270B1,00000000,?,?,?,?,00000000,00000000), ref: 0216F8F8
                                            • DeleteObject.GDI32(?), ref: 0216F93F
                                            • DeleteObject.GDI32(?), ref: 0216F953
                                            • DragFinish.SHELL32(?,?,004CA9EC,004A1104,004A14F0,021270B1,00000000,?,?,?,?,00000000,00000000), ref: 0216F967
                                            • DestroyCursor.USER32(?), ref: 0216F99B
                                            • DeleteObject.GDI32(?), ref: 0216F9A3
                                            • _free.LIBCMT ref: 0216F9B3
                                            • DestroyAcceleratorTable.USER32(?), ref: 0216FA2B
                                            • _free.LIBCMT ref: 0216FA44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$Cursor_free$AcceleratorDragFinishMenuShowTable
                                            • String ID:
                                            • API String ID: 477100570-0
                                            • Opcode ID: 43299b5fae3ed141e4c3cb15f5b0b3339bc7b578aa0ec48daa3c7fca159ca565
                                            • Instruction ID: b5dfcb88751d13735b49e5a86352702572b3e53ca9fdeae23fd4259b6012066e
                                            • Opcode Fuzzy Hash: 43299b5fae3ed141e4c3cb15f5b0b3339bc7b578aa0ec48daa3c7fca159ca565
                                            • Instruction Fuzzy Hash: 4D619E75A40309AFDB20DF64EC88B7E77A9BF49308F148428F94787660C731E862CB95
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004A1654,?,004CB508,00000000,FFFFFF61,00000000,00000000,00000000,004CB508,004A1654,004CB508), ref: 02188429
                                            • EnumResourceNamesW.KERNEL32 ref: 02188476
                                            • FindResourceW.KERNEL32(004CA55C,004CA55C,0000000E), ref: 0218848F
                                            • LoadResource.KERNEL32(004CA55C,00000000), ref: 0218849F
                                            • LockResource.KERNEL32(00000000), ref: 021884AE
                                            • GetSystemMetrics.USER32(0000000B), ref: 021884D6
                                            • FindResourceW.KERNEL32(004CA55C,?,00000003), ref: 02188536
                                            • LoadResource.KERNEL32(004CA55C,00000000), ref: 02188544
                                            • LockResource.KERNEL32(00000000), ref: 0218854F
                                            • SizeofResource.KERNEL32(004CA55C,00000000,00000001,00030000,00000000,00000000,00000000), ref: 0218856A
                                            • CreateIconFromResourceEx.USER32(00000000,00000000), ref: 02188572
                                            • FreeLibrary.KERNEL32(004CA55C), ref: 0218859D
                                            • ExtractIconW.SHELL32(00000000,?,?), ref: 021885B2
                                            • ExtractIconW.SHELL32(00000000,?,-00000001), ref: 021885CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$IconLoad$ExtractFindLibraryLock$CreateEnumFreeFromMetricsNamesSizeofSystem
                                            • String ID:
                                            • API String ID: 2349713634-0
                                            • Opcode ID: 048a3a54ad9021aff99276b9801c452cb05ba59a72117d3b1ce05db86fb240f6
                                            • Instruction ID: 96b1162cc7606b07a4d42e7afc7ae101b114487bb9e5f908997a663c067197d2
                                            • Opcode Fuzzy Hash: 048a3a54ad9021aff99276b9801c452cb05ba59a72117d3b1ce05db86fb240f6
                                            • Instruction Fuzzy Hash: D75127766853186BC3207F28DCC4B2BBBD9EB89B55F860929FD41D2291D774C8008FA5
                                            APIs
                                            • GetForegroundWindow.USER32(753D5540,?,?,00000001), ref: 004310DA
                                            • GetWindowTextW.USER32(00000000,?,00000064), ref: 004310EF
                                            • _wcsncpy.LIBCMT ref: 00431196
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundText_wcsncpy
                                            • String ID: Key History has been disabled via #KeyHistory 0.$Press [F5] to refresh.$ $ (preempted: they will resume when the current thread finishes)$%s $...$Object$Window: %sKeybd hook: %sMouse hook: %sEnabled Timers: %u of %u (%s)Interrupted threads: %d%sPaused threads: %d of %d (%d$yes
                                            • API String ID: 216113120-1761195949
                                            • Opcode ID: bb7442268a7a5b734a4db2436c13b12395e86c7d6ac0d06ef2212b31d7e9908b
                                            • Instruction ID: 60b5086598c6e8fd7d8ca0f0e81e75a26701332749775db91bfce0b7b5b64f9b
                                            • Opcode Fuzzy Hash: bb7442268a7a5b734a4db2436c13b12395e86c7d6ac0d06ef2212b31d7e9908b
                                            • Instruction Fuzzy Hash: B0510671A002009BD724DB18DD49FABB7A5EF9D304F08853AE945D7360D778AA48C7DA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 70447c881cf2ee9db9f7f36cd032d4538b702ec2ea2e796e39445dbc06042209
                                            • Instruction ID: 10549d8eeddf4a516e99e6794d5c5a52a72b8897e2d065fdb52a7ad55b3fa833
                                            • Opcode Fuzzy Hash: 70447c881cf2ee9db9f7f36cd032d4538b702ec2ea2e796e39445dbc06042209
                                            • Instruction Fuzzy Hash: 58318472BC062466EE71253C7D02BDE114A4F62756F264072FC0CE5280FB9DDAC345EA
                                            APIs
                                            • GetDC.USER32(00000000), ref: 0218860C
                                            • CreateCompatibleDC.GDI32(00000000), ref: 02188619
                                            • GetIconInfo.USER32(?,?), ref: 0218862F
                                            • GetObjectW.GDI32(?,00000018,?), ref: 02188649
                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02188662
                                            • SelectObject.GDI32(00000000,00000000), ref: 02188670
                                            • CreateSolidBrush.GDI32(FF000000), ref: 0218869B
                                            • FillRect.USER32(00000000,?,00000000), ref: 021886AA
                                            • DeleteObject.GDI32(00000000), ref: 021886B1
                                            • DrawIconEx.USER32(00000000,00000000,00000000,?,?,?,00000000,00000000,00000003), ref: 021886D1
                                            • SelectObject.GDI32(00000000,00000000), ref: 021886D9
                                            • DeleteDC.GDI32(00000000), ref: 021886FC
                                            • ReleaseDC.USER32(00000000,00000000), ref: 02188705
                                            • DestroyCursor.USER32(?), ref: 0218870C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Object$Create$CompatibleDeleteIconSelect$BitmapBrushCursorDestroyDrawFillInfoRectReleaseSolid
                                            • String ID:
                                            • API String ID: 3843881724-0
                                            • Opcode ID: 961a9039a57507e2d9bee586b1ec26e23ef3233729ab50ee2e99d6abf860a2a3
                                            • Instruction ID: 3cc123627b6cee3813b7307545653548872e73b6dce766c817d9c8d6c1fe56f9
                                            • Opcode Fuzzy Hash: 961a9039a57507e2d9bee586b1ec26e23ef3233729ab50ee2e99d6abf860a2a3
                                            • Instruction Fuzzy Hash: F4318175608341AFD3009F65DD88F6BBBF8FBCA641F50452DFA45C2260DB74D8058BAA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Label
                                            • API String ID: 3832890014-3479601132
                                            • Opcode ID: d83fb8575d3ad96bb67cf47fa031fba4794f3df92d1c3330c37acadb1c1c532b
                                            • Instruction ID: 5435418ca5214321c2a0180721910b43810954be61a5370da42a16a85f7cfab4
                                            • Opcode Fuzzy Hash: d83fb8575d3ad96bb67cf47fa031fba4794f3df92d1c3330c37acadb1c1c532b
                                            • Instruction Fuzzy Hash: 01118E51FC162536EF1121345E02B9F208E5F22B07FE54075FC0CE4282FFADD68681AA
                                            APIs
                                              • Part of subcall function 004099C0: __wcsicoll.LIBCMT ref: 004099D8
                                              • Part of subcall function 004099C0: __wcsicoll.LIBCMT ref: 00409A25
                                            • __wcsicoll.LIBCMT ref: 0041611B
                                            • __wcsicoll.LIBCMT ref: 00416134
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Default$Mouse$MouseMove$MouseMoveOff$Send$SendAndMouse
                                            • API String ID: 3832890014-605279031
                                            • Opcode ID: de8cfa3b36694bf235ae80368e368d37fb12e24f4299b2e130a036159bd821f2
                                            • Instruction ID: d4ae0d7396227b5d84992748cad4d750fe59f52535ecd0d333a2d8a851c1c425
                                            • Opcode Fuzzy Hash: de8cfa3b36694bf235ae80368e368d37fb12e24f4299b2e130a036159bd821f2
                                            • Instruction Fuzzy Hash: CF018FA6A40A2422EDD030397C03BDB11485B3271EF09457BFD04D8286F68DDAE941EE
                                            APIs
                                            • RegCreateKeyExW.ADVAPI32(00000000,?,00000000,004A3890,00000000,00000000,00000000,?,?,?,004A6324,?,00000000,?,023B1ACC,023B1B28), ref: 004731A0
                                            • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,?,?,004A6324,?,00000000,?,023B1ACC,023B1B28), ref: 004731F3
                                            • _malloc.LIBCMT ref: 00473248
                                            • RegSetValueExW.ADVAPI32(?,?,00000000,00000007,00000000,00000000), ref: 004732C1
                                            • _free.LIBCMT ref: 004732CA
                                            • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,?,00000004), ref: 00473309
                                            • _malloc.LIBCMT ref: 0047334F
                                            • RegCloseKey.ADVAPI32(?,?,004A6324,?,00000000,?,023B1ACC,023B1B28), ref: 00473434
                                            • GetLastError.KERNEL32(?,004A6324,?,00000000,?,023B1ACC,023B1B28), ref: 0047343F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Value$_malloc$CloseCreateErrorLast_free
                                            • String ID:
                                            • API String ID: 1054883360-0
                                            • Opcode ID: 2661be5ea765783d10fb68eebbc9c28203c77e90397dbe84c124a3e8f2aa7f80
                                            • Instruction ID: 83c4b8d5925f87eec5492b8964fea605b917884717f824344403eeeacf0f359a
                                            • Opcode Fuzzy Hash: 2661be5ea765783d10fb68eebbc9c28203c77e90397dbe84c124a3e8f2aa7f80
                                            • Instruction Fuzzy Hash: 059102312043019BD724CF64CC85BAB73A5EF88319F04C66AFD09DB291EB78EB45975A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcstoui64
                                            • String ID: Icon
                                            • API String ID: 3882282163-3316025061
                                            • Opcode ID: 3db59b03080ad47d72f36b57564becc4f558e853a6f7fa4e173e7eb94a0bddea
                                            • Instruction ID: 4f6babe3b5fe45cf5f3f6e45856ab9ee7210e229121f7f643785480292ca5597
                                            • Opcode Fuzzy Hash: 3db59b03080ad47d72f36b57564becc4f558e853a6f7fa4e173e7eb94a0bddea
                                            • Instruction Fuzzy Hash: 94C13771604300ABC324DF26CC81B6B77E4EB99705F04492EFD859B392D779DA09CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$String$FreeFrom
                                            • String ID: class$clsid$iid$name
                                            • API String ID: 2668509760-3724380462
                                            • Opcode ID: 0d8363571a9b94f0f062ebf02e92d519a477cbd72faa21943773d79acff67e1b
                                            • Instruction ID: 5b4971c27b761cd22cfbd2a14c83a76d94b2813b845eb074291525b59ea35b39
                                            • Opcode Fuzzy Hash: 0d8363571a9b94f0f062ebf02e92d519a477cbd72faa21943773d79acff67e1b
                                            • Instruction Fuzzy Hash: 0981B1747082019FDB10DF65E881B6B73A4AF84326F1485BAFD048B392D779EC49C7A9
                                            APIs
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0211465A
                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 02114668
                                              • Part of subcall function 02114AE0: GetClipboardFormatNameW.USER32(0000000D,00000104,00000104), ref: 02114B0C
                                              • Part of subcall function 02114AE0: __wcsnicmp.LIBCMT ref: 02114B1E
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114B37
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114B4C
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114B61
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114B76
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114B8B
                                              • Part of subcall function 02114AE0: __wcsicoll.LIBCMT ref: 02114BA0
                                            • GlobalUnlock.KERNEL32(00000000), ref: 021146D5
                                            • CloseClipboard.USER32 ref: 021146DE
                                            • GlobalLock.KERNEL32(00000000), ref: 021146F6
                                            • DragQueryFileW.SHELL32(00000000,000000FF,004A3890,00000000), ref: 02114741
                                            • DragQueryFileW.SHELL32(00000000,00000000,00000000,00000000), ref: 02114761
                                            • DragQueryFileW.SHELL32(00000000,000000FF,004A3890,00000000), ref: 021147BB
                                            • DragQueryFileW.SHELL32(00000000,00000000,00000100,000003E7), ref: 021147DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$ClipboardDragFileQuery$Format$AvailableGlobal$CloseLockNameUnlock__wcsnicmp
                                            • String ID: Can't open clipboard for reading.$GlobalLock
                                            • API String ID: 1478223189-2469064134
                                            • Opcode ID: dd29e0b7d8c111da3b5b2db40538746cf8f750d538a33f8fca12f5ac384fccd6
                                            • Instruction ID: 7ca3e8b9aefe5caee542592e0db0669ce693cd2c8fd3d9cd6569f53470093296
                                            • Opcode Fuzzy Hash: dd29e0b7d8c111da3b5b2db40538746cf8f750d538a33f8fca12f5ac384fccd6
                                            • Instruction Fuzzy Hash: 16511A7B6803214BCB209F28EC8466AB7A4EF82B75F15477AED25DB294E730C850C7D5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Timeout
                                            • API String ID: 3832890014-1325157390
                                            • Opcode ID: 2f10b2dc45a8f9fffb0e716a691594df527dd572d06910d19ea4718503983bc4
                                            • Instruction ID: 44ae968efd3bfbe3b7da1f85954ff08b43a8fb1d45a9319f755474562d3def41
                                            • Opcode Fuzzy Hash: 2f10b2dc45a8f9fffb0e716a691594df527dd572d06910d19ea4718503983bc4
                                            • Instruction Fuzzy Hash: 293173B3AC1664A7DF111124DC6B78F225DDB21B46FEA4069FC04C52C1FB4ED12B829A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy
                                            • String ID: !$&$($*$+$.$:$<$^${
                                            • API String ID: 1735881322-1765617229
                                            • Opcode ID: cb873b86e073b1a1373f77e5bf22a28e4949832ca99d9483de71b99a266ba19c
                                            • Instruction ID: 66711fc1a24e773341ce86a8c0ff1c29059b8e1f4ac8408df31cc4ff6c49c239
                                            • Opcode Fuzzy Hash: cb873b86e073b1a1373f77e5bf22a28e4949832ca99d9483de71b99a266ba19c
                                            • Instruction Fuzzy Hash: BD21E1729443148BCB609F29988476FBBE4EFC9304F04092FF99593240E7B6E95CCB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ArraySafe__wcsicoll
                                            • String ID:
                                            • API String ID: 2999837010-0
                                            • Opcode ID: 0aacecf6d83e9b75125e9f54ecaca64f9976bec8ae3af8df902332ebbfc92828
                                            • Instruction ID: d29cf0437f4791252dd5754436b15ce16aa7b74298ab4a341a64e158c5174b1f
                                            • Opcode Fuzzy Hash: 0aacecf6d83e9b75125e9f54ecaca64f9976bec8ae3af8df902332ebbfc92828
                                            • Instruction Fuzzy Hash: 6981FF726402019FC700DF64D888A7FB7E9EF89314F168429FD058B350E776E929CBA2
                                            APIs
                                            • SendMessageW.USER32(00000000,00001304,00000000,00000000), ref: 0046605E
                                            • GetWindowLongW.USER32 ref: 0046608D
                                            • _wcschr.LIBCMT ref: 004660D1
                                            • SendMessageW.USER32(?,?,00000000,?), ref: 0046611C
                                            • SendMessageW.USER32(?,00001061,?,?), ref: 00466157
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004661B9
                                            • SendMessageW.USER32(?,0000108F,00000000,00000000), ref: 004661F2
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004661F9
                                            • SendMessageW.USER32(?,0000101E,00000000,0000FFFE), ref: 0046621E
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00466240
                                            • SendMessageW.USER32(?,0000014E,00000001,?), ref: 0046625E
                                            • SendMessageW.USER32(0000014E,0000014E,?,00000000), ref: 00466270
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$LongWindow$_wcschr
                                            • String ID:
                                            • API String ID: 958538355-0
                                            • Opcode ID: 1606e40a3e9bd4938cf5ebdbdc43ffc24b456b6e63cc2bea668fa35e6ead4b79
                                            • Instruction ID: 0f73592dcf8f3297690ef9fa844bdd87fc029de1837e21c3ba2a72d06ca17557
                                            • Opcode Fuzzy Hash: 1606e40a3e9bd4938cf5ebdbdc43ffc24b456b6e63cc2bea668fa35e6ead4b79
                                            • Instruction Fuzzy Hash: 0871DEB0208341ABE320CF24CC91B77B7E9EF86710F154A1EF991862C1E779D845876A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 763b4a08367fb80ab68c97f41caea54974778ca69c2d2e876e7be94ba8099526
                                            • Instruction ID: c41111b65b9be446a30a2275b8e1dc8a657c6862234e9afe0352bd6c0ced9414
                                            • Opcode Fuzzy Hash: 763b4a08367fb80ab68c97f41caea54974778ca69c2d2e876e7be94ba8099526
                                            • Instruction Fuzzy Hash: BE21C665FC1766B6DF1121384C02B9E204E9F22B47FE48078FC08D42C1FB8DD62AD4AA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsnicmp$__fassign__wcsicoll
                                            • String ID: $cJ$A$I$M
                                            • API String ID: 2762105059-3610979866
                                            • Opcode ID: d5452061242496e1760dee8bdc8edb3d9229d7e0e4f6e459b9cece3e4ef19fbc
                                            • Instruction ID: 569422a5ad028e5854688129daebf824598b89ab6530495bff2ef34042a39e2a
                                            • Opcode Fuzzy Hash: d5452061242496e1760dee8bdc8edb3d9229d7e0e4f6e459b9cece3e4ef19fbc
                                            • Instruction Fuzzy Hash: 0AE1F370E88361DFD720CF24C88472ABBE6EF46304F1448AEEDA587291E7B5D540CB56
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetForegroundWindow.USER32 ref: 02111EDE
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 02111EF1
                                            • GetClassNameW.USER32(00000000,?,00000020), ref: 02111F0E
                                            • IsDialogMessageW.USER32(00000000,?), ref: 02113189
                                            • SetCurrentDirectoryW.KERNEL32(004A3890), ref: 021131B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageWindow$ClassCurrentDialogDirectoryForegroundNameProcessThread
                                            • String ID: #32770
                                            • API String ID: 2321113096-463685578
                                            • Opcode ID: 117f863355fcd52777c20b819e5933bd310008fddda94180c0a30c0bc9e525ba
                                            • Instruction ID: 7af00d99e4170e7c93c56c063776aef53e88c1221066cfa87726e8360551cb0a
                                            • Opcode Fuzzy Hash: 117f863355fcd52777c20b819e5933bd310008fddda94180c0a30c0bc9e525ba
                                            • Instruction Fuzzy Hash: 6AB10571588351AFD724CF28C8887AEF7E5BF85308F48453DEA9987264D370D885CB46
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • GetForegroundWindow.USER32 ref: 02111EDE
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 02111EF1
                                            • GetClassNameW.USER32(00000000,?,00000020), ref: 02111F0E
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            • IsDialogMessageW.USER32(00000000,?), ref: 02113189
                                            • SetCurrentDirectoryW.KERNEL32(004A3890), ref: 021131B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageWindow$ClassCurrentDialogDirectoryDragFinishFocusForegroundNameProcessThread
                                            • String ID: #32770
                                            • API String ID: 985188229-463685578
                                            • Opcode ID: 7cd0ee11d296b2da490e3e09071073419012d8596fc39099f7fbc25560c7a98f
                                            • Instruction ID: b822b89a746bb1655f6b585ddf94ad72ee184d9141f396bee86462eed49e785b
                                            • Opcode Fuzzy Hash: 7cd0ee11d296b2da490e3e09071073419012d8596fc39099f7fbc25560c7a98f
                                            • Instruction Fuzzy Hash: 839118716C4311AFDB74DF28C8D87AEB7E5AF85308F484539EA5987264D330D881CB96
                                            APIs
                                            • CreateCompatibleDC.GDI32 ref: 0214A4DD
                                            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0214A521
                                            • _malloc.LIBCMT ref: 0214A574
                                            • SelectObject.GDI32(?,?), ref: 0214A5B7
                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0214A5D7
                                            • GetSystemPaletteEntries.GDI32(?,00000000,00000100), ref: 0214A607
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Bits$CompatibleCreateEntriesObjectPaletteSelectSystem_malloc
                                            • String ID: (
                                            • API String ID: 1101625044-3887548279
                                            • Opcode ID: 2b9e0e64f3c37e92d7b74bc8201751dc7ff7d92c1a64efae3f7101dc6e3b9b1f
                                            • Instruction ID: f489611bee248e061af9bb4053575f3ed6d721dbebf78efabfe2897985e51ddc
                                            • Opcode Fuzzy Hash: 2b9e0e64f3c37e92d7b74bc8201751dc7ff7d92c1a64efae3f7101dc6e3b9b1f
                                            • Instruction Fuzzy Hash: 1461D5B5A402599FDF10CFA5CC54BEEBBB5EF49300F0040A9E909A7350DB74A945CFA4
                                            APIs
                                            • GetModuleBaseNameW.PSAPI(00000000,00000000,00011A58,00000104), ref: 02161FF5
                                            • GetModuleFileNameExW.PSAPI(00000000,00000000,00011A58,00000104), ref: 02161FFD
                                            • GetModuleHandleW.KERNEL32(004AE374,004AE358), ref: 0216201F
                                            • GetProcAddress.KERNEL32(00000000), ref: 02162026
                                            • _wcsrchr.LIBCMT ref: 02162068
                                            • CloseHandle.KERNEL32(00000000), ref: 021620A0
                                            • QueryDosDeviceW.KERNEL32(?,?,00000104), ref: 021620D4
                                            • CloseHandle.KERNEL32(00000000), ref: 02162111
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: HandleModule$CloseName$AddressBaseDeviceFileProcQuery_wcsrchr
                                            • String ID: :
                                            • API String ID: 2886984124-336475711
                                            • Opcode ID: af99027420f5eb7d4ccc41bc78355274f1e55d394ab43dd538d794298f5d7af5
                                            • Instruction ID: 54c196b3d185fc320b5151ef6e0193a9a233d93b4aa1d18823e5c03f18e7d9e6
                                            • Opcode Fuzzy Hash: af99027420f5eb7d4ccc41bc78355274f1e55d394ab43dd538d794298f5d7af5
                                            • Instruction Fuzzy Hash: FE4147766843026BD724AF64EC8DFFF7BA8EB95714F040039EE0982254E7B69458C3A5
                                            APIs
                                            • WSAStartup.WS2_32(00000101,?), ref: 02162E7E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Startup
                                            • String ID: ,J$0.0.0.0$%E
                                            • API String ID: 724789610-2394399986
                                            • Opcode ID: 7b5a2044fdb4c7d4298ffca59cc3d3f8db3f1b4a783874253397923c3bb69bda
                                            • Instruction ID: 4c3599e90f1d7af120a3097ecbcc714937b7d33f3066352ecb9d65aeaa1c34f5
                                            • Opcode Fuzzy Hash: 7b5a2044fdb4c7d4298ffca59cc3d3f8db3f1b4a783874253397923c3bb69bda
                                            • Instruction Fuzzy Hash: B241CE756443418FC720DF68C849BAAB7A8FF85714F044A69FC9ACB290EB74E414CB96
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: I
                                            • API String ID: 0-3707901625
                                            • Opcode ID: 613403da200f245bf8ad32dc6a8c51243919f9c8968614ee6c0e87c1646e4660
                                            • Instruction ID: 1d11ff49d2a9fc1bb9d946e381e018e45d323940354604ca5c5e18c203b5ef0c
                                            • Opcode Fuzzy Hash: 613403da200f245bf8ad32dc6a8c51243919f9c8968614ee6c0e87c1646e4660
                                            • Instruction Fuzzy Hash: FAF1D1716883509FD725CF18C884BABB7E5BF85308F18893DE999873A0D770D885CB96
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String__wcsicoll$Free
                                            • String ID: iid$name
                                            • API String ID: 1058036804-1827342429
                                            • Opcode ID: 93ee8c9ab058c073c6858a2055a0b0ba4ed7f9aa34c92d0bf98db66d360015df
                                            • Instruction ID: 5f28d93bbdf3c8f083c3cf98dd3df6f26e30d81b6e7ece8eec8f804c85f8d75f
                                            • Opcode Fuzzy Hash: 93ee8c9ab058c073c6858a2055a0b0ba4ed7f9aa34c92d0bf98db66d360015df
                                            • Instruction Fuzzy Hash: E581D274A843019FD710DF29D888B7AB3E5EF84318F1485A9ED488B3D1D735E866CBA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Off
                                            • API String ID: 3832890014-334568355
                                            • Opcode ID: d1041e13f99ac2dbabf307b12275e4a7e1215cc88b787e1b88e181a5f87bbf7c
                                            • Instruction ID: de201cc25813ce65a41ea176cc119b62d62bd93778c4a805289a81944615d513
                                            • Opcode Fuzzy Hash: d1041e13f99ac2dbabf307b12275e4a7e1215cc88b787e1b88e181a5f87bbf7c
                                            • Instruction Fuzzy Hash: B0116D64EC222176EF1121398E227AE10895F6270BFFE4075FC18D5281F7ADD60792AA
                                            APIs
                                            • _memset.LIBCMT ref: 02116D51
                                            • FindWindowW.USER32(004A59FC,00000000), ref: 02116D6D
                                            • CallNextHookEx.USER32(?,?,?), ref: 02116F88
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallFindHookNextWindow_memset
                                            • String ID: .$L$n
                                            • API String ID: 2943327079-3051456332
                                            • Opcode ID: 52db9e5c8c8663980006850309c7a4a0846af8ea9f701748300d6db6181c5f1a
                                            • Instruction ID: b2728bd895c5cdccadf071bdb0c94a8e42d2f7462b792000ce9ad51bc6f476b8
                                            • Opcode Fuzzy Hash: 52db9e5c8c8663980006850309c7a4a0846af8ea9f701748300d6db6181c5f1a
                                            • Instruction Fuzzy Hash: 46B137605883D86EE765CB28EC48F767BDA9B4630CF084579E4C4433A2C337984AC76B
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayout_wcschr$AlphaChar_free_malloc
                                            • String ID: 0
                                            • API String ID: 2524737710-4108050209
                                            • Opcode ID: 0435748ff7fc80e20b40e562c5b6e4456ab7c4de005ea3ab19eafc56745b73c7
                                            • Instruction ID: d728fb20bffe419357213e2ed1df715e14a668ca92eb30cbe9df8b992765cf2f
                                            • Opcode Fuzzy Hash: 0435748ff7fc80e20b40e562c5b6e4456ab7c4de005ea3ab19eafc56745b73c7
                                            • Instruction Fuzzy Hash: B5B12871588385ABC725DF24C44476B7BE2AF65318F88045DF8C88B292EB39C64DC7A3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcschr$_malloc_wcsncpy
                                            • String ID: "
                                            • API String ID: 3220175845-123907689
                                            • Opcode ID: 1462cca0ec4af517ec1b4f4015f1424a6a679c39631037b7158f443b7f7c7bea
                                            • Instruction ID: 84321481153fdd77644f169d177f270339056b47b6f52b2b8e33f6a7c940424d
                                            • Opcode Fuzzy Hash: 1462cca0ec4af517ec1b4f4015f1424a6a679c39631037b7158f443b7f7c7bea
                                            • Instruction Fuzzy Hash: C391D271E403199BCF22DF54D881BEEB3B6EF48310F158065E905EB280E775AA55CBE1
                                            APIs
                                            • FormatMessageW.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00458251
                                            • _vswprintf_s.LIBCMT ref: 00458296
                                            • SysFreeString.OLEAUT32(?), ref: 004582C6
                                            • SysFreeString.OLEAUT32(00000000), ref: 004582CC
                                            • SysFreeString.OLEAUT32(?), ref: 004582D2
                                            Strings
                                            • No valid COM object!, xrefs: 0045821C
                                            • 0x%08X - , xrefs: 00458228
                                            • Source:%wsDescription:%wsHelpFile:%wsHelpContext:%d, xrefs: 0045828D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FreeString$FormatMessage_vswprintf_s
                                            • String ID: Source:%wsDescription:%wsHelpFile:%wsHelpContext:%d$0x%08X - $No valid COM object!
                                            • API String ID: 575495657-3028990165
                                            • Opcode ID: 0da4345b2c23d8ee534a75d3469eaadeb252e7bf3c68f77cc5ecf5486fd98254
                                            • Instruction ID: 4a7dd6d41aa898a03cfa5f28ae6521c61a39bb189237137fb6365e3b381cb41a
                                            • Opcode Fuzzy Hash: 0da4345b2c23d8ee534a75d3469eaadeb252e7bf3c68f77cc5ecf5486fd98254
                                            • Instruction Fuzzy Hash: E03109726003106BDB14EBA5DC85F677BA8EFC4741F04856EBD01A7196DE78D808C7A9
                                            APIs
                                            • FindResourceW.KERNEL32 ref: 004181E9
                                            • FindResourceW.KERNEL32(00000000,>AHK WITH ICON<,0000000A), ref: 004181F9
                                            • SizeofResource.KERNEL32(00000000,00000000), ref: 00418204
                                            • LoadResource.KERNEL32(00000000,00000000), ref: 00418215
                                            • LockResource.KERNEL32(00000000), ref: 00418220
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$Find$LoadLockSizeof
                                            • String ID: >AHK WITH ICON<$>AUTOHOTKEY SCRIPT<$Could not extract script from EXE.
                                            • API String ID: 3127896203-4021547232
                                            • Opcode ID: 9de87304b959eedd45034297723f0abca83777e190420b9050421f2b1e8a7a8b
                                            • Instruction ID: 5dcd8b25721e3a037b3743ad15cd8ef3095d7bdeac94b465dd52d37fc4df07dd
                                            • Opcode Fuzzy Hash: 9de87304b959eedd45034297723f0abca83777e190420b9050421f2b1e8a7a8b
                                            • Instruction Fuzzy Hash: 26110330A097015BE310EB298C06F5BBB94EB91700F04086EF944972D1DB74C8048AEA
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 02121050
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 736549f45ea7f827c3d872aa11dac0c7bf51e8b9308f9fa9578116ab22a92a2b
                                            • Instruction ID: 3836ead75129466d89fa1050a7482a24dd85a57331c6c734cf1e7d8abc35f20e
                                            • Opcode Fuzzy Hash: 736549f45ea7f827c3d872aa11dac0c7bf51e8b9308f9fa9578116ab22a92a2b
                                            • Instruction Fuzzy Hash: 42F1E67058C3A0AFD735DB24D8447AB7BE5AB82318F08095DF8C9872A2C735956CCB97
                                            APIs
                                            • SendMessageW.USER32(?,0000110A,00000009), ref: 021127AD
                                            • ScreenToClient.USER32(?,?), ref: 021127DA
                                            • SendMessageW.USER32(?,00001111,?,?), ref: 021127F5
                                            • _memset.LIBCMT ref: 02112C35
                                            • SendMessageW.USER32 ref: 02112C69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$ClientScreen_memset
                                            • String ID:
                                            • API String ID: 121930748-0
                                            • Opcode ID: 4847400b5a8923bd9ffc2004cc1b5428a67b37db39dc008b7b47ae529dc35d7a
                                            • Instruction ID: 394ed96f9025557f1b32ede5db40ba1692309bb3d6ed75cb040060427753d828
                                            • Opcode Fuzzy Hash: 4847400b5a8923bd9ffc2004cc1b5428a67b37db39dc008b7b47ae529dc35d7a
                                            • Instruction Fuzzy Hash: ABE1B071A493509FCB25DF18C884BABBBE5BF89304F14893DE99987390D770D885CB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 003088d94b1fff0d03335882e75eb495f009c2210c394b583e121132ef16c99d
                                            • Instruction ID: 24e3fedd8f4d4d5f9a0bce3bd6d9febc3a5443e8c3c8e4d74997e20d56c13f55
                                            • Opcode Fuzzy Hash: 003088d94b1fff0d03335882e75eb495f009c2210c394b583e121132ef16c99d
                                            • Instruction Fuzzy Hash: CFB1A173B40204ABCB10EE19E8C1B6AB7A5EB54325F24816AED0DCB742E732D556CFD1
                                            APIs
                                              • Part of subcall function 02187990: GetWindowRect.USER32(?,?), ref: 02187998
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0211292B
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0211293F
                                              • Part of subcall function 0216FC50: DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0216FC6D
                                              • Part of subcall function 0216FC50: DragQueryFileW.SHELL32(?,00000000,?,00008000), ref: 0216FCD3
                                            • MulDiv.KERNEL32(?,00000060,004CB4F4), ref: 021129DC
                                            • MulDiv.KERNEL32(?,00000060,004CB4F4), ref: 02112A24
                                            • _memset.LIBCMT ref: 02112C35
                                            • SendMessageW.USER32 ref: 02112C69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$DragFileLongQuery$MessageRectSend_memset
                                            • String ID:
                                            • API String ID: 109366103-0
                                            • Opcode ID: 2f777e8ffc9bce0ff373f0b5249ecb6e5716deabc130dee09d5dee1d80712032
                                            • Instruction ID: d526a9221824858c90493cd91a3939ed6e9ae1545cbd931c69ca8b1a3332b081
                                            • Opcode Fuzzy Hash: 2f777e8ffc9bce0ff373f0b5249ecb6e5716deabc130dee09d5dee1d80712032
                                            • Instruction Fuzzy Hash: EBD1E271648310AFD724CF18C884BAAFBE5BF85318F14893DE99987391D771E885CB82
                                            APIs
                                            • SendMessageW.USER32(?,0000019F,00000000,00000000), ref: 0046B15A
                                            • SendMessageW.USER32(?,00000198,00000000,80000000), ref: 0046B173
                                            • SendMessageW.USER32(00000000,0000100C,000000FF,00000001), ref: 0046B189
                                            • SendMessageW.USER32(?,0000100E,00000000,80000000), ref: 0046B1A6
                                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 0046B1BC
                                            • SendMessageW.USER32(?,00001104,00000001,80000000), ref: 0046B1D5
                                            • SendMessageW.USER32(?,00000419,00000000,80000000), ref: 0046B1E8
                                            • GetWindowRect.USER32(?,80000000), ref: 0046B200
                                            • MapWindowPoints.USER32(?,00000000,00000002,00000002), ref: 0046B214
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$Window$PointsRect
                                            • String ID:
                                            • API String ID: 467674420-0
                                            • Opcode ID: 84d78ba1d5cd1097a00c40e2669ce3f7e163727df9518ae0f9c07e8706b1e30b
                                            • Instruction ID: 6e43130aabcbc857c5f36dbbc5bd06bad8e8e5e2da8ed775a84a6c93a3b9cb22
                                            • Opcode Fuzzy Hash: 84d78ba1d5cd1097a00c40e2669ce3f7e163727df9518ae0f9c07e8706b1e30b
                                            • Instruction Fuzzy Hash: 3431A175144305BBD324CF28CC45FAAB7E8EB85750F208A1DF295D72E0E7B4E5818B56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$Clipboard$DataFormatName__wcsnicmp
                                            • String ID:
                                            • API String ID: 3127108255-0
                                            • Opcode ID: ba0c5945728cd0bb08750c78345674eaba5c07f298cfce1c8ba0e794be639875
                                            • Instruction ID: 4f32d954114a24517b42f5a742028a7c52a71034ad4e78fb58f92d5a9ba9f3c1
                                            • Opcode Fuzzy Hash: ba0c5945728cd0bb08750c78345674eaba5c07f298cfce1c8ba0e794be639875
                                            • Instruction Fuzzy Hash: 6B1181B4980301AADB30EB709D46B6E72E95F54F06F640978EC98D1181F7B8D608C6AB
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0211FF0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessagePeek
                                            • String ID: @
                                            • API String ID: 2222842502-2766056989
                                            • Opcode ID: 05c4ff255829e964ab8e618f25962f7b28614a76b407283a46c9569e86c35af8
                                            • Instruction ID: 7157de5e433712551369128a6ec63695d51343e7bc3105bf5e9d66d91f8e54ec
                                            • Opcode Fuzzy Hash: 05c4ff255829e964ab8e618f25962f7b28614a76b407283a46c9569e86c35af8
                                            • Instruction Fuzzy Hash: B4A17C30A84398AFEB20DB74DC44FF93F76AB46348F188165F9446B2D2D3708559CB66
                                            APIs
                                            • RtlEnterCriticalSection.NTDLL(004C9458), ref: 02159E17
                                            • RtlLeaveCriticalSection.NTDLL(004C9458), ref: 02159F7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID: 0
                                            • API String ID: 3168844106-4108050209
                                            • Opcode ID: cc1e4b22a18e0efb7ff6c064b3865a05c41041bfd40bf64c01dd6e113a97aa91
                                            • Instruction ID: 117ab7e797b41d8f624b6e816843afa7f8ab1c0e481678a59497ee5c629176d9
                                            • Opcode Fuzzy Hash: cc1e4b22a18e0efb7ff6c064b3865a05c41041bfd40bf64c01dd6e113a97aa91
                                            • Instruction Fuzzy Hash: 6DA1FD75644311CFCB14CF68D880B66B7E5FF89314F144AAEE86A8B390E731E905CB96
                                            APIs
                                              • Part of subcall function 021865B0: _vswprintf_s.LIBCMT ref: 021865C9
                                            • __itow.LIBCMT ref: 0211CC3B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __itow_vswprintf_s
                                            • String ID: (no)$OFF$PART
                                            • API String ID: 2948144822-3974843038
                                            • Opcode ID: bbcf5ce862b9fdc0d1332935ac5235cdfc2f9a219029adcfb732fc777d43487d
                                            • Instruction ID: 132770cdd258ff00e9cc9da169ebee24e945b1be217b8b48666383bdd93ed858
                                            • Opcode Fuzzy Hash: bbcf5ce862b9fdc0d1332935ac5235cdfc2f9a219029adcfb732fc777d43487d
                                            • Instruction Fuzzy Hash: 8461C1716C43419FDB28DE28C840B677BE6AF86308F09493EE48687690E735E909C7D7
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy$__wcsicoll_memset
                                            • String ID: Up
                                            • API String ID: 2925817191-1355106271
                                            • Opcode ID: a156f10731d02ccc120276bdfab5b0835def7b42b4882d22eee11ffe488a22fa
                                            • Instruction ID: 64227d1ea32061e872236488ebdb0835aa53daecfd342e835fac65d38b9acb56
                                            • Opcode Fuzzy Hash: a156f10731d02ccc120276bdfab5b0835def7b42b4882d22eee11ffe488a22fa
                                            • Instruction Fuzzy Hash: 7C61D0325C83488AD735DF60D891BEBB3A6AF85300F58482BD58987285F7749548CBE3
                                            APIs
                                            • __fassign.LIBCMT ref: 0212197C
                                              • Part of subcall function 021A1156: __fassign.LIBCMT ref: 021A114C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID: W
                                            • API String ID: 3965848254-655174618
                                            • Opcode ID: 6afae57ea7950d9291c6cf6146bceec47e08522dec7d50de16b3ec4dee0d757c
                                            • Instruction ID: 8445f02c416fb3094b3ebe5e72cf4884175d53d6cb382abca2be17f23de92f5d
                                            • Opcode Fuzzy Hash: 6afae57ea7950d9291c6cf6146bceec47e08522dec7d50de16b3ec4dee0d757c
                                            • Instruction Fuzzy Hash: 135139729843607FD710EF249C00B6A77E65F45710F490828F88D6B2C2E3B59A69C7E7
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Function name too long.$Name$State
                                            • API String ID: 3832890014-1283365435
                                            • Opcode ID: 7eb3497f39062326e77c0a1c9c8091a696a685971d1346195b6aa16a1e98741f
                                            • Instruction ID: 6e23b48b999e2adaefd9658650c6ef511164265c703010985135914989824c89
                                            • Opcode Fuzzy Hash: 7eb3497f39062326e77c0a1c9c8091a696a685971d1346195b6aa16a1e98741f
                                            • Instruction Fuzzy Hash: 7011C472A0431166C610EA71AD42A2B7294ABA4719F48493FFD44D3280FAFDDB18835A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 0aa0411a621234e1ad8633b76e31020d0e88c4c62442a5e7a15cdeca7c880cab
                                            • Instruction ID: 4e7182a7f04028748cdc5160e4ade2e878c6a213b87d8a291876c7378b17d544
                                            • Opcode Fuzzy Hash: 0aa0411a621234e1ad8633b76e31020d0e88c4c62442a5e7a15cdeca7c880cab
                                            • Instruction Fuzzy Hash: A8911A71640229DFDB20DF19D880BAA7395EF85315F1440FAEC258B242D736E956CBE3
                                            APIs
                                            • GetParent.USER32(?), ref: 021798CD
                                            • CallWindowProcW.USER32(004CA580,?,?,?,?), ref: 02179909
                                            • GetDlgCtrlID.USER32(?), ref: 0217991D
                                            • GetParent.USER32(?), ref: 0217992E
                                            • GetDlgCtrlID.USER32(00000000), ref: 0217993B
                                            • CallWindowProcW.USER32(004CA580,?,00000047,?,?), ref: 02179993
                                            • GetClipBox.GDI32(?,?), ref: 021799CB
                                            • FillRect.USER32(?,?,00000000), ref: 021799DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallCtrlParentProcWindow$ClipFillRect
                                            • String ID:
                                            • API String ID: 1046380989-0
                                            • Opcode ID: d419929e04a6d0cfda344c34d7987d7459c65750c9e4d44cefcca5523f3285cc
                                            • Instruction ID: 3ddd04d010adafac7a1fe3cc16c1b51128032d52edcd8498a851f0127e0588f6
                                            • Opcode Fuzzy Hash: d419929e04a6d0cfda344c34d7987d7459c65750c9e4d44cefcca5523f3285cc
                                            • Instruction Fuzzy Hash: 1E41AC766002199BCB24DF18D898ABA77BAFBC5354F054179FE0697250D730EC15CBA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID:
                                            • API String ID: 3965848254-0
                                            • Opcode ID: 287228cbf5c3d4f53a84a52cb5ed8f1a194ac25648b420c7b5aa2c3c38b4ae2c
                                            • Instruction ID: b19957a446e8c822babc9b9ac402e57e320e715ad26a1340fe1c7a5a81f77acc
                                            • Opcode Fuzzy Hash: 287228cbf5c3d4f53a84a52cb5ed8f1a194ac25648b420c7b5aa2c3c38b4ae2c
                                            • Instruction Fuzzy Hash: 880267B15483058FD724CF64C488BABB7E5FF88308F14892EE99987251E770E959CF82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$_wcsncpy
                                            • String ID: "
                                            • API String ID: 1630244902-123907689
                                            • Opcode ID: 6648f3619f5b3ba1127efb2b113da78b24098153f29b3d40d01d779dd79a3e1e
                                            • Instruction ID: 05a5bd0d1b474dabefa3299b210e36edf3455926604f005c9c0192d01f4490f8
                                            • Opcode Fuzzy Hash: 6648f3619f5b3ba1127efb2b113da78b24098153f29b3d40d01d779dd79a3e1e
                                            • Instruction Fuzzy Hash: D7E1F1756443068FC725DF18D880BAAB3E2FF88314F2446ADE8648B391D735E946CBD6
                                            APIs
                                            • _wcschr.LIBCMT ref: 02117663
                                            • IsCharAlphaNumericW.USER32(?,004A1564,00000000,?), ref: 02117721
                                            • GetStringTypeExW.KERNEL32(00000400,00000004,?,00000001,?), ref: 0211773E
                                            • IsCharLowerW.USER32(?), ref: 02117824
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Char$AlphaLowerNumericStringType_wcschr
                                            • String ID: -()[]{}:;'"/\,.?!
                                            • API String ID: 3734836551-2658396598
                                            • Opcode ID: 087950415860bc43b3fac5443763bfd0bebfac24da2db61377677a884046c34e
                                            • Instruction ID: 11d8f9c31795544195cbcb5fe8eb2e984d0dc336ef995ac24343abbebe06f80d
                                            • Opcode Fuzzy Hash: 087950415860bc43b3fac5443763bfd0bebfac24da2db61377677a884046c34e
                                            • Instruction Fuzzy Hash: 5DC13C75944251AAEB14CF38D858BBEBBE1EF89308F0549BDE8C5973D0E3348886C759
                                            APIs
                                            • MulDiv.KERNEL32(?,00000060,004CB4F4), ref: 02112A9A
                                            • MulDiv.KERNEL32(?,00000060,004CB4F4), ref: 02112AE2
                                            • _memset.LIBCMT ref: 02112C35
                                            • SendMessageW.USER32 ref: 02112C69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend_memset
                                            • String ID:
                                            • API String ID: 1827994538-0
                                            • Opcode ID: bc41270903c75a682db74289cf5ca6dda1646421d82704e72d2591989189170b
                                            • Instruction ID: c1c3e6c4fabea1cb74777171c993c400568ddc08bea57b9bec26892efc18c759
                                            • Opcode Fuzzy Hash: bc41270903c75a682db74289cf5ca6dda1646421d82704e72d2591989189170b
                                            • Instruction Fuzzy Hash: A5C1E671588350AFDB35CF18C884BAAFBE5BF85308F14893DE99987291D770D884CB96
                                            APIs
                                            • GetKeyboardLayout.USER32(00000000), ref: 02146455
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayout
                                            • String ID: $cJ$UseErrorLevel
                                            • API String ID: 194098044-1974334687
                                            • Opcode ID: 8a25a3f6633064cbbd8271712a595cead48970572259becc259496925c13e3e6
                                            • Instruction ID: 2276ff4093922f7db251633f86f80e4d00b601995085a825258a9f5f15676329
                                            • Opcode Fuzzy Hash: 8a25a3f6633064cbbd8271712a595cead48970572259becc259496925c13e3e6
                                            • Instruction Fuzzy Hash: 27B159712843819FDB24DF28EC40B6A37EAAB8735CF04452DE9999B2C4DB71D844CB96
                                            APIs
                                            • SendMessageW.USER32(00000000,0000040B,00000000,00000000), ref: 0215E63F
                                            • MulDiv.KERNEL32(00000000,004CB4F4,00000060), ref: 0215E69C
                                            • DestroyCursor.USER32(00000000), ref: 0215E6EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CursorDestroyMessageSend
                                            • String ID: $cJ
                                            • API String ID: 3501257726-417114052
                                            • Opcode ID: 13a31f426d894dffeba71c856a4d6211a1dfa7835443f4e44cb1971545c8255e
                                            • Instruction ID: 47016b54c06a001b5ffd2ff1c020518017d7c5029b70b9c71ee6ed15aa444cb2
                                            • Opcode Fuzzy Hash: 13a31f426d894dffeba71c856a4d6211a1dfa7835443f4e44cb1971545c8255e
                                            • Instruction Fuzzy Hash: C491E0B5A44311DFD710CF28D884B2AB7E5EBC8354F048569EE29DB281D731E901CBA2
                                            APIs
                                            • _wcschr.LIBCMT ref: 02117C53
                                            • CharLowerW.USER32(00000000,?,?,?,00000000,?,?,-00000019), ref: 02117C69
                                            • CharLowerW.USER32 ref: 02117C76
                                            • CharLowerW.USER32(?), ref: 02117C91
                                            • PostMessageW.USER32(004CA564,0000041B,004CAD70,00000000), ref: 02117CD1
                                            • PostMessageW.USER32(004CA564,0000041B,004CAD70,00000000), ref: 02117D70
                                            • PostMessageW.USER32(004CA564,0000041B,004CAD70,00000000), ref: 02117D9F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CharLowerMessagePost$_wcschr
                                            • String ID:
                                            • API String ID: 1671784288-0
                                            • Opcode ID: 2dba94506fc51693c3cffcb3cef31fcc9ca2f46ab911250ee991a3108bf3687a
                                            • Instruction ID: 9a48460bf648c77d033e9bb7887f45d72db5a99453b3b92f31fafd2a8b1d6375
                                            • Opcode Fuzzy Hash: 2dba94506fc51693c3cffcb3cef31fcc9ca2f46ab911250ee991a3108bf3687a
                                            • Instruction Fuzzy Hash: DE61AC70644705ABD720DF25D880B76F7E2FB99344F144979E8868B7D1E332E446CB62
                                            APIs
                                              • Part of subcall function 00444650: GetForegroundWindow.USER32(?,?,00437345,?), ref: 0044467E
                                              • Part of subcall function 00444650: IsWindowVisible.USER32(00000000), ref: 00444699
                                            • __fassign.LIBCMT ref: 00437118
                                              • Part of subcall function 004913BF: wcstoxl.LIBCMT ref: 004913CF
                                            • __fassign.LIBCMT ref: 00437154
                                            • GetWindowRect.USER32(00000000,?), ref: 0043719A
                                            • GetWindowRect.USER32(00000000,?), ref: 004371CC
                                            • GetParent.USER32(00000000), ref: 004371F7
                                            • ScreenToClient.USER32(00000000,80000000), ref: 00437207
                                            • MoveWindow.USER32(00000000,?,?,?,?,00000001,?,?,?,?,?,?,?,?,004294B8), ref: 004372AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Rect__fassign$ClientForegroundMoveParentScreenVisiblewcstoxl
                                            • String ID:
                                            • API String ID: 4198355719-0
                                            • Opcode ID: a92d6b29bb2d3b75762705950fe442d801a8c84fdf986f5979f1caa5b4e2f620
                                            • Instruction ID: 1c891f63866bf9f633d1bcbda47a4db3bc108c0e04b8a5eff1ebb8705958e604
                                            • Opcode Fuzzy Hash: a92d6b29bb2d3b75762705950fe442d801a8c84fdf986f5979f1caa5b4e2f620
                                            • Instruction Fuzzy Hash: 4251F1B26083019BD730DF64DC41B2B77A5AB89710F14192EF880AB381D7B9EC44C7AA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy$Time$FileSystem
                                            • String ID:
                                            • API String ID: 456616543-0
                                            • Opcode ID: 32be6ae6566634ebabf999b0ea3bc8403da15acc3f334bc790dd7d1a3a74ab9d
                                            • Instruction ID: 1c57ca46b1eeeb8c030e04ef513b8db395601d7493513822501ebdabf0d570da
                                            • Opcode Fuzzy Hash: 32be6ae6566634ebabf999b0ea3bc8403da15acc3f334bc790dd7d1a3a74ab9d
                                            • Instruction Fuzzy Hash: 4D510571A543406AD718EB34CC81A6BB2EAEFC8300F49CD2DE85AC7251F735E5098756
                                            APIs
                                            • GetCursorPos.USER32(004C9484), ref: 00412148
                                            • GetSystemMetrics.USER32(00000000), ref: 004121C0
                                            • GetSystemMetrics.USER32(00000001), ref: 004121C6
                                            • GetCursorPos.USER32(?), ref: 00412225
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CursorMetricsSystem
                                            • String ID: d
                                            • API String ID: 3091566494-2564639436
                                            • Opcode ID: c211bb55981c3127a474b2a351d6987fbd699298291f044b76a36cf7165d34fa
                                            • Instruction ID: 5bc05deff55d77e115c75b38e9b676587ee8842ef92869f24c2587dae03bc7cc
                                            • Opcode Fuzzy Hash: c211bb55981c3127a474b2a351d6987fbd699298291f044b76a36cf7165d34fa
                                            • Instruction Fuzzy Hash: 0051DD357043019BD718CF58E981BAA73E1BB88304F24453EED89C7342D779D9A5CB5A
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,00000000,00008000,00000000,00000000,?,00404094,?), ref: 004170A6
                                            • _wcsrchr.LIBCMT ref: 00417149
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00007FFE,?,?,?,?,?,00404094,?), ref: 004171E5
                                            • _wcsrchr.LIBCMT ref: 00417245
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileModuleName_wcsrchr
                                            • String ID: %s\%s$Out of memory.
                                            • API String ID: 2248907744-1641153398
                                            • Opcode ID: f5b0e2eff4024d5dc113413ff412b86ec4617b7aef40f9135233e5128bda4ab1
                                            • Instruction ID: e9aec9891ec7854fd5483a4050920514405bc3c5355203deba120071fc3d31c2
                                            • Opcode Fuzzy Hash: f5b0e2eff4024d5dc113413ff412b86ec4617b7aef40f9135233e5128bda4ab1
                                            • Instruction Fuzzy Hash: 4F51C3725083026AD720EF649C01AE772A4EF94314F08493EFD558B381EB78D648C7AB
                                            APIs
                                            • _free.LIBCMT ref: 02120323
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundProcessThread_free
                                            • String ID: 0
                                            • API String ID: 3803968087-4108050209
                                            • Opcode ID: 2919c684d5c27a583b812fcd56b9a35925093f2044b5010293fcb8b11db408c7
                                            • Instruction ID: ef4ae4fafdaa3c7d81980f240d0528a7af2efa871ade09c98b4732dcbaefcb0b
                                            • Opcode Fuzzy Hash: 2919c684d5c27a583b812fcd56b9a35925093f2044b5010293fcb8b11db408c7
                                            • Instruction Fuzzy Hash: 76514A71D88268EFDB21DB60EC44FEE3F75EB5A308F084265F44557291D3304569CBA6
                                            APIs
                                            • _free.LIBCMT ref: 02120323
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundProcessThread_free
                                            • String ID: @
                                            • API String ID: 3803968087-2766056989
                                            • Opcode ID: 0c2c4ef9f284a86dacede3a72eb7a71df311975b1b8cd1d5d96ea29f524e9406
                                            • Instruction ID: 12b851fd201481439740635e3f1ca7324f66ca8655a7d4bbc712f5d16563b3a3
                                            • Opcode Fuzzy Hash: 0c2c4ef9f284a86dacede3a72eb7a71df311975b1b8cd1d5d96ea29f524e9406
                                            • Instruction Fuzzy Hash: DF515A71D88268EFDB20DB60EC44FAE3F75EB5A308F084266F405572D1D3304569CBA6
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 0215627A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ForegroundWindow
                                            • String ID: 0
                                            • API String ID: 2020703349-4108050209
                                            • Opcode ID: e9013811190f5feca0c703ebae91005b04b75cc42384ecb734cc96fadc10b4aa
                                            • Instruction ID: a09a276be288dd85b0c939fcd47beb5a6384cb281e513d0602dc17a5bfe6083a
                                            • Opcode Fuzzy Hash: e9013811190f5feca0c703ebae91005b04b75cc42384ecb734cc96fadc10b4aa
                                            • Instruction Fuzzy Hash: A341F432A402189FCB50DF69EC88B5BB7E9EB84364F44057AEC1DC76A0E7729404CBD6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: %.*s.Get%s$Duplicate declaration.$Missing "]"$Not a valid method, class or property definition.$Out of memory.
                                            • API String ID: 0-1119647260
                                            • Opcode ID: 39421bfbc6a7ef2cc8739dd62bc5427920f35b89beb3d2f35436365aa5d2d67c
                                            • Instruction ID: fc82f7e8b93b53ffa53959e7c1e91bc7d37728a516545a4477f2e29edb715848
                                            • Opcode Fuzzy Hash: 39421bfbc6a7ef2cc8739dd62bc5427920f35b89beb3d2f35436365aa5d2d67c
                                            • Instruction Fuzzy Hash: 754144307002109BCB209F29984277BB7A5EFE9304F84886BE8458B3A1EA7CD954C789
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: 9J$$cJ$Off
                                            • API String ID: 3832890014-726444215
                                            • Opcode ID: 74df72d166711da5d922015a407bfbdc6f3acade02d36c8ec90071b4f4dbb11d
                                            • Instruction ID: 95fc73796c400a0298e5e51e65575e44c59533039e02aa05b40da55dc5f7972a
                                            • Opcode Fuzzy Hash: 74df72d166711da5d922015a407bfbdc6f3acade02d36c8ec90071b4f4dbb11d
                                            • Instruction Fuzzy Hash: 7411E5626901B251AF102B308E027B7309EEF31A58B990264F829CA2C9F75BC26AC250
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 0f2c5ec6d37b9b30a8930679efa88b5cacdf706584bf4b8cc745eba7118e1128
                                            • Instruction ID: 7af6a4794435fda828c96503a4b21c03185c9d7da351cd9a953ceb5b51342c65
                                            • Opcode Fuzzy Hash: 0f2c5ec6d37b9b30a8930679efa88b5cacdf706584bf4b8cc745eba7118e1128
                                            • Instruction Fuzzy Hash: 4D01A995BC161562EF102138AC02BAE304E5F62F07FE48078FC08C52C1F78ED22690AE
                                            APIs
                                            • ActivateKeyboardLayout.USER32(?,00000000,?,00000000), ref: 02123B30
                                            • GetKeyboardLayoutNameW.USER32(?), ref: 02123B69
                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,?), ref: 02123B86
                                            • LoadLibraryW.KERNEL32(?), ref: 02123BB5
                                            • ActivateKeyboardLayout.USER32(00000000,00000000), ref: 02123BC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayout$Activate$LibraryLoadNameOpen
                                            • String ID: Layout File
                                            • API String ID: 1064788448-1055935358
                                            • Opcode ID: 276a9c7da169e365410642f2fc1326e0b95fe21c42b34976ae3a095137f169da
                                            • Instruction ID: 41b412a236274bc6a7d4c880e230a5213a65577c79f83a86b7c8fa96f0b2afb1
                                            • Opcode Fuzzy Hash: 276a9c7da169e365410642f2fc1326e0b95fe21c42b34976ae3a095137f169da
                                            • Instruction Fuzzy Hash: 89118235644315AFD734AFA49C48FABBBACEB85355F0048ADF956C2150EB38D408CB65
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$__wcsicmp_l
                                            • String ID:
                                            • API String ID: 3172861507-0
                                            • Opcode ID: 5f4701f7fe81a11beb3d826a9e6fc404618b80336881ed2fe4a7a148178e60a8
                                            • Instruction ID: 17e4ac8caef8addd90f6ea0ac2bb6320b344a1a6b2094553e313722aef5794ce
                                            • Opcode Fuzzy Hash: 5f4701f7fe81a11beb3d826a9e6fc404618b80336881ed2fe4a7a148178e60a8
                                            • Instruction Fuzzy Hash: F8F0AF6AAC1719759E2135319E02B5F108E0E32647F2E0175FC08E19C1FBDDD617C4BA
                                            APIs
                                            • _memset.LIBCMT ref: 0040A0E1
                                            • UnregisterHotKey.USER32(000201FC,?,004CB508,00000028,004CB508), ref: 0040A17B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unregister_memset
                                            • String ID:
                                            • API String ID: 2392160147-0
                                            • Opcode ID: 028d2088a1659a4ab87439cdd4795785e723fdf5c9e2601c4aaaaa8e11008163
                                            • Instruction ID: 696d72e4843b34e9b49dbd0273efdf7c7148b77ca4796f885ce486d7516f4be3
                                            • Opcode Fuzzy Hash: 028d2088a1659a4ab87439cdd4795785e723fdf5c9e2601c4aaaaa8e11008163
                                            • Instruction Fuzzy Hash: 01E1D5305083808ADB36CB249448B677BA16B12348F1845BFD8826B7D2D37DDDEAD75B
                                            APIs
                                            • _memset.LIBCMT ref: 0211A331
                                            • UnregisterHotKey.USER32(004CA564,04000000,004CB508,004C6950,004CB508), ref: 0211A3CB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unregister_memset
                                            • String ID:
                                            • API String ID: 2392160147-0
                                            • Opcode ID: 9b586f657cd55c89f7d2eccdd2e61a45f2c04b5f5514f7f2b2f49028f096df59
                                            • Instruction ID: 7d99e2eb39169a08bc8e2f07dd32058e166c1df4449be7f9440d7fd7026dad7d
                                            • Opcode Fuzzy Hash: 9b586f657cd55c89f7d2eccdd2e61a45f2c04b5f5514f7f2b2f49028f096df59
                                            • Instruction Fuzzy Hash: E4E1E56098A3949EEB75CF24D458B767FB16F02318F0C40B9D8C24BA92D375E9CAC791
                                            APIs
                                            • GlobalUnlock.KERNEL32(004CC048), ref: 021370B8
                                            • CloseClipboard.USER32 ref: 021370C8
                                            • GetTickCount.KERNEL32 ref: 021370DA
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 02137106
                                            • GetTickCount.KERNEL32 ref: 0213711C
                                            • GetTickCount.KERNEL32 ref: 021371D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                                            • String ID:
                                            • API String ID: 1623861271-0
                                            • Opcode ID: 7864d36bd7d5a73bc730558869c8022117772eeccaad223e0478b6abd7060de3
                                            • Instruction ID: a1408d4e0838d50c23218626b05a26c9f81c91a5597ea0ad1227c4f1e17e7f50
                                            • Opcode Fuzzy Hash: 7864d36bd7d5a73bc730558869c8022117772eeccaad223e0478b6abd7060de3
                                            • Instruction Fuzzy Hash: 74C102B1684341DFDB2ACF24D880B6ABBE7FB85328F14462DE859977D1D3309842CB95
                                            APIs
                                            • _ValidateScopeTableHandlers.LIBCMT ref: 021B0081
                                            • __FindPESection.LIBCMT ref: 021B009B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FindHandlersScopeSectionTableValidate
                                            • String ID:
                                            • API String ID: 876702719-0
                                            • Opcode ID: 5f2ba4219c27c2326e78d163c3cdfd2f3e7950a028b6276ac41be21445c95d6b
                                            • Instruction ID: ea5aa8817dc24eb6056ef16dc6ab6bd6fe4bfb44ee51d289fa2dabe9e38763b1
                                            • Opcode Fuzzy Hash: 5f2ba4219c27c2326e78d163c3cdfd2f3e7950a028b6276ac41be21445c95d6b
                                            • Instruction Fuzzy Hash: F691B236E802158FCB16CB58D890BBFB7B6EF88354F154179D81A973A0E731E842CB94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free_wcsncpy$_malloc_wcschr
                                            • String ID:
                                            • API String ID: 609840974-0
                                            • Opcode ID: e0fe2754d6d4b62e2d6f98cb4db529234186eebc832fd6233b342fce2c7bfae3
                                            • Instruction ID: 56ae81813e59b6f615f3cf87cdd0f1f3a22a02a12dc5a64ac5b1418ba1c98cad
                                            • Opcode Fuzzy Hash: e0fe2754d6d4b62e2d6f98cb4db529234186eebc832fd6233b342fce2c7bfae3
                                            • Instruction Fuzzy Hash: BB919071E403199FCF26DF54D880AEEB7F6FF88314F148495D80A97240E734AA91CBA1
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 02112198
                                            • DragFinish.SHELL32(?), ref: 021121B7
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Drag$Finish$AcceleratorFileFocusMessageQueryTranslate
                                            • String ID:
                                            • API String ID: 3028411364-0
                                            • Opcode ID: dc0f0a72ab7a2515a941de71b9d0efe48bfc9f911a55778d0df1076a36c29790
                                            • Instruction ID: fba8333fb0aae7ccde418d746a224c2c33bda442918c257f415e4e6659a7318a
                                            • Opcode Fuzzy Hash: dc0f0a72ab7a2515a941de71b9d0efe48bfc9f911a55778d0df1076a36c29790
                                            • Instruction Fuzzy Hash: 6271F671AC4314AFDB748F58C8D47AEF7E5BF85308F580539EA9983264D3349881CB86
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00002000,00409200,00000000,00000000,004C9470), ref: 0211917A
                                            • SetThreadPriority.KERNEL32(00000000,0000000F,?,00000100,00000000,02128051,02127F1F,?,00000100,?,00000000,02127F1F,00000100,004CB508,021406F5), ref: 02119190
                                            • PostThreadMessageW.USER32(004C9470,00000417,00000002,00000000), ref: 021191B4
                                            • Sleep.KERNEL32(0000000A,?,00000100,00000000,02128051,02127F1F,?,00000100,?,00000000,02127F1F,00000100,004CB508,021406F5), ref: 021191C0
                                            • GetExitCodeThread.KERNEL32(004CAD94,?), ref: 0211928A
                                            • Sleep.KERNEL32(00000000), ref: 021192A7
                                              • Part of subcall function 02119790: _free.LIBCMT ref: 021197FD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Thread$Sleep$CodeCreateExitMessagePostPriority_free
                                            • String ID:
                                            • API String ID: 2132562146-0
                                            • Opcode ID: 405eba820bcba44f91289e55c47021f744956c4c51a5cba9d79a477db6a181c3
                                            • Instruction ID: 4baeb21e474cf9bbb95c0e57b68b7c18c782203415f550076ac65787ba608fee
                                            • Opcode Fuzzy Hash: 405eba820bcba44f91289e55c47021f744956c4c51a5cba9d79a477db6a181c3
                                            • Instruction Fuzzy Hash: 1D519830288344AAE722DF70EC5AB5A7FE4AF4231DF044479F895971E1C3B8D584CB6A
                                            APIs
                                            • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000100), ref: 02186C7D
                                            • CharLowerW.USER32(00000000), ref: 02186C8A
                                            • CharLowerW.USER32(?), ref: 02186CA4
                                            • CharLowerW.USER32(?), ref: 02186CB2
                                            • CharLowerW.USER32(?), ref: 02186CCE
                                            • CharLowerW.USER32(00000000), ref: 02186CDB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CharLower
                                            • String ID:
                                            • API String ID: 1615517891-0
                                            • Opcode ID: 4dc4eaac74ffe94b67c37a89d981a31f2be02721ae442972b24b5abdb757bc7c
                                            • Instruction ID: 3db33ba4154756e2c02ea275d7f68ebdf188de9ec46e49951a5e9817fb2219ed
                                            • Opcode Fuzzy Hash: 4dc4eaac74ffe94b67c37a89d981a31f2be02721ae442972b24b5abdb757bc7c
                                            • Instruction Fuzzy Hash: EE41AF659803B99B8B206F269CC523ABBE8FB84655F050D1AFCC5CA240F738D8409A75
                                            APIs
                                            • SafeArrayGetDim.OLEAUT32(?), ref: 021691AD
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 021691CB
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 021691E5
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 021691FD
                                            • SafeArrayGetElemsize.OLEAUT32(?), ref: 02169221
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ArraySafe$Bound$AccessDataElemsize
                                            • String ID:
                                            • API String ID: 505432365-0
                                            • Opcode ID: 4949f4540dace6809cd1bdd2537ada9ee1df9f7b5e85c9bbe6a36eedc06ca760
                                            • Instruction ID: 37fe31878510f53b386bdc54b947efd8075d709475f313a0989a47c0652d2ff5
                                            • Opcode Fuzzy Hash: 4949f4540dace6809cd1bdd2537ada9ee1df9f7b5e85c9bbe6a36eedc06ca760
                                            • Instruction Fuzzy Hash: FA319FB5544302AFD700DF68D8889AABBE8FF88350F04886EFD5597231D775E8448B61
                                            APIs
                                            • GlobalSize.KERNEL32(00000000), ref: 0047908B
                                            • GlobalLock.KERNEL32(00000000), ref: 00479098
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004790ED
                                            • EnumClipboardFormats.USER32(00000000), ref: 004790FE
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00479122
                                            • CloseClipboard.USER32 ref: 00479132
                                              • Part of subcall function 00404890: GetClipboardFormatNameW.USER32(0000000D,00000104,00000104), ref: 004048BC
                                              • Part of subcall function 00404890: __wcsnicmp.LIBCMT ref: 004048CE
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 004048E7
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 004048FC
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 00404911
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 00404926
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 0040493B
                                              • Part of subcall function 00404890: __wcsicoll.LIBCMT ref: 00404950
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$Global$Clipboard$Unlock$CloseEnumFormatFormatsLockNameSize__wcsnicmp
                                            • String ID:
                                            • API String ID: 4010163957-0
                                            • Opcode ID: 5fbad0cbcd8efd48152daedfa8ea5cb145221950830a3b4ec0b6554a1846e1ce
                                            • Instruction ID: bb4a184ad2baf7df3add7dd79cc3dfd7d08a35701dec41baa3f1c1c4aebf6349
                                            • Opcode Fuzzy Hash: 5fbad0cbcd8efd48152daedfa8ea5cb145221950830a3b4ec0b6554a1846e1ce
                                            • Instruction Fuzzy Hash: 2E218D325103828BC721CF29D88879B7BE1BB45744F04892AE84DA3360D738DD49CB9E
                                            APIs
                                            • _memset.LIBCMT ref: 00434042
                                            • __fassign.LIBCMT ref: 0043407B
                                              • Part of subcall function 004913BF: wcstoxl.LIBCMT ref: 004913CF
                                              • Part of subcall function 00490F06: __fassign.LIBCMT ref: 00490EFC
                                            • __fassign.LIBCMT ref: 004340AB
                                            • _wcsncpy.LIBCMT ref: 004340D7
                                            • _wcsncpy.LIBCMT ref: 004340FB
                                            • Shell_NotifyIconW.SHELL32(00000001), ref: 00434113
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign$_wcsncpy$IconNotifyShell__memsetwcstoxl
                                            • String ID:
                                            • API String ID: 551406035-0
                                            • Opcode ID: e66adcc18bbc10b2f52b53873922d3b0e38951699ed3cc4a75f92c58cc495a2d
                                            • Instruction ID: 5afafabdf718e6cd8bf1dc44fb614064b30d250e0f2b81a2f43a3b69eeb2305d
                                            • Opcode Fuzzy Hash: e66adcc18bbc10b2f52b53873922d3b0e38951699ed3cc4a75f92c58cc495a2d
                                            • Instruction Fuzzy Hash: 3621C9B1A043006BE735EB64CC42BAF76FC5F84704F00583EBA849A2C1E7B95205874F
                                            APIs
                                              • Part of subcall function 02119C10: __wcsicoll.LIBCMT ref: 02119C28
                                              • Part of subcall function 02119C10: __wcsicoll.LIBCMT ref: 02119C75
                                            • __wcsicoll.LIBCMT ref: 0212636B
                                            • __wcsicoll.LIBCMT ref: 02126384
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: c541506866d938dced41fe333cdaaf8a4ffe437695f829ef26f23cf14cc25e6f
                                            • Instruction ID: d154e2fdddf81019f74fb21484866b2f7ccb141131f93d6e212ed49f552a7474
                                            • Opcode Fuzzy Hash: c541506866d938dced41fe333cdaaf8a4ffe437695f829ef26f23cf14cc25e6f
                                            • Instruction Fuzzy Hash: 09016272BC0A6566EE5021387D02BDF114D5F62716F260176FC1CD82C5F74CD56E44EA
                                            APIs
                                            • __CreateFrameInfo.LIBCMT ref: 021AF4BD
                                              • Part of subcall function 021AEDA1: __getptd.LIBCMT ref: 021AEDAF
                                              • Part of subcall function 021AEDA1: __getptd.LIBCMT ref: 021AEDBD
                                            • __getptd.LIBCMT ref: 021AF4C7
                                              • Part of subcall function 021A3982: __getptd_noexit.LIBCMT ref: 021A3985
                                              • Part of subcall function 021A3982: __amsg_exit.LIBCMT ref: 021A3992
                                            • __getptd.LIBCMT ref: 021AF4D5
                                            • __getptd.LIBCMT ref: 021AF4E3
                                            • __getptd.LIBCMT ref: 021AF4EE
                                            • _CallCatchBlock2.LIBCMT ref: 021AF514
                                              • Part of subcall function 021AEE46: __CallSettingFrame@12.LIBCMT ref: 021AEE92
                                              • Part of subcall function 021AF5BB: __getptd.LIBCMT ref: 021AF5CA
                                              • Part of subcall function 021AF5BB: __getptd.LIBCMT ref: 021AF5D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                            • String ID:
                                            • API String ID: 1602911419-0
                                            • Opcode ID: 1b316c8473a93b343d5f537133477b467525443aef24f85a48caa6918db169e2
                                            • Instruction ID: 0f6025d93e2409b0206bb5211ed9d75d4ec11724ca0b7a0680438b78e2923cc9
                                            • Opcode Fuzzy Hash: 1b316c8473a93b343d5f537133477b467525443aef24f85a48caa6918db169e2
                                            • Instruction Fuzzy Hash: 7E1119B9C40209DFDF00EFA4D894BADBBB1FF48314F1080A9E894A7250DB799A119F90
                                            APIs
                                            • __getptd.LIBCMT ref: 021A2FE4
                                              • Part of subcall function 021A3982: __getptd_noexit.LIBCMT ref: 021A3985
                                              • Part of subcall function 021A3982: __amsg_exit.LIBCMT ref: 021A3992
                                            • __amsg_exit.LIBCMT ref: 021A3004
                                            • __lock.LIBCMT ref: 021A3014
                                            • InterlockedDecrement.KERNEL32(?), ref: 021A3031
                                            • _free.LIBCMT ref: 021A3044
                                            • InterlockedIncrement.KERNEL32(004C5718), ref: 021A305C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                            • String ID:
                                            • API String ID: 3470314060-0
                                            • Opcode ID: 5f4f07d0e76b3c78905ebfa961882fd5c095da79817d3d4d0d084b3aa64b1e5e
                                            • Instruction ID: 28695b79d4271df49a1b742864c18b433ff54b1cf80e1fe7e6f732bb3387caa9
                                            • Opcode Fuzzy Hash: 5f4f07d0e76b3c78905ebfa961882fd5c095da79817d3d4d0d084b3aa64b1e5e
                                            • Instruction Fuzzy Hash: 5701D63DD81B11DFC721BB64A566B5DB7A0BF01720F100195D820A3290C774A9C1DFD9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: local
                                            • API String ID: 0-2346092776
                                            • Opcode ID: 0c69bc13aefb73e42755eb2104f0f9d617791f670872223b4d58fd4f2d87a5b4
                                            • Instruction ID: 5fc51399cd8331a96edeb7c372072a95cfe8c61d7e2ba476596f7da4590234ae
                                            • Opcode Fuzzy Hash: 0c69bc13aefb73e42755eb2104f0f9d617791f670872223b4d58fd4f2d87a5b4
                                            • Instruction Fuzzy Hash: 2C8107366443459FD731DF18D884BABB3E2AF88314F09069DE9A987382D731E845CBD5
                                            APIs
                                            • SendMessageW.USER32(004C69FC,00001032,00000000,00000000), ref: 0215E8EF
                                            • __wcsnicmp.LIBCMT ref: 0215E90A
                                            • SendMessageW.USER32(004C69FC,00001004,00000000,00000000), ref: 0215E941
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$__wcsnicmp
                                            • String ID: $cJ
                                            • API String ID: 2103314646-417114052
                                            • Opcode ID: ca5ef3df414cc83077101d062570975ea7e89f274724e9a31e0b024666aa8950
                                            • Instruction ID: 13edf85ecb0d562c8f58f657ace8c88e31de91671283cdfa42d4718ba1704a2d
                                            • Opcode Fuzzy Hash: ca5ef3df414cc83077101d062570975ea7e89f274724e9a31e0b024666aa8950
                                            • Instruction Fuzzy Hash: 0961E076F80311DBDB20DF29D884B6AB7E5FB85724F0045AAFD6987290D731D901CBA2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID: 9J$$cJ$1aA$UseErrorLevel
                                            • API String ID: 269201875-3525961569
                                            • Opcode ID: c8e0d6494d66012b853786e9234fb5f5ca299e58fb9c791ef4b923809f9694d8
                                            • Instruction ID: a048164e747ebb1390ee740d124013b1cb3cf20744b82c955a517032ee12e415
                                            • Opcode Fuzzy Hash: c8e0d6494d66012b853786e9234fb5f5ca299e58fb9c791ef4b923809f9694d8
                                            • Instruction Fuzzy Hash: F05103716443015FCA20DF28D880F67B7E6AB85314F008A6DF5998B381DB71E806CBA6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$__itow
                                            • String ID: 0
                                            • API String ID: 3125673013-4108050209
                                            • Opcode ID: 8e6ebd2ad20d8a39c355452cb6241081a62332ba2158c894556cf156dd812957
                                            • Instruction ID: 96f1ea3c16614ac8150100b3a574458827bca9cddea065733ad3c9689a93abf1
                                            • Opcode Fuzzy Hash: 8e6ebd2ad20d8a39c355452cb6241081a62332ba2158c894556cf156dd812957
                                            • Instruction Fuzzy Hash: DC616DB0E40229DFDB24CF98D985BADFBB5FB08314F104269E825A73D0D775A942CB90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memset
                                            • String ID: Up
                                            • API String ID: 2102423945-1355106271
                                            • Opcode ID: 38edb8207897dbfd8eac9b485632f7402f1dedb6647f825a79395c151608d206
                                            • Instruction ID: 7bbccc51238f614ebfb17caa28bf26b5a77d74820df4a586c143fd4367478a3e
                                            • Opcode Fuzzy Hash: 38edb8207897dbfd8eac9b485632f7402f1dedb6647f825a79395c151608d206
                                            • Instruction Fuzzy Hash: B9412332AC02109BCB389B28889167BB3A4EF56B04F09443FE84AD7281F735D544C7DB
                                            APIs
                                            • CharUpperW.USER32(?,?,?,?,?,021122CA,?,?), ref: 0211D0C1
                                            • CharUpperW.USER32(?,?,?,?,?,021122CA,?,?), ref: 0211D0D2
                                            • Sleep.KERNEL32(00000000), ref: 0211D1B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CharUpper$Sleep
                                            • String ID: {Raw}${Text}
                                            • API String ID: 3503790639-924107855
                                            • Opcode ID: 45bce33d6a8a6df1b82dec38023b66c6f85ca4477616bdec529f76df68018b8b
                                            • Instruction ID: a08350664afcc1ee0015ecca28d49756e9f192e8c7e280e18b029d7282047cdc
                                            • Opcode Fuzzy Hash: 45bce33d6a8a6df1b82dec38023b66c6f85ca4477616bdec529f76df68018b8b
                                            • Instruction Fuzzy Hash: 115193746487448BDB209F2898407ABBBF1FF8E304F08496DE8C997391E734E545CB55
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 0218B2A8
                                            • _wcsncpy.LIBCMT ref: 0218B2C5
                                            • PostMessageW.USER32(004CA564,00000044,00000403,?), ref: 0218B373
                                            • MessageBoxW.USER32(?,?,?,?), ref: 0218B395
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message_wcsncpy$Post
                                            • String ID: AutoHotkey v1.1.33.02
                                            • API String ID: 3297763708-502322182
                                            • Opcode ID: 8e35db3dbaae8a8a068b43ba8f02a28663172b8bea6bd1c3fedc72b6510e9093
                                            • Instruction ID: af265e20480be1048ec5cacd8e46e90c0999663ef741e4904097a5f304a24c32
                                            • Opcode Fuzzy Hash: 8e35db3dbaae8a8a068b43ba8f02a28663172b8bea6bd1c3fedc72b6510e9093
                                            • Instruction Fuzzy Hash: 624124B09883819AE720AF50DC84F9B77F4FB49704F048C7DEA888B290D77595498B8A
                                            APIs
                                              • Part of subcall function 00444650: GetForegroundWindow.USER32(?,?,00437345,?), ref: 0044467E
                                              • Part of subcall function 00444650: IsWindowVisible.USER32(00000000), ref: 00444699
                                            • _wcsncpy.LIBCMT ref: 00438044
                                            • __wcstoi64.LIBCMT ref: 00438084
                                            • __fassign.LIBCMT ref: 004380D2
                                            • __fassign.LIBCMT ref: 004380FE
                                              • Part of subcall function 00491A12: __wtof_l.LIBCMT ref: 00491A1C
                                              • Part of subcall function 00490F06: __fassign.LIBCMT ref: 00490EFC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign$Window$ForegroundVisible__wcstoi64__wtof_l_wcsncpy
                                            • String ID: msctls_statusbar321
                                            • API String ID: 4167010027-1022929942
                                            • Opcode ID: 6790195ce637ee190761b11690cc7ed550e6f48484dc1f718f7748b9c06890b8
                                            • Instruction ID: 788eacb607f33b64be3d547047aa1f0c496ec20a191ed04e37f1a56de443d958
                                            • Opcode Fuzzy Hash: 6790195ce637ee190761b11690cc7ed550e6f48484dc1f718f7748b9c06890b8
                                            • Instruction Fuzzy Hash: 1E312E72A0430097E630B7358C46B6B73B89F8C314F05193FB94967283E97D951DD2AB
                                            APIs
                                              • Part of subcall function 02142820: __wcsicoll.LIBCMT ref: 02142838
                                            • _wcsncpy.LIBCMT ref: 02150890
                                            • SetVolumeLabelW.KERNEL32(?,?), ref: 021508FB
                                              • Part of subcall function 02150450: _wcsncpy.LIBCMT ref: 02150488
                                              • Part of subcall function 02150450: GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 021504EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy$DiskFreeLabelSpaceVolume__wcsicoll
                                            • String ID: 9J$$cJ$\
                                            • API String ID: 1863641975-1909888522
                                            • Opcode ID: 26eff295a1f2d6cb540cf58fa0d8ef9d92c2dbf0378017c8559d908ed792bbbb
                                            • Instruction ID: aed3fe05ef4fd717534938b351b37445d8e9b2a35a05dcb94c12d8c07bcba0d5
                                            • Opcode Fuzzy Hash: 26eff295a1f2d6cb540cf58fa0d8ef9d92c2dbf0378017c8559d908ed792bbbb
                                            • Instruction Fuzzy Hash: B5316E32644314DBC634EBA8DC80FAAB399EB9D310F14463AFD65C7290EB76D44087D6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Menu$CursorDeleteDestroyInfoItemObjectRemove
                                            • String ID: 0
                                            • API String ID: 2910511256-4108050209
                                            • Opcode ID: 78fe589266dff621738dc09cd580b17f00030bf12e7960d229dc73668580f6f0
                                            • Instruction ID: ae8f9f5b1d2a6acf771d9f95054e932db04b125892186f3eaf4d664a2500c40f
                                            • Opcode Fuzzy Hash: 78fe589266dff621738dc09cd580b17f00030bf12e7960d229dc73668580f6f0
                                            • Instruction Fuzzy Hash: 1B316CB26402449FC724CF59E884D2ABBF9FF88314B14467DE58A8BA21D730F884CB95
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 0047B058
                                            • _wcsncpy.LIBCMT ref: 0047B075
                                            • PostMessageW.USER32(000201FC,00000044,00000403,?), ref: 0047B123
                                            • MessageBoxW.USER32(?,?,?,?), ref: 0047B145
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message_wcsncpy$Post
                                            • String ID: AutoHotkey v1.1.33.02
                                            • API String ID: 3297763708-502322182
                                            • Opcode ID: 4d858b20879698586b62548811320521b5f89dec9b6e5d0e7635d555d82f9167
                                            • Instruction ID: 5037d3f3131e8d4430dd0b5c110027bf20470c1670cd799b848116fb22f4fea9
                                            • Opcode Fuzzy Hash: 4d858b20879698586b62548811320521b5f89dec9b6e5d0e7635d555d82f9167
                                            • Instruction Fuzzy Hash: BD31D1719043819AD7209F10D948BEB77F4FF45700F04CD7DE9885B291D77A4849878A
                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000002,?), ref: 02183067
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Open
                                            • String ID: W
                                            • API String ID: 71445658-655174618
                                            • Opcode ID: 4eaa1448f047c0a9e37dc15e519b90fea570750adc6d4903e70a76d622233704
                                            • Instruction ID: 96d0e053b2d78ebc61fbce866ec0104f0765683ba8f991aa9b081958d9b13936
                                            • Opcode Fuzzy Hash: 4eaa1448f047c0a9e37dc15e519b90fea570750adc6d4903e70a76d622233704
                                            • Instruction Fuzzy Hash: A62197716082019FC304EF24DCC8A2BBBE8FB89355F04492DF855D32A0D731D9488BA6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: Locale$Off
                                            • API String ID: 3832890014-2054679776
                                            • Opcode ID: 7a0b0196891a786b0891aa3d41ab6e38dadfc404f173ccd241545673c09b9616
                                            • Instruction ID: bd6479399031bbe77513467dfbd74f1c393df7e816a8239ea1c880c3a9fcd5b1
                                            • Opcode Fuzzy Hash: 7a0b0196891a786b0891aa3d41ab6e38dadfc404f173ccd241545673c09b9616
                                            • Instruction Fuzzy Hash: A111E962650512029B24EB348C027F72555AF39B58B9F46BAEC06C63C5FB4FCBC5C29C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: 9J$$cJ$Off
                                            • API String ID: 3832890014-726444215
                                            • Opcode ID: 76cdb0d5839de39d175e6bcc09380cb86b1285596161c8e7d454c4073052871d
                                            • Instruction ID: a4cc538ffe721c29ebf45a5847627043a0677de0509854c89df8e48755361d1c
                                            • Opcode Fuzzy Hash: 76cdb0d5839de39d175e6bcc09380cb86b1285596161c8e7d454c4073052871d
                                            • Instruction Fuzzy Hash: 80117C41A8011AD1EF246B348D217A631D6AB31B68F994274D8B9CB3C9F33BD681C290
                                            APIs
                                            • GetKeyboardLayoutNameW.USER32(?), ref: 02123B69
                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,?), ref: 02123B86
                                            • LoadLibraryW.KERNEL32(?), ref: 02123BB5
                                            • ActivateKeyboardLayout.USER32(00000000,00000000), ref: 02123BC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayout$ActivateLibraryLoadNameOpen
                                            • String ID: Layout File
                                            • API String ID: 2091964706-1055935358
                                            • Opcode ID: 86dcf971c9547de30d1bf89f76b619d02056e4675c3859158bc4dd5fbb2261e4
                                            • Instruction ID: a8796388f77027418b9ffe6371e37c73b43ccffe9e015bd4d7634eb24223e019
                                            • Opcode Fuzzy Hash: 86dcf971c9547de30d1bf89f76b619d02056e4675c3859158bc4dd5fbb2261e4
                                            • Instruction Fuzzy Hash: 4A01B1352443119FD738AF609C48FABB7A8FB80351F0048AEFE56C2190EB389018CB62
                                            APIs
                                            • _malloc.LIBCMT ref: 00491092
                                              • Part of subcall function 0048FCA4: __FF_MSGBANNER.LIBCMT ref: 0048FCBD
                                              • Part of subcall function 0048FCA4: __NMSG_WRITE.LIBCMT ref: 0048FCC4
                                              • Part of subcall function 0048FCA4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00495598,004011D4,00000001,004011D4,?,00494023,00000018,004C1C20,0000000C,004940B3), ref: 0048FCE9
                                            • std::exception::exception.LIBCMT ref: 004910C7
                                            • std::exception::exception.LIBCMT ref: 004910E1
                                            • __CxxThrowException@8.LIBCMT ref: 004910F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                            • String ID: bad allocation
                                            • API String ID: 615853336-2104205924
                                            • Opcode ID: 36f28e2f7be32c6c88e2c8835e3d3f52415e842892e41568fbdb9cd4d28f9e6a
                                            • Instruction ID: 0e97269d05949e0eae5a2051462803c07d347007da5e63e20302bf3b35848e6c
                                            • Opcode Fuzzy Hash: 36f28e2f7be32c6c88e2c8835e3d3f52415e842892e41568fbdb9cd4d28f9e6a
                                            • Instruction Fuzzy Hash: 75F0F93550061AAADF50FB56CD06B6F3E64AB51354F64407FF805922E1DFBD8A80874C
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,023A50F0,?,0040F2F1), ref: 00409133
                                            • CreateMutexW.KERNEL32(00000000,00000000,AHK Keybd,?,023A50F0,?,0040F2F1), ref: 0040913E
                                            • GetLastError.KERNEL32 ref: 00409146
                                            • CloseHandle.KERNEL32(00000000), ref: 00409171
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandle$CreateErrorLastMutex
                                            • String ID: AHK Keybd
                                            • API String ID: 2372642624-4057427925
                                            • Opcode ID: 5c1dec462a99eb0cbdb192bafac2b5537f98b22e2b92c282c39de3a5b1d5a127
                                            • Instruction ID: b11a0fa6ae01493b16eee62e90afce83b7d6509963e95f52bf66ae369014e02f
                                            • Opcode Fuzzy Hash: 5c1dec462a99eb0cbdb192bafac2b5537f98b22e2b92c282c39de3a5b1d5a127
                                            • Instruction Fuzzy Hash: DAF05E3370122196DA2067B5BC88F4A6B695B95BA2F058033E505EB290C738CC4046A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID:
                                            • API String ID: 3965848254-0
                                            • Opcode ID: 98f8e3e177bbc8a687f11b72fa054c5222a589484f78f3fbd14376b96d592325
                                            • Instruction ID: 58ae014cc6761de523098019c9ef7214f193444e252f4aba2a6d3b639d5eaec3
                                            • Opcode Fuzzy Hash: 98f8e3e177bbc8a687f11b72fa054c5222a589484f78f3fbd14376b96d592325
                                            • Instruction Fuzzy Hash: D39106719803009FD724DF18884973EB3E6BF5D754F08886DE8999B380E375D965CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcstoui64
                                            • String ID:
                                            • API String ID: 3882282163-0
                                            • Opcode ID: 89f6f9a896a8a446fd48ddba9fabd29907f9cc1d3132efd8c7f0b1e3cafb092b
                                            • Instruction ID: ef4eaa8f14fea70f10ea3facdb4b229a9cfcc057a16134ddbaacae33b38b52f1
                                            • Opcode Fuzzy Hash: 89f6f9a896a8a446fd48ddba9fabd29907f9cc1d3132efd8c7f0b1e3cafb092b
                                            • Instruction Fuzzy Hash: 6A711231648304AFC724DF68EC84F6FB7A5EB84714F144A2AF85A8B2D0D771D815CB99
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 02157FA7
                                            • _wcsrchr.LIBCMT ref: 02157FC0
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000,?,00000001,?), ref: 02157FED
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,-00000002,000000FF,?,00000104,00000000,00000000,?,00000001,?), ref: 0215808D
                                            • LoadLibraryW.KERNEL32(?,?,00000001,?), ref: 021580B6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$LibraryLoad_wcsncpy_wcsrchr
                                            • String ID:
                                            • API String ID: 3605676759-0
                                            • Opcode ID: fedc871011c6c37a1891870a6c324305d196aba50796a013d73e5318e052b1fa
                                            • Instruction ID: 97269fad22c2d70fbcd5e9655798c2de6d6542efdddbaf2fe6eeca5b63b793f1
                                            • Opcode Fuzzy Hash: fedc871011c6c37a1891870a6c324305d196aba50796a013d73e5318e052b1fa
                                            • Instruction Fuzzy Hash: 4F516A72A80321AFE730EB64DCC0FA7B399EF99710F050669EC2893290EB75D445C7A5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 3bca486101eb41088be1b8c2d30fed34860812d7bf2f2d9861858a3b8d7e8fd5
                                            • Instruction ID: 104ad2c53de50b62301c89005014958ef7e6dc85df9e76b1418614e9d03d43b2
                                            • Opcode Fuzzy Hash: 3bca486101eb41088be1b8c2d30fed34860812d7bf2f2d9861858a3b8d7e8fd5
                                            • Instruction Fuzzy Hash: E3515871D84268FFDB20DBA0DC44FAE3F75AB5A308F084269F40567291D3304569CBA6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsdup_malloc
                                            • String ID:
                                            • API String ID: 2398682791-0
                                            • Opcode ID: 746868dff13f7642c0ad85fdd5fe5b5a28c182d62539c3688bb970b4c9bcfe13
                                            • Instruction ID: 86c7d99082870fc871931ee55a9863f3880f6d8ccbd79df9926fa3976194c383
                                            • Opcode Fuzzy Hash: 746868dff13f7642c0ad85fdd5fe5b5a28c182d62539c3688bb970b4c9bcfe13
                                            • Instruction Fuzzy Hash: B45102B2640755DFC720DFA9E88056BB3E6EB84314F204A6ED96687640E732E546CFC2
                                            APIs
                                              • Part of subcall function 021206C0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0212073C
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0211F918
                                            • _wcschr.LIBCMT ref: 0211F960
                                            • _free.LIBCMT ref: 02120323
                                            • GetTickCount.KERNEL32 ref: 0212035A
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            • AttachThreadInput.USER32(004CB4F0,?,00000000), ref: 02120594
                                            • BlockInput.USER32(00000000), ref: 021205A7
                                            • GetForegroundWindow.USER32(00000000), ref: 021205DE
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 021205E5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Thread$ForegroundInputMessagePeekProcess$AttachBlockCountTick_free_wcschr
                                            • String ID:
                                            • API String ID: 255257169-0
                                            • Opcode ID: 712c3b3c0728f970c5b716229d307538e8331260c2c1420dbeba7f2f22d91357
                                            • Instruction ID: f231416a63ca4dac4fb7308b783f1f4f86ef844f459604f4123c647b53bedbc3
                                            • Opcode Fuzzy Hash: 712c3b3c0728f970c5b716229d307538e8331260c2c1420dbeba7f2f22d91357
                                            • Instruction Fuzzy Hash: 13516A71D88268FFDB20DBA0EC44FAE3F75AB5A308F084269F405672D1D3314569CBA6
                                            APIs
                                              • Part of subcall function 021206C0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0212073C
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0211F918
                                            • _wcschr.LIBCMT ref: 0211F960
                                            • _free.LIBCMT ref: 02120323
                                            • GetTickCount.KERNEL32 ref: 0212035A
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            • AttachThreadInput.USER32(004CB4F0,?,00000000), ref: 02120594
                                            • BlockInput.USER32(00000000), ref: 021205A7
                                            • GetForegroundWindow.USER32(00000000), ref: 021205DE
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 021205E5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Thread$ForegroundInputMessagePeekProcess$AttachBlockCountTick_free_wcschr
                                            • String ID:
                                            • API String ID: 255257169-0
                                            • Opcode ID: eecdb2b7aff3b22a3bdb9fdb280fdd7f16555b64c2b31d721cca7d4cd7941d91
                                            • Instruction ID: 4904fd7089d686c9176d5ccb6e93c1eba3795a8840adfcb0420f4f13565b3f69
                                            • Opcode Fuzzy Hash: eecdb2b7aff3b22a3bdb9fdb280fdd7f16555b64c2b31d721cca7d4cd7941d91
                                            • Instruction Fuzzy Hash: EB515A71D88268FFDB20DBA0EC44FAE3F75AB5A308F084269F405672D1D3714569CBA6
                                            APIs
                                            • __wcstoui64.LIBCMT ref: 02177D27
                                            • GetDlgCtrlID.USER32(00000000), ref: 02177D32
                                            • GetParent.USER32(00000000), ref: 02177D41
                                            • GetDlgCtrlID.USER32(00000000), ref: 02177D4E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Ctrl$Parent__wcstoui64
                                            • String ID:
                                            • API String ID: 2645479964-0
                                            • Opcode ID: 4c984ca42b7cabf5292c64daf7a8300b78c0da66ebc48ecbd6b409431984e8d2
                                            • Instruction ID: ce776c63d9885e79e0d3fd347885e6db29b6d8243498cc2f32edcf79f8045a3b
                                            • Opcode Fuzzy Hash: 4c984ca42b7cabf5292c64daf7a8300b78c0da66ebc48ecbd6b409431984e8d2
                                            • Instruction Fuzzy Hash: 0B4118323802055BDB219F28CC55BBAB377EBC1715F394435F6019B2D1EB35E85287A4
                                            APIs
                                            • _free.LIBCMT ref: 02120323
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundProcessThread_free
                                            • String ID:
                                            • API String ID: 3803968087-0
                                            • Opcode ID: 033ed6a336de9722f24e365c9f78b69235320d2cd06c27130b9b8dbe9f319bdd
                                            • Instruction ID: 7409c12e11ccf495bad24cd59e41f781774879d0b5d57661af0de2b4e42b9f84
                                            • Opcode Fuzzy Hash: 033ed6a336de9722f24e365c9f78b69235320d2cd06c27130b9b8dbe9f319bdd
                                            • Instruction Fuzzy Hash: 30514A71D88268EFDB21DB60EC44FEE3F75EB5A308F084265F40557291D3314569CBA6
                                            APIs
                                            • _free.LIBCMT ref: 02120323
                                            • GetForegroundWindow.USER32(00000000), ref: 02120557
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0212055E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundProcessThread_free
                                            • String ID:
                                            • API String ID: 3803968087-0
                                            • Opcode ID: 0ab73e46303fdb278573827c73ba4cf4068995202d73aa20a21d84bc4feb34f5
                                            • Instruction ID: 18a8820369ba693401015fd7ff5303252b8c9dfa947d005ae2cf041deddd7891
                                            • Opcode Fuzzy Hash: 0ab73e46303fdb278573827c73ba4cf4068995202d73aa20a21d84bc4feb34f5
                                            • Instruction Fuzzy Hash: 2C514A71D88268EFDB20DB60EC44FAE3F75EB5A308F084269F40557291D3314569CBA6
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,0215493E,004C6A44,?,00000000,00000000,00000000,00000000,?,?,02147595,?), ref: 0218A9B1
                                            • IsWindowVisible.USER32(00000000), ref: 0218A9C6
                                              • Part of subcall function 0218B730: __wcsnicmp.LIBCMT ref: 0218B7F4
                                              • Part of subcall function 0218B730: __wcstoui64.LIBCMT ref: 0218B873
                                            • IsWindow.USER32(004A3890), ref: 0218AACA
                                              • Part of subcall function 0218B640: IsWindowVisible.USER32(004A3890), ref: 0218B641
                                            • GetWindowLongW.USER32(004A3890,000000F0), ref: 0218AAF6
                                            • EnumWindows.USER32(0047A9B0,00000002), ref: 0218AB48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Visible$EnumForegroundLongWindows__wcsnicmp__wcstoui64
                                            • String ID:
                                            • API String ID: 256079111-0
                                            • Opcode ID: 1ff72e04120917a91cb1bf0cb7594ff27423dcf84b25814678284e21baaf9aec
                                            • Instruction ID: f6b19d5de0309c2ea153257dbe1f371b6e6e72d716b00fa8dc23caf42de32fe4
                                            • Opcode Fuzzy Hash: 1ff72e04120917a91cb1bf0cb7594ff27423dcf84b25814678284e21baaf9aec
                                            • Instruction Fuzzy Hash: D85171759893958BD730BF6498D46EAB7E5FF85304F44892FD98883240EB748684CF92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID:
                                            • API String ID: 3965848254-0
                                            • Opcode ID: 41ba6864de551952a85156bc9d2977188199858485834648c3be75105a1305e6
                                            • Instruction ID: 4e534235ffbdffd94268fb82e0b3ccb970f82a24c4389b6cb7012826f540ec51
                                            • Opcode Fuzzy Hash: 41ba6864de551952a85156bc9d2977188199858485834648c3be75105a1305e6
                                            • Instruction Fuzzy Hash: B8313872AC43247FC610EB148C00B5A73A69F44754F580828FD8C6F2C2E3B5AD99C7E6
                                            APIs
                                            • PMDtoOffset.LIBCMT ref: 021AEA56
                                            • std::bad_exception::bad_exception.LIBCMT ref: 021AEA80
                                            • __CxxThrowException@8.LIBCMT ref: 021AEA8E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8OffsetThrowstd::bad_exception::bad_exception
                                            • String ID:
                                            • API String ID: 1176828985-0
                                            • Opcode ID: f1daaf7272d83479e5d9c48f97770eaf38c8a788f8f7a771ceb9e7a392e4d973
                                            • Instruction ID: b7c6379e077daaf0fbc7e860e3d8ea204d0ed20f04315ef3e93757b2d0096e76
                                            • Opcode Fuzzy Hash: f1daaf7272d83479e5d9c48f97770eaf38c8a788f8f7a771ceb9e7a392e4d973
                                            • Instruction Fuzzy Hash: 0331C17EA802159FCF14DF68C8B0BAEB7A1BF48311F148469E816E7290D734E901CFA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID:
                                            • API String ID: 3965848254-0
                                            • Opcode ID: fc70f87bdc6a397edf184e36bb0f87abd49d83b238beab0d5eed361c8deb2969
                                            • Instruction ID: 33f7c0499d677a5e8ce1fdf1b811dccc4cfdd84217e441ce1b1e05838bbcee2e
                                            • Opcode Fuzzy Hash: fc70f87bdc6a397edf184e36bb0f87abd49d83b238beab0d5eed361c8deb2969
                                            • Instruction Fuzzy Hash: 05312972A843647FD710EB148C00B5A33A29F44754F584828FD8D6F2C2E3B5AD99C7E6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$Info
                                            • String ID:
                                            • API String ID: 2509303402-0
                                            • Opcode ID: d0e7f00bbf892677bdd41b72260f83d6c0fe3c67c6124a2bbec218d0eadfa590
                                            • Instruction ID: 55ab45bb7a9b0d238f2cdccedeff7137f590bd3db2e0a3507d9408e8cdb7f692
                                            • Opcode Fuzzy Hash: d0e7f00bbf892677bdd41b72260f83d6c0fe3c67c6124a2bbec218d0eadfa590
                                            • Instruction Fuzzy Hash: 71313BB2A483908FC720DF98888461BFBE9BB9A614F444E2EF69583340D775D51C8F97
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?), ref: 02152B4C
                                            • SetLastError.KERNEL32(000000B7), ref: 02152B5E
                                            • _wcsrchr.LIBCMT ref: 02152B77
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 02152BE0
                                            • SetLastError.KERNEL32(00000057), ref: 02152BF5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$AttributesCreateDirectoryFile_wcsrchr
                                            • String ID:
                                            • API String ID: 1861573484-0
                                            • Opcode ID: dae40e702c3771359214405505dfd5eaa4e0b247359fa5e72bce5ca1d31bea6c
                                            • Instruction ID: ad904fd1170fb84164c6af413cbdb9432e8466e2b8fd81fef6b58b45d2902143
                                            • Opcode Fuzzy Hash: dae40e702c3771359214405505dfd5eaa4e0b247359fa5e72bce5ca1d31bea6c
                                            • Instruction Fuzzy Hash: DF213733A80624EBDB302F34EC44BDAB7A4EB44769F048679EE3997190E3318585CB91
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 004441FF
                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,?,023B1B28), ref: 004442BC
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475E69
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475E95
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475ECD
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F01
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F36
                                              • Part of subcall function 00475E40: _wcsncpy.LIBCMT ref: 00475F6B
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,023B1B28), ref: 00444242
                                            • GetLastError.KERNEL32(?,?,?,023B1B28), ref: 0044424C
                                            • LocalFileTimeToFileTime.KERNEL32(?,?,?,?,?,023B1B28), ref: 004442AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy$Time$File$System$ErrorLastLocal
                                            • String ID:
                                            • API String ID: 3240568017-0
                                            • Opcode ID: 1312f3ad860936e977c46fb2c2976336659f494334651d602f7568b6dee9c96b
                                            • Instruction ID: ed3c0ece4a4318ca4416859416a3598fdd0206a96019e0ddb1ccf5fe4eb86390
                                            • Opcode Fuzzy Hash: 1312f3ad860936e977c46fb2c2976336659f494334651d602f7568b6dee9c96b
                                            • Instruction Fuzzy Hash: D921C8356043406BE720EB20EC41FFB77A8BFD5704F04892EB989562D1EBB89509C75B
                                            APIs
                                            • _malloc.LIBCMT ref: 0211906E
                                              • Part of subcall function 0219FEF4: __FF_MSGBANNER.LIBCMT ref: 0219FF0D
                                              • Part of subcall function 0219FEF4: __NMSG_WRITE.LIBCMT ref: 0219FF14
                                              • Part of subcall function 0219FEF4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0219FF39
                                            • _malloc.LIBCMT ref: 02119093
                                            • _free.LIBCMT ref: 021190A2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _malloc$AllocateHeap_free
                                            • String ID:
                                            • API String ID: 1159278337-0
                                            • Opcode ID: bfce2379d6a6073e6adfe375bc166afb75f5e1b015479cc5936c9dbff0a7321a
                                            • Instruction ID: 232b39eb33f904bec76f65c4efc0b419d9dde82a4a509b2095cb91acba9420a4
                                            • Opcode Fuzzy Hash: bfce2379d6a6073e6adfe375bc166afb75f5e1b015479cc5936c9dbff0a7321a
                                            • Instruction Fuzzy Hash: 49113DB69803185FCA90EF95FC80FDB736EABC5715F500039EC0687611E731A95ACEA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 903e79645ca7077841e0e114f50f90866777ccf917b188f60b2fb4b0b671e742
                                            • Instruction ID: 1f66136ea345c56aa1638cd2ced51ff21b98e49f2557ef9f5d74b79e292ed982
                                            • Opcode Fuzzy Hash: 903e79645ca7077841e0e114f50f90866777ccf917b188f60b2fb4b0b671e742
                                            • Instruction Fuzzy Hash: A101D862AC16723EAE24353C3C01BEA114D4F21316F164136FC08E92C5FF4CC9A640E9
                                            APIs
                                            • _malloc.LIBCMT ref: 021A1185
                                              • Part of subcall function 0219FEF4: __FF_MSGBANNER.LIBCMT ref: 0219FF0D
                                              • Part of subcall function 0219FEF4: __NMSG_WRITE.LIBCMT ref: 0219FF14
                                              • Part of subcall function 0219FEF4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0219FF39
                                            • _free.LIBCMT ref: 021A1198
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap_free_malloc
                                            • String ID:
                                            • API String ID: 1020059152-0
                                            • Opcode ID: 8a85b2422ff44affc924af4dbc445d07efe07d6852990364a55c1d78d94f4020
                                            • Instruction ID: 5969c70e732902c8acfb38409bb176ed7c22488c80c0796d722460627a0b9ec9
                                            • Opcode Fuzzy Hash: 8a85b2422ff44affc924af4dbc445d07efe07d6852990364a55c1d78d94f4020
                                            • Instruction Fuzzy Hash: 2C11A77B9C16117FCF212BB4AC24B6A3B9AAF453B1F314565E85DDA160DF34C8408A94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 21ade3fd0822db5317d07713a8acde142c83c73a01b6abd888cd885da4b2a72f
                                            • Instruction ID: 74b6c8ace08855e9ab08af96507350c28ce7f2cda93aaeadf61600ab16f44fb7
                                            • Opcode Fuzzy Hash: 21ade3fd0822db5317d07713a8acde142c83c73a01b6abd888cd885da4b2a72f
                                            • Instruction Fuzzy Hash: 25013155BC161526EF2171384C42BAA204A5B61B0AFE94560FD08E52C6FFEDC98194D9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 47659b04db0ef7a416f5ac458911f85821d1363b722fb693dc90851dbe562faa
                                            • Instruction ID: f55f7f78363ea0e22b7724def8ada24deb056fa0b97b5b30bb8707e3d88498e9
                                            • Opcode Fuzzy Hash: 47659b04db0ef7a416f5ac458911f85821d1363b722fb693dc90851dbe562faa
                                            • Instruction Fuzzy Hash: D4F096B2EC06B162DE6122387C02BFE118D4F21356F164066FC88D55C9F78D9AA644D9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 78d72f5161912edb43d412b3478a34a7cca4ee3f478739f5f6dbdbdeb72eee9b
                                            • Instruction ID: eddc76519311aee037b96a040d07c693447f5eb37e7d20f09eed6d6d44cb138e
                                            • Opcode Fuzzy Hash: 78d72f5161912edb43d412b3478a34a7cca4ee3f478739f5f6dbdbdeb72eee9b
                                            • Instruction Fuzzy Hash: 24F0BE66AC2A1122EF1120389C03F9A20495F72B07FE94170FC1CC02C1FF9DE29284AE
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 6d8cd9f16e74b58d15d7419833f31a88cefdb957cca74c7fe64a4a0be2038e9a
                                            • Instruction ID: dc76ae729f3367cfa58fe3e752c1c49490f8b17c110bdfba3cd6347fb6828893
                                            • Opcode Fuzzy Hash: 6d8cd9f16e74b58d15d7419833f31a88cefdb957cca74c7fe64a4a0be2038e9a
                                            • Instruction Fuzzy Hash: BEF08975AC166562EF2129385C02B5E204D5F22B07FE44079FC08D55C1FB8DD62E8599
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 0ed3fe1f2b192cc8fa187e5a40f94ddd1ec1b965cc49efc2bfb1ea3ecd97b932
                                            • Instruction ID: de7382e97566eee00d2ed570ea2d91b91f6020f7723043587f12d8e2a5871144
                                            • Opcode Fuzzy Hash: 0ed3fe1f2b192cc8fa187e5a40f94ddd1ec1b965cc49efc2bfb1ea3ecd97b932
                                            • Instruction Fuzzy Hash: 3FF0A761EC452576DE1121344C42B9E204B4F22B06FE54064FC08D01C1FB8DD22A80D9
                                            APIs
                                            • __getptd.LIBCMT ref: 021A3765
                                              • Part of subcall function 021A3982: __getptd_noexit.LIBCMT ref: 021A3985
                                              • Part of subcall function 021A3982: __amsg_exit.LIBCMT ref: 021A3992
                                            • __getptd.LIBCMT ref: 021A377C
                                            • __amsg_exit.LIBCMT ref: 021A378A
                                            • __lock.LIBCMT ref: 021A379A
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 021A37AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 30f2f978db3a3185453e21d0b76ebbaa8c314a263122820700460cccc5d812df
                                            • Instruction ID: c3ee8a5cea82f93250527c9af7b7f3588490449043632722395cad6627759d76
                                            • Opcode Fuzzy Hash: 30f2f978db3a3185453e21d0b76ebbaa8c314a263122820700460cccc5d812df
                                            • Instruction Fuzzy Hash: ABF0F07E9C0710AFD7A1BBF46826F1D73A16F00724F114289D4A0A71D0CBA465408E59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: Parameter #1 invalid.
                                            • API String ID: 0-1208927624
                                            • Opcode ID: 46248bfe309755df73f3819ff16bb6d98a4e953c241720d2b0d88671f19fa8a9
                                            • Instruction ID: 9dbd93a32c4b015f3866ac4c885b464c347b68a39fc22a4468cd8005808a840a
                                            • Opcode Fuzzy Hash: 46248bfe309755df73f3819ff16bb6d98a4e953c241720d2b0d88671f19fa8a9
                                            • Instruction Fuzzy Hash: 8ED1817164470A9FDB14DF58C4C0B6AB3E1FF88318F148A2EE85997241D771E949CF92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsdup_free
                                            • String ID: ERCP$O
                                            • API String ID: 2088533098-1578287635
                                            • Opcode ID: b09f2bcdd348ff3e40569aa6681643fdbc5e1a9436c58d4b5d20774f4087a7b1
                                            • Instruction ID: e403ffdc5627d91e640f56010c645b3568ac4d9e81421e3a437391f471296955
                                            • Opcode Fuzzy Hash: b09f2bcdd348ff3e40569aa6681643fdbc5e1a9436c58d4b5d20774f4087a7b1
                                            • Instruction Fuzzy Hash: 43B19375E80229EFCB14DF94C880AAEB7B6FF48314F148299EC25AB350D771A945CF91
                                            APIs
                                              • Part of subcall function 021548A0: GetForegroundWindow.USER32(?,?,02147595,?), ref: 021548CE
                                              • Part of subcall function 021548A0: IsWindowVisible.USER32(00000000), ref: 021548E9
                                            • SendMessageTimeoutW.USER32(004CA514,?,004CA514,00000000,00000002,00001388,?), ref: 02148502
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundMessageSendTimeoutVisible
                                            • String ID: $cJ$FAIL
                                            • API String ID: 578228273-2838781074
                                            • Opcode ID: 4ee379e8ecf06f8ac15b4d21dfccc5ea42f2728296180e7de2062403343a85ed
                                            • Instruction ID: 9e19f08e4ad464774c6073654c2cf73f2384d1e28a64249d82333b2dfa19b0cf
                                            • Opcode Fuzzy Hash: 4ee379e8ecf06f8ac15b4d21dfccc5ea42f2728296180e7de2062403343a85ed
                                            • Instruction Fuzzy Hash: CEA126717842005FC724DF28EC80F66B7A6AB85328F1985ADE94D8F2C1CB75D885CBD5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \$]
                                            • API String ID: 4104443479-2127938089
                                            • Opcode ID: f8e5b251e1edd8fbfb66df5a1802ceb21747df498eb1ba6de6123a39dddb2ab4
                                            • Instruction ID: fe6821bc1007312be04e06b417fa11cba559fcd3dc6eaf4cb4a27364cc70c6ae
                                            • Opcode Fuzzy Hash: f8e5b251e1edd8fbfb66df5a1802ceb21747df498eb1ba6de6123a39dddb2ab4
                                            • Instruction Fuzzy Hash: D7717E70A193458BC764DF28C48176FB7E1BFD4710F148A2EE49987390E778E948CB9A
                                            APIs
                                              • Part of subcall function 0216CDC0: _wcschr.LIBCMT ref: 0216CDD9
                                            • __wcstoui64.LIBCMT ref: 0216D6EB
                                              • Part of subcall function 021A1BAE: wcstoxq.LIBCMT ref: 021A1BD0
                                            • __wcstoui64.LIBCMT ref: 0216D805
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcstoui64$_wcschrwcstoxq
                                            • String ID: $cJ$$cJ
                                            • API String ID: 848492632-4067473746
                                            • Opcode ID: 7ba915fb25c51edeaf8860f6269e35b26e5b9e3b07647a0eb4651b7c157ea5c3
                                            • Instruction ID: 3ac9d02a5cfa5eef1422569a237cfcc87f4e2a2d586b784949bde0c8b0d34f43
                                            • Opcode Fuzzy Hash: 7ba915fb25c51edeaf8860f6269e35b26e5b9e3b07647a0eb4651b7c157ea5c3
                                            • Instruction Fuzzy Hash: CA51E3B6B802445FC730AF68FC88A7F73E9EB85758F594539E85487240EB35E814CA92
                                            APIs
                                            • GetCursorPos.USER32(004C9484), ref: 02122398
                                            • GetCursorPos.USER32(?), ref: 02122475
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Cursor
                                            • String ID: d
                                            • API String ID: 3268636600-2564639436
                                            • Opcode ID: 0a8221b956d51a686e304ca07a9abecb84ec165ab9cdbd670feb013ca5bbe2e5
                                            • Instruction ID: 1412bc8778862e1ba0162821d3e229eeb5f0d5d01dbae23fc9b336260f0f7e8d
                                            • Opcode Fuzzy Hash: 0a8221b956d51a686e304ca07a9abecb84ec165ab9cdbd670feb013ca5bbe2e5
                                            • Instruction Fuzzy Hash: 4051BB356843119FD728CF28D880B6EB3E2BB88714F144539FC8AC7251D735D969CB65
                                            APIs
                                            • _memset.LIBCMT ref: 02126F22
                                            • OleInitialize.OLE32(00000000), ref: 02126F6C
                                              • Part of subcall function 02127D40: _wcsncpy.LIBCMT ref: 02127D93
                                              • Part of subcall function 02127D40: SetCurrentDirectoryW.KERNEL32(004A3890,00000000,?,00000100,00000000), ref: 02127DFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentDirectoryInitialize_memset_wcsncpy
                                            • String ID: Tray$%E
                                            • API String ID: 613146505-3103445395
                                            • Opcode ID: 51ce06a3aa56aaa2013ac6591dd4849e289739a97c3c9ec41f5233dca173aaf9
                                            • Instruction ID: ed0ad94f21611a2fbbabedcfb564212f306cea90734c39e7c2dafc684af29a75
                                            • Opcode Fuzzy Hash: 51ce06a3aa56aaa2013ac6591dd4849e289739a97c3c9ec41f5233dca173aaf9
                                            • Instruction Fuzzy Hash: E2615EB4846384EEC3908F6AADD2E15BAA8F759708F90823EE448C33A1C77401448FDD
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Caps_memset
                                            • String ID: 4
                                            • API String ID: 675830301-4088798008
                                            • Opcode ID: bc540bbd9bd6e9462421f524c438b7103932e9f24e31840f203531a11d0905d1
                                            • Instruction ID: 9ddcdaefa0f8b3c11e8c6acf6a23744ba0989202e3de841508e73138b5fbee7a
                                            • Opcode Fuzzy Hash: bc540bbd9bd6e9462421f524c438b7103932e9f24e31840f203531a11d0905d1
                                            • Instruction Fuzzy Hash: 7731E672681341ABD330CF18E4887BEF3E4EF96315F88895EE49887290E37A911CCB51
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll__wcsnicmp
                                            • String ID: $cJ$ahk_group
                                            • API String ID: 28402859-3333620948
                                            • Opcode ID: 6cc332ec26e0d1f70017bea1e546447b45eec99dec9f01c7d0211ccf1f60a14f
                                            • Instruction ID: e2c5433b7f064a0bef8cd9e8951e5c6eb8b59b3c40446619f25343e6f1a12235
                                            • Opcode Fuzzy Hash: 6cc332ec26e0d1f70017bea1e546447b45eec99dec9f01c7d0211ccf1f60a14f
                                            • Instruction Fuzzy Hash: 1E31D130704268EBD764DF18EC84E2B37B5AB4A308F88846EE5444B392D7799C91C76E
                                            APIs
                                            • GetModuleHandleW.KERNEL32(atl), ref: 00459112
                                            • GetProcAddress.KERNEL32(00000000,AtlAxGetControl), ref: 00459122
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: AtlAxGetControl$atl
                                            • API String ID: 1646373207-1501572552
                                            • Opcode ID: b4da0a31f756675afc51a82b7d910fcf342e7155634322e39036e5bb30fded02
                                            • Instruction ID: e97827cb32079c3960b9188d26754c4635221f31eb59461d8d6e1150b6d55386
                                            • Opcode Fuzzy Hash: b4da0a31f756675afc51a82b7d910fcf342e7155634322e39036e5bb30fded02
                                            • Instruction Fuzzy Hash: 22317074200602EFDB04DF59D854B5777E4AF84309F14846EE809CB362E77ADC0ADB95
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 02122C68
                                            • GetForegroundWindow.USER32(?,021215D9,?,?), ref: 02122CB4
                                            • GetWindowTextW.USER32(00000000,004CAD8C,00000064), ref: 02122CE1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$CountForegroundTextTick
                                            • String ID: N/A
                                            • API String ID: 3416458291-2525114547
                                            • Opcode ID: 2fd051712f737ae47f244709d37459cad1e2b1d357a65674ddae0cbbb7e22ec3
                                            • Instruction ID: f491e705847ca41ff5e5d1c5e8fd07fdcdf03268cec0c81a285848f36382ef71
                                            • Opcode Fuzzy Hash: 2fd051712f737ae47f244709d37459cad1e2b1d357a65674ddae0cbbb7e22ec3
                                            • Instruction Fuzzy Hash: D6319531104214CFC359CF24ED94E297BB2FB89309F05C57AE806CB675D7309824CB4A
                                            APIs
                                            • __woutput_l.LIBCMT ref: 021A0451
                                              • Part of subcall function 021A3EC2: __getptd_noexit.LIBCMT ref: 021A3EC2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __getptd_noexit__woutput_l
                                            • String ID: B
                                            • API String ID: 3669879410-1255198513
                                            • Opcode ID: 03032bbca66baeae611268328c120a2d0e66b8455c233a04f28a1321d39e88e8
                                            • Instruction ID: f831c8201aa199eb3003cf00a9e29439bef27192e11b83677c8e48ba76edd8b1
                                            • Opcode Fuzzy Hash: 03032bbca66baeae611268328c120a2d0e66b8455c233a04f28a1321d39e88e8
                                            • Instruction Fuzzy Hash: 8A115E7694425DDFDF019FA4CC90AFEB7B8FB0C324F10456AE920A6281D77899048BB0
                                            APIs
                                              • Part of subcall function 00476360: _vswprintf_s.LIBCMT ref: 00476379
                                            • GetFileAttributesW.KERNEL32(?,0043C3BD,00000000,?,0043C463), ref: 0043C203
                                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,0043C3BD,00000000,?,0043C463), ref: 0043C259
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AttributesFile$_vswprintf_s
                                            • String ID: "%s\%s$AutoHotkey.chm
                                            • API String ID: 1487582922-1989825519
                                            • Opcode ID: 095e45e3d592fc7686ef85049473f613db3b1e2b00e935daeae4889220443448
                                            • Instruction ID: a420c570394e4981e771206abc9edcf9669dd6b7b2b753d55bc7da5be51c1535
                                            • Opcode Fuzzy Hash: 095e45e3d592fc7686ef85049473f613db3b1e2b00e935daeae4889220443448
                                            • Instruction Fuzzy Hash: E81123764006046BC3108F98EC82AAB7399FB4A764F04826AF819D7391D739AC158BE5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsnicmp_wcschr
                                            • String ID: <>=/|^,:*&~!()[]{}+-?."'\;`$Class
                                            • API String ID: 2237432580-400929710
                                            • Opcode ID: 3e65991958776511a363d75a9652196ca4b45058d2c914b72df164aef9867b9e
                                            • Instruction ID: 01bf9018eb968bcb73617aebc8eb70b323afbf3dd88a4685e9e2fb24ddbcdfcb
                                            • Opcode Fuzzy Hash: 3e65991958776511a363d75a9652196ca4b45058d2c914b72df164aef9867b9e
                                            • Instruction Fuzzy Hash: 491189626402319BD7208B2DAD417BB73D1EF95314B1A4516FC44CB184F720D8AEC6B0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsnicmp_wcschr
                                            • String ID: <>=/|^,:*&~!()[]{}+-?."'\;`$Class
                                            • API String ID: 2237432580-400929710
                                            • Opcode ID: ddb9f795ef5eef9625f2d227e283799c986f45950540f36eecceebb915710be6
                                            • Instruction ID: 000611b55cc603882a6c8dd12de19df21fd80f28234bad1777c5b54ea45d26c5
                                            • Opcode Fuzzy Hash: ddb9f795ef5eef9625f2d227e283799c986f45950540f36eecceebb915710be6
                                            • Instruction Fuzzy Hash: D6110873604211AA9B209B2DAC425FB73A1EFA2311718492FEC45C6354FB28DCC6C699
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: IconNotifyShell__memset_wcsncpy
                                            • String ID: AutoHotkey
                                            • API String ID: 1481257660-348589305
                                            • Opcode ID: 4de8aaaec7b3385bc2d5b59284372a4e1311b53348e82b983606de7dee336c8d
                                            • Instruction ID: ecbd3f8ec84ca26debf249f4ab1975335f5585c503ba8b103f0a960f50ff63a7
                                            • Opcode Fuzzy Hash: 4de8aaaec7b3385bc2d5b59284372a4e1311b53348e82b983606de7dee336c8d
                                            • Instruction Fuzzy Hash: BC112DB0640701AFEB60DF34C849B97B7E8EB49354F00482DE99ED7380E774A915CB65
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000002,00000000,0211485A,?,?,?,00000000,0212503E,004A3890,02144C62), ref: 021148A1
                                            • GlobalLock.KERNEL32(00000000), ref: 021148C6
                                            • GlobalFree.KERNEL32(00000000), ref: 021148D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Global$AllocFreeLock
                                            • String ID: GlobalLock
                                            • API String ID: 1811133220-2848605275
                                            • Opcode ID: 3077d16a6333e464a38a1998cabdca6bdcba8b44f69dc64c1187058e47271b07
                                            • Instruction ID: bb61ebefb7b3452b22502894a1ac37805f763253e324812369f9f2d3f41ed2cf
                                            • Opcode Fuzzy Hash: 3077d16a6333e464a38a1998cabdca6bdcba8b44f69dc64c1187058e47271b07
                                            • Instruction Fuzzy Hash: 3FF04471A40B419AD714DFB58D09F12B7E5AF45B05F00887EB55AD3654FF38E4008B58
                                            APIs
                                            • SetMenuItemInfoW.USER32 ref: 0217E363
                                            • DeleteObject.GDI32(00000000), ref: 0217E376
                                            • DestroyCursor.USER32(00000000), ref: 0217E390
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CursorDeleteDestroyInfoItemMenuObject
                                            • String ID: 0
                                            • API String ID: 392443887-4108050209
                                            • Opcode ID: bcb17f935b03f77c21bbf1565bad6a80ba5704de6224b23550ba8cda24da3172
                                            • Instruction ID: 19005a6d31b5c7ad42d73170a03e2f2e2e10b7c9a28e9b3d581213dad0e6fa8b
                                            • Opcode Fuzzy Hash: bcb17f935b03f77c21bbf1565bad6a80ba5704de6224b23550ba8cda24da3172
                                            • Instruction Fuzzy Hash: EFF04FB05013009FE324CF15C958B177BF4BB88709F44095CE48A876A0D7B9E408CB95
                                            APIs
                                            • SetMenuItemInfoW.USER32 ref: 0046E113
                                            • DeleteObject.GDI32(00000000), ref: 0046E126
                                            • DestroyIcon.USER32(00000000,?,0046CBF5,00000000,00000000,75845780,?,?,00416ED1,004CB508,023A2EF8,?,?,?,00000000,00000000), ref: 0046E140
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteDestroyIconInfoItemMenuObject
                                            • String ID: 0
                                            • API String ID: 2083505926-4108050209
                                            • Opcode ID: bcb17f935b03f77c21bbf1565bad6a80ba5704de6224b23550ba8cda24da3172
                                            • Instruction ID: 9ba0049c749f477f11fd6e0a93733dfd42603c35f6568d37a2aa2cf327b2bc5a
                                            • Opcode Fuzzy Hash: bcb17f935b03f77c21bbf1565bad6a80ba5704de6224b23550ba8cda24da3172
                                            • Instruction Fuzzy Hash: B8F06DF45013009FE324CF16C958B577BE4BB49705F840A1CF49A877A0E7B9E808CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: $cJ$wait
                                            • API String ID: 3832890014-1684543882
                                            • Opcode ID: e140d34723dc111992b1ed2cf201ebc7f83160051c9a72e4a6e3a927357a2cf7
                                            • Instruction ID: 1378ec2c2e1a5aab58b6cf052c1957ae3d335812870cfaf5c805cc1277386b26
                                            • Opcode Fuzzy Hash: e140d34723dc111992b1ed2cf201ebc7f83160051c9a72e4a6e3a927357a2cf7
                                            • Instruction Fuzzy Hash: 36E09B60B04214BBDA90AF75FD85F17239C6705308B48442B7D01C3152D77DD8A5833F
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free_malloc
                                            • String ID:
                                            • API String ID: 845055658-0
                                            • Opcode ID: 265540759c46f58153206af4fd07174db42eced511f7a7a180f7f0053de9921f
                                            • Instruction ID: 72ac7b82e680d2d5b35f00333a3a7e6494598e8c09f92661a9a1b3413460913f
                                            • Opcode Fuzzy Hash: 265540759c46f58153206af4fd07174db42eced511f7a7a180f7f0053de9921f
                                            • Instruction Fuzzy Hash: 1AB1DE716482448FD714DF28A88CBBEB7E5AB85305F04853FE8C687241D735D525CBDA
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 82b705f1cfa4194da50d9e7223db4bbf129d93850633d6305fbd967e34fffd72
                                            • Instruction ID: ea7718b72b8cd01db8623643410aba6625b2e6fd4133e090e90bfcd22e295ab7
                                            • Opcode Fuzzy Hash: 82b705f1cfa4194da50d9e7223db4bbf129d93850633d6305fbd967e34fffd72
                                            • Instruction Fuzzy Hash: 3B81E4719C8350AFCB35CF18C4947AAF7E6AF85308F484539EA9987364D374D882CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 334ef50807d7bdf99b2ef6d46e019313d9a4e1b63d94a723f83dfccd939e036a
                                            • Instruction ID: 6a87bae367e77084095517ce02917a27af462c1ca1b5633757e9f3a50faa4574
                                            • Opcode Fuzzy Hash: 334ef50807d7bdf99b2ef6d46e019313d9a4e1b63d94a723f83dfccd939e036a
                                            • Instruction Fuzzy Hash: 4C71D571AC4314AFCB248B18C4D47AEF7E5AB89308F584639EA9987354D330D982CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 7fbda89de4f581030ffcbf43f03d96112dcd573f1735d9589365a4b7fb391144
                                            • Instruction ID: 78921a72a6095b2cef907f7c1810153fd1def88bf41e847c6219f2c608e9b6af
                                            • Opcode Fuzzy Hash: 7fbda89de4f581030ffcbf43f03d96112dcd573f1735d9589365a4b7fb391144
                                            • Instruction Fuzzy Hash: 6661F771AC4314AFDB758B1CC8D47AEF7E6AF85308F584539EA9987264D330D881CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 112b7eb5fdea1455c57fb30aefbc8f84dafc170fdc64ad91bb2e82776f998ed3
                                            • Instruction ID: 520a0e159927aa702281f275803a659635b6a69d706d74ad23caf1359db12c0c
                                            • Opcode Fuzzy Hash: 112b7eb5fdea1455c57fb30aefbc8f84dafc170fdc64ad91bb2e82776f998ed3
                                            • Instruction Fuzzy Hash: 3461E671AC4314AFDB758B1CC4D47AEF7E6AF85308F584539EA9987264D330D881CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 52ecb12a4fd2bea60b8359a136ef88312082890e0ff35d71426ed9757f8002f8
                                            • Instruction ID: 7d242e0006275f86266692c9a4afd4467f2fa9bc680b27eb1077a5a171e55aa0
                                            • Opcode Fuzzy Hash: 52ecb12a4fd2bea60b8359a136ef88312082890e0ff35d71426ed9757f8002f8
                                            • Instruction Fuzzy Hash: C261F671AC4314AFDB758B2CC8D47AEF7E5AF85308F484539EA9983264D330D881CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • CountClipboardFormats.USER32 ref: 02112F0D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClipboardCountFormatsMessage
                                            • String ID:
                                            • API String ID: 477315184-0
                                            • Opcode ID: a5bd795eaaea059997e66ef42b7d2e3ebc02a3127186f58c48d2abd295303f30
                                            • Instruction ID: ba2cefdd5149696410cdea4fb95bd5200759b96b0d802d397017602979aad4da
                                            • Opcode Fuzzy Hash: a5bd795eaaea059997e66ef42b7d2e3ebc02a3127186f58c48d2abd295303f30
                                            • Instruction Fuzzy Hash: D7611471688351AFDB348B28C884BAEB7E9AF85708F04453DFA59C7390D774D880CB96
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AcceleratorDragFinishFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 3031666465-0
                                            • Opcode ID: 38de454f00cf1859e1ba1a98118224f971f79228e71105e7cf12037d21d3432a
                                            • Instruction ID: fe0b02943ab6488dbf03dbb1f73ff8a2ead77155e38d0c942f263dfafb04800f
                                            • Opcode Fuzzy Hash: 38de454f00cf1859e1ba1a98118224f971f79228e71105e7cf12037d21d3432a
                                            • Instruction Fuzzy Hash: C961E6719C4714AFDB758B18C8D47AEF7E5AB85308F584539EA8983364D3349881CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            • DragFinish.SHELL32(?), ref: 02112590
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DragFinish$AcceleratorFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 2266762101-0
                                            • Opcode ID: 15f6af7553ff76668244343b4349a39a08cbdf135d5d9f5c75b2c4fbeae659d4
                                            • Instruction ID: c55b2e6bbc3d2174a0ce1f95241a4ab128cd80d07900f1a204ba4c85c17f263a
                                            • Opcode Fuzzy Hash: 15f6af7553ff76668244343b4349a39a08cbdf135d5d9f5c75b2c4fbeae659d4
                                            • Instruction Fuzzy Hash: 236109719C47146FDB758B2CC4D47AEF7E5AF85308F484539EA9987264D330D881CB86
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • TranslateAcceleratorW.USER32(00000000,?,?), ref: 0211187A
                                            • DragFinish.SHELL32(?), ref: 0211254D
                                            • DragFinish.SHELL32(?), ref: 02112590
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DragFinish$AcceleratorFocusMessageTranslate
                                            • String ID:
                                            • API String ID: 2266762101-0
                                            • Opcode ID: e4be9fcff14c6a1d994baeef08becb6f4fab5c10b56141066124c7cf952b72a1
                                            • Instruction ID: 699ab43894588a34236804b9ffc58dad2889938e96bb4c09ce56b161cb9db89b
                                            • Opcode Fuzzy Hash: e4be9fcff14c6a1d994baeef08becb6f4fab5c10b56141066124c7cf952b72a1
                                            • Instruction Fuzzy Hash: B9510871AC4714AFDB758B1CC8D47AEF7E6AB85308F484539EA9983264D330D881CB86
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 569442e974ecc65b458fcfc2957a79c8a0527e44a4dcf07d9a501c72f8652c49
                                            • Instruction ID: a95966d23c7d0ca7ca0af67b41555856214fd1a19fd28523e6a894d78b8bf73d
                                            • Opcode Fuzzy Hash: 569442e974ecc65b458fcfc2957a79c8a0527e44a4dcf07d9a501c72f8652c49
                                            • Instruction Fuzzy Hash: D24127326443296ACB389E68E8C07FA73EAEFC5314F89443DED4587150F736956D8392
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,00000000,00008000,00000000,00000000,?,021142E4,?), ref: 021272F6
                                            • _wcsrchr.LIBCMT ref: 02127399
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00007FFE,?,?,?,?,?,021142E4,?), ref: 02127435
                                            • _wcsrchr.LIBCMT ref: 02127495
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileModuleName_wcsrchr
                                            • String ID:
                                            • API String ID: 2248907744-0
                                            • Opcode ID: 3d273865c451ccdac851a998b091693aee1a9c27cbd87a93ba4498bc403332db
                                            • Instruction ID: f33dd8e80c013bb841002c3488fc866fbf1d84a60f4708c650a9e26eeb1237b1
                                            • Opcode Fuzzy Hash: 3d273865c451ccdac851a998b091693aee1a9c27cbd87a93ba4498bc403332db
                                            • Instruction Fuzzy Hash: 6751F3B2A843525AD714EF649C01BABB3A5EF81314F084679FD658B2C0FB70D519CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a1a268ee89e11112a3751bdb9c4f03cc218f28128f4e87f9d09ae17b186c66c
                                            • Instruction ID: a2e1791798cb9b5eb5a8fb41146857fbe222cbb6e075616f73b9bae26b67df18
                                            • Opcode Fuzzy Hash: 3a1a268ee89e11112a3751bdb9c4f03cc218f28128f4e87f9d09ae17b186c66c
                                            • Instruction Fuzzy Hash: 715116316842209FD728DB28DC88B7F77E5EB85315F05462DFC46932A0D335996CCB66
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID:
                                            • API String ID: 3832890014-0
                                            • Opcode ID: 1f986cea34d6bdb3f680d5e208d465f01867dc74f5bbacd9a1c444c998213c18
                                            • Instruction ID: de7ce650b2985aea5a2b01b6ba139215da565c42abd33149ff544e04cf565c72
                                            • Opcode Fuzzy Hash: 1f986cea34d6bdb3f680d5e208d465f01867dc74f5bbacd9a1c444c998213c18
                                            • Instruction Fuzzy Hash: BD41CB317883406BE7206B384C81B37BBA6ABC6724F140679F995CB2C2D7B5D941C790
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,?,0215C9A6,004C6A44,?,?,?,?,00000001), ref: 0218A7C7
                                            • IsWindowVisible.USER32(00000000), ref: 0218A7E3
                                            • GetForegroundWindow.USER32(?,?,?,?,0215C9A6,004C6A44,?,?,?,?,00000001), ref: 0218A823
                                            • IsWindowVisible.USER32(00000000), ref: 0218A890
                                              • Part of subcall function 0218B5D0: LoadLibraryW.KERNEL32(004C0BF4,004C0BDC,?,0218B651,004A3890), ref: 0218B5EB
                                              • Part of subcall function 0218B5D0: GetProcAddress.KERNEL32(00000000), ref: 0218B5F2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundVisible$AddressLibraryLoadProc
                                            • String ID:
                                            • API String ID: 559202094-0
                                            • Opcode ID: 1b822b83f54eb783e1beb6e98d1f90d02db2a897f562ac8009dc5fc06fe466b1
                                            • Instruction ID: 4b541043edea2e9b1ff3cd555a8cfe24ab32aad4c6729fe414f90d5263b38f84
                                            • Opcode Fuzzy Hash: 1b822b83f54eb783e1beb6e98d1f90d02db2a897f562ac8009dc5fc06fe466b1
                                            • Instruction Fuzzy Hash: 23518E31A883808BC734BF6898D05EAB7E5FF81345F44453EE68887200EB355A85DFE2
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 0212208B
                                            • WindowFromPoint.USER32(?,?), ref: 0212209B
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 021220BB
                                            • SendMessageW.USER32(00000000,00000084,00000000,?), ref: 021220E5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$CursorFromMessagePointProcessSendThread
                                            • String ID:
                                            • API String ID: 3692963090-0
                                            • Opcode ID: bf2bcef10f5004125dfb244e15bd72f7526e5bcd0c086549a6f802b11aa38257
                                            • Instruction ID: 52abebd465f0fda5f5dbf8025b0148289a8c3acdec7451f190abfb104ca59f29
                                            • Opcode Fuzzy Hash: bf2bcef10f5004125dfb244e15bd72f7526e5bcd0c086549a6f802b11aa38257
                                            • Instruction Fuzzy Hash: 4241AF30A883308FE7249F14D888B2E77E1EB84308F54082EFE9582261D775D9ADCB57
                                            APIs
                                            • CLSIDFromProgID.COMBASE(004A3890,?), ref: 02166708
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FromProg
                                            • String ID:
                                            • API String ID: 3303861117-0
                                            • Opcode ID: 58294abb8fdee38dbe5b5f00303f33a6a6918028cff27506c07d57bbde999d42
                                            • Instruction ID: 116075eef33432a88628bcb3aea9879d0627aabadc88e6e46244920e1c475894
                                            • Opcode Fuzzy Hash: 58294abb8fdee38dbe5b5f00303f33a6a6918028cff27506c07d57bbde999d42
                                            • Instruction Fuzzy Hash: F041BFB56003409FD704CF68D888B6AB7E8FB89319F14857EF909CB250E779E915CBA1
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00008000,?,?), ref: 02182E45
                                              • Part of subcall function 02182CE0: FindFirstFileW.KERNEL32(?,?,?), ref: 02182D2C
                                              • Part of subcall function 02182CE0: FindClose.KERNEL32(00000000), ref: 02182D38
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 02182E72
                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 02182EC9
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 02182EDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: PrivateProfileWrite$FindString$CloseFileFirstFullNamePathSection
                                            • String ID:
                                            • API String ID: 1032437609-0
                                            • Opcode ID: 42aa3618908874c96a052b404d798eb055d65569fdcca02c83836074fc1e4db7
                                            • Instruction ID: d72b5991538b291bc3acff4861b8a388f6eb7beb17a02afd334d0e08e7ac004e
                                            • Opcode Fuzzy Hash: 42aa3618908874c96a052b404d798eb055d65569fdcca02c83836074fc1e4db7
                                            • Instruction Fuzzy Hash: 253158326802146BC736EB54DC81FFA73A9EB59710F1041AAFD46A71C4D7B09684CFA4
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 0211AE1B
                                              • Part of subcall function 021865B0: _vswprintf_s.LIBCMT ref: 021865C9
                                            • GetTickCount.KERNEL32 ref: 0211AE31
                                            • GetTickCount.KERNEL32 ref: 0211AF3A
                                            • PostMessageW.USER32(004CA564,00000312,?,00000000), ref: 0211AF5C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountTick$MessagePost_vswprintf_s
                                            • String ID:
                                            • API String ID: 134691662-0
                                            • Opcode ID: 12b5987cdf12e5e63177606ad771d35da1e3858191e44414540bced949eb95dd
                                            • Instruction ID: f047c0405584bd34a34ab712afdd8d1c1247f8f43d95d2974a53f93c740dd028
                                            • Opcode Fuzzy Hash: 12b5987cdf12e5e63177606ad771d35da1e3858191e44414540bced949eb95dd
                                            • Instruction Fuzzy Hash: B73148B6A853859FE7A0DF64EC84FAA3F51FB40715F04807AE98492290D3745458CB9E
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 021A96A8
                                            • __isleadbyte_l.LIBCMT ref: 021A96DB
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,021A0474,?,00000000,00000000,?,?,?,?,021A0474,00000000), ref: 021A970C
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,021A0474,00000001,00000000,00000000,?,?,?,?,021A0474,00000000), ref: 021A977A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: 6bf853ae2f161f5a34ded4e7b8bbada234fe93d8fd70944f6cc760147cfe4a90
                                            • Instruction ID: 81551febd284e8d8f83e3dc11b404560f80464576a456a76bd2acab579da9434
                                            • Opcode Fuzzy Hash: 6bf853ae2f161f5a34ded4e7b8bbada234fe93d8fd70944f6cc760147cfe4a90
                                            • Instruction Fuzzy Hash: AD31F639A44285EFCF21DFA8C8A0ABE3BB5FF01314F154969E4698B1A1D730D980DF90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 1dd92524b566162a11483f81f651ebfa27d3dc4138ff3c148e50568542e9210b
                                            • Instruction ID: 9f76f4e08d3153c4fa2fa1a8c84b7a02e4f1330999a65f6d2ef6989988949f10
                                            • Opcode Fuzzy Hash: 1dd92524b566162a11483f81f651ebfa27d3dc4138ff3c148e50568542e9210b
                                            • Instruction Fuzzy Hash: 3721F73A6402049F8B10DF65D88887FB7A9EBC9621B55867EFC1CC7210DB31DC19CB90
                                            APIs
                                            • __wcsicoll.LIBCMT ref: 0217DB78
                                            • CreatePopupMenu.USER32 ref: 0217DBA4
                                            • SetMenuDefaultItem.USER32(00000000,?,00000000,?,?), ref: 0217DBE8
                                            • CreateMenu.USER32 ref: 0217DC67
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Menu$Create$DefaultItemPopup__wcsicoll
                                            • String ID:
                                            • API String ID: 2645790526-0
                                            • Opcode ID: 0645373555680b832c703ea3490dc6799377385098865099364d46f3deabaf24
                                            • Instruction ID: baa40ce3db203b40b3c6c124c30fae3223d6163d9c99aa8cb538cce56c4395e5
                                            • Opcode Fuzzy Hash: 0645373555680b832c703ea3490dc6799377385098865099364d46f3deabaf24
                                            • Instruction Fuzzy Hash: A93166716847099FD720DF29E804B2BBBF5BFC9714F150A2DE88993250E7B4E504CB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: f93a8f5ece9b7f4ed98fb35e62aa26fe980490d6f2ad06af92ec744b0999a5ea
                                            • Instruction ID: 36c1a96ea8efe714a6be1a5a90194b126031f09fd66b95cedbb3b62cbdf16f29
                                            • Opcode Fuzzy Hash: f93a8f5ece9b7f4ed98fb35e62aa26fe980490d6f2ad06af92ec744b0999a5ea
                                            • Instruction Fuzzy Hash: 6221D03A6002049F8B10DF65D88482B77A8EBC9B22B55897FFC1CD7251DE39D80D8755
                                            APIs
                                            • GetModuleHandleW.KERNEL32(004A7154,004A7144), ref: 02124BDA
                                            • GetProcAddress.KERNEL32(00000000), ref: 02124BE1
                                            • GetVersionExW.KERNEL32(004CC068), ref: 02124C0D
                                            • __snwprintf.LIBCMT ref: 02124C44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProcVersion__snwprintf
                                            • String ID:
                                            • API String ID: 3388246157-0
                                            • Opcode ID: 32fae2caef0a7f30becbde89c6afbefd60492e4f596e9ed5866628dafe20d96e
                                            • Instruction ID: 91d0b76160edd3a7a1fba5d6c4deeea952a95f0cd21682e39724b377f6f6042b
                                            • Opcode Fuzzy Hash: 32fae2caef0a7f30becbde89c6afbefd60492e4f596e9ed5866628dafe20d96e
                                            • Instruction Fuzzy Hash: D9317E71688254DED7A5CFAAACC4F603BA1B316314F19157AF40D86362CBB640A9CF2D
                                            APIs
                                            • GetProcAddress.KERNEL32(00000000,004A7030), ref: 02123C62
                                            • GetCurrentProcess.KERNEL32(?), ref: 02123C7E
                                            • IsWow64Process.KERNEL32(00000000), ref: 02123C85
                                            • FreeLibrary.KERNEL32(00000000), ref: 02123CAB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AddressCurrentFreeLibraryProcWow64
                                            • String ID:
                                            • API String ID: 2487901806-0
                                            • Opcode ID: d71ff97a24f90802113fa9838289f6aefaaa6826565bce9bd5dd19c572f6cc23
                                            • Instruction ID: 51277bc745457e4fb5a2c52f02a6f923f0def874c1278ad18e7786eceb98a78f
                                            • Opcode Fuzzy Hash: d71ff97a24f90802113fa9838289f6aefaaa6826565bce9bd5dd19c572f6cc23
                                            • Instruction Fuzzy Hash: 2621377164022C9FD7244F25FC88BA673A9EB40719F16117FF462C2570DB38C4B8CA99
                                            APIs
                                            • GetParent.USER32(00000000), ref: 0046A188
                                            • GetWindowRect.USER32(?,?), ref: 0046A1AC
                                            • GetWindowRect.USER32(?,?), ref: 0046A1B6
                                            • IntersectRect.USER32(?,?,?), ref: 0046A1C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Rect$Window$IntersectParent
                                            • String ID:
                                            • API String ID: 3824346474-0
                                            • Opcode ID: a2a9c61d02c7a5410c11e78f0f90da1b9aa997381b9e9349aa7e1fb9457c62a5
                                            • Instruction ID: ffffdbbbc35763f3e59cd151e13437dee45ede1eb13d76331a43f8c16601ccf0
                                            • Opcode Fuzzy Hash: a2a9c61d02c7a5410c11e78f0f90da1b9aa997381b9e9349aa7e1fb9457c62a5
                                            • Instruction Fuzzy Hash: C321CCB21083409BC304CF54D98099BFBE4FB96310F048A2EE98693214D636E918CF97
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 0217A9A0
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0217A9A9
                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0217AA29
                                            • MapWindowPoints.USER32(?,?,?,00000002), ref: 0217AA44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ClientLongMessagePointsRectSend
                                            • String ID:
                                            • API String ID: 1965652201-0
                                            • Opcode ID: 6cffab8d8c0d44edddcee5e0414bb86ac7c9c45487e3b09f3ee518a7a6ba5046
                                            • Instruction ID: 500050e8e0e052fa006078da5760d63a60f5619897b9cdebc619205f352ab0e5
                                            • Opcode Fuzzy Hash: 6cffab8d8c0d44edddcee5e0414bb86ac7c9c45487e3b09f3ee518a7a6ba5046
                                            • Instruction Fuzzy Hash: 51217A7124A342AFD308DF28CD45BAEBBE8FFC8741F04891DF59296290D774A605CB56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsnicmp_wcstoul
                                            • String ID:
                                            • API String ID: 372159744-0
                                            • Opcode ID: 5775e04b1fad546c23c7350f24c6ab725d30e7789c3c1376bd2d91f5a5e0cb24
                                            • Instruction ID: 14060cfa4ec471d65f85f73f315f2d5391a2973c2b77f1d3ed748cdff35d34ee
                                            • Opcode Fuzzy Hash: 5775e04b1fad546c23c7350f24c6ab725d30e7789c3c1376bd2d91f5a5e0cb24
                                            • Instruction Fuzzy Hash: B0114C369C43316BE700EB68BC41FEB739E6F95718F04405AF84C9B281E3A6D51987A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __getptd_noexit
                                            • String ID:
                                            • API String ID: 3074181302-0
                                            • Opcode ID: 9e1da2fe81c1f81961f87cd0be240a4457afa06abba1d31a25c5393deff3c16e
                                            • Instruction ID: c0445ac52d2d1a91aa1f3a9c5c15c9ac57d8015926fb061f4804198a9105f7ba
                                            • Opcode Fuzzy Hash: 9e1da2fe81c1f81961f87cd0be240a4457afa06abba1d31a25c5393deff3c16e
                                            • Instruction Fuzzy Hash: 7811937A682204BFDF315F71DC14B6A3A69FB857A0F214564ED51961A0DB708940CB94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Object$Delete$IconInfo
                                            • String ID:
                                            • API String ID: 507670407-0
                                            • Opcode ID: 08d23ffeff4b942ab2032edc374c2c6eb2402444333ed95def03b1ba7f102634
                                            • Instruction ID: c01d2a373b3f42516f172c59a9f8ef1b064613a64d7b7b83a78346f5bae6b3ad
                                            • Opcode Fuzzy Hash: 08d23ffeff4b942ab2032edc374c2c6eb2402444333ed95def03b1ba7f102634
                                            • Instruction Fuzzy Hash: 1F113D757042119BD714DF2ACC40AA7B7E9BF85754B04892EE819C7360F734E8029B96
                                            APIs
                                            • GetKeyState.USER32(-00000001), ref: 02161985
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: State
                                            • String ID:
                                            • API String ID: 1649606143-0
                                            • Opcode ID: 30c581018c6b5407fb735b64b023a340e6b3019dc2629554ecdd3b9917c572b8
                                            • Instruction ID: 28a0f4af97774b737de39863c012630d12a23bbc5ef04bf9dea30c15ef92b762
                                            • Opcode Fuzzy Hash: 30c581018c6b5407fb735b64b023a340e6b3019dc2629554ecdd3b9917c572b8
                                            • Instruction Fuzzy Hash: 621108B54D01146ADF188F34A82D7FC37D1B79234AFCC4895E0CD8A191D32E816DE616
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 88c3a55fa520e33e21593ec9370fcb1b100599787eeceb93dcbf277ecf4b7da2
                                            • Instruction ID: 0b170eb11ada369bf57085e0924c72f7e09b04b53c63fa9cc0c35702f847a11b
                                            • Opcode Fuzzy Hash: 88c3a55fa520e33e21593ec9370fcb1b100599787eeceb93dcbf277ecf4b7da2
                                            • Instruction Fuzzy Hash: CD11F679640B009FC724EBA5C894B57B3E9BF89704F14891CE99A87790DB39E801CB51
                                            APIs
                                            • GetMessageW.USER32(?,00000000,00000000,-00000311), ref: 02111790
                                            • GetFocus.USER32 ref: 02111834
                                            • _wcsncpy.LIBCMT ref: 021125F2
                                            • _wcsncpy.LIBCMT ref: 02112613
                                            • _wcsncpy.LIBCMT ref: 0211268B
                                              • Part of subcall function 021139C0: SetCurrentDirectoryW.KERNEL32(004A3890,?,004CAD6C,0213D5B5,00000000,00000000,00000065), ref: 02113A35
                                            • GetTickCount.KERNEL32 ref: 021126B7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcsncpy$CountCurrentDirectoryFocusMessageTick
                                            • String ID:
                                            • API String ID: 2031546545-0
                                            • Opcode ID: a603a2f4cce01d11e8a7e6809e6ae30fc840f5761466c8a8508c10a81f5e8467
                                            • Instruction ID: 4db0cb4c947fb0fe431a5af39732381d402e79c7a1a191799940b9b8863a6c27
                                            • Opcode Fuzzy Hash: a603a2f4cce01d11e8a7e6809e6ae30fc840f5761466c8a8508c10a81f5e8467
                                            • Instruction Fuzzy Hash: 5411C2746402009FE364DF65DC52E5677A5FF89304F04853CE94A972B1EB70A814CBAA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction ID: 5ecf0e655be76999f57c6178485e1f9e2d1575bfcba749b05efbb8babae6f9cf
                                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction Fuzzy Hash: 0511663A48018EBFCF265E84CC618EE3F77BF18394B198415FA6858020D736C5B1EB81
                                            APIs
                                            • _malloc.LIBCMT ref: 021A12E2
                                              • Part of subcall function 0219FEF4: __FF_MSGBANNER.LIBCMT ref: 0219FF0D
                                              • Part of subcall function 0219FEF4: __NMSG_WRITE.LIBCMT ref: 0219FF14
                                              • Part of subcall function 0219FEF4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0219FF39
                                            • std::exception::exception.LIBCMT ref: 021A1317
                                            • std::exception::exception.LIBCMT ref: 021A1331
                                            • __CxxThrowException@8.LIBCMT ref: 021A1342
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                            • String ID:
                                            • API String ID: 615853336-0
                                            • Opcode ID: 3210b775c5a043df588acabb392f9cfcaba741b45311ccdbf8bc3cce2aad1651
                                            • Instruction ID: 75df26e42520edfa5bf2d80e2f28fe7a727b5a2849f432c451c65f2a4568c1e1
                                            • Opcode Fuzzy Hash: 3210b775c5a043df588acabb392f9cfcaba741b45311ccdbf8bc3cce2aad1651
                                            • Instruction Fuzzy Hash: 05F0447C8806097EDF40FB54CC24BAE3AAAAB90354F68006EE419E21E0CFB4C941CF48
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll$__wcsicmp_l
                                            • String ID:
                                            • API String ID: 3172861507-0
                                            • Opcode ID: 671f2a05066076d7985238845dedb2542319bfb4710b9ae564652af99fa2a317
                                            • Instruction ID: db68d04bdea3c7ac6c861d962069a6b129518bd9d826ad2238a6261c8cef7839
                                            • Opcode Fuzzy Hash: 671f2a05066076d7985238845dedb2542319bfb4710b9ae564652af99fa2a317
                                            • Instruction Fuzzy Hash: 6FE06570EC166621DF2129306D4175E309D4F12B06FA90038BC08E09C1FF8ED52AA1A9
                                            APIs
                                            • _free.LIBCMT ref: 0211E184
                                              • Part of subcall function 021A07B1: HeapFree.KERNEL32(00000000,00000000,?,021A3973,00000000,?,021A4C02,?,021865CE), ref: 021A07C7
                                              • Part of subcall function 021A07B1: GetLastError.KERNEL32(00000000,?,021A3973,00000000,?,021A4C02,?,021865CE), ref: 021A07D9
                                            • _free.LIBCMT ref: 0211E18D
                                            • _free.LIBCMT ref: 0211E196
                                            • _free.LIBCMT ref: 0211E1A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 1d653afc0b5b4d72424c6d1f83938718647a2103f5bb989e249a50e4e0938c8e
                                            • Instruction ID: fcfba938835a968be3645d919794d50c61aee4bd251177795dc0b78cfef20e87
                                            • Opcode Fuzzy Hash: 1d653afc0b5b4d72424c6d1f83938718647a2103f5bb989e249a50e4e0938c8e
                                            • Instruction Fuzzy Hash: 8ED067BA540B009FC634ABF4C894E1773AAAF8D310BA48A1CAAC747A44DB74E4458F90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: z
                                            • API String ID: 0-1657960367
                                            • Opcode ID: ae7f74adada480b2a51ef882d72b9535e1c328b5541bd4fb2dfc6e2ffc10b2e8
                                            • Instruction ID: fae5ee67b392fbda8aeeed42e9e1aff23eb77c6f238d91f5da1b27c4ecf6aab0
                                            • Opcode Fuzzy Hash: ae7f74adada480b2a51ef882d72b9535e1c328b5541bd4fb2dfc6e2ffc10b2e8
                                            • Instruction Fuzzy Hash: EC028A716083418FC728DF28C5906AFB7E1FFC8714F54896EE88A87341D778A985CB96
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0212073C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessagePeek
                                            • String ID: @$@
                                            • API String ID: 2222842502-149943524
                                            • Opcode ID: 11034188c2bc69193e2bbdba781310bf48e299ca8adb864499640c3c6578da35
                                            • Instruction ID: cdd19fff96057434a1c6b540fc86bb5dd9c970ba9a39e8566d752670f8fc949c
                                            • Opcode Fuzzy Hash: 11034188c2bc69193e2bbdba781310bf48e299ca8adb864499640c3c6578da35
                                            • Instruction Fuzzy Hash: 4EB118346883E45EF715CB248854BBB7FB19BAA348F088569F5C00B2C2C7B5841CCB67
                                            APIs
                                              • Part of subcall function 00444650: GetForegroundWindow.USER32(?,?,00437345,?), ref: 0044467E
                                              • Part of subcall function 00444650: IsWindowVisible.USER32(00000000), ref: 00444699
                                            • SendMessageTimeoutW.USER32(00000000,?,00000000,00000000,00000002,00001388,?), ref: 004382B2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundMessageSendTimeoutVisible
                                            • String ID: FAIL
                                            • API String ID: 578228273-2964506365
                                            • Opcode ID: a53029a06b22c017d1b43aa18f8df6c6b4810d41da9da551def13fae6fb2dd42
                                            • Instruction ID: b8563befaeef53a1b23f593fb44afa5e9eaf67b67f55a10d57882c3974533e0c
                                            • Opcode Fuzzy Hash: a53029a06b22c017d1b43aa18f8df6c6b4810d41da9da551def13fae6fb2dd42
                                            • Instruction Fuzzy Hash: 56A1F4717043005BDB20CF55E881B67F7A1AB99718F2491AFF8458B382CB7ADC85C799
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentDirectory_free
                                            • String ID: The current thread will exit.$__Delete will now return.
                                            • API String ID: 3757797350-1380654191
                                            • Opcode ID: b513cf29519713b95e58e941b77984a22c8e700fa06c824b819a970a10871fb0
                                            • Instruction ID: 2fedf5506e07530951c3dcaea4e1fb84c005cf08f3e4706f789002a82106c225
                                            • Opcode Fuzzy Hash: b513cf29519713b95e58e941b77984a22c8e700fa06c824b819a970a10871fb0
                                            • Instruction Fuzzy Hash: A27107706843049FD728DF25C880B6AB3E5EF48718F04455DFA8C9B282EB71EA49CBC5
                                            APIs
                                            • SendMessageW.USER32(?,00001127,00000000,00000010), ref: 02160479
                                            • SendMessageW.USER32 ref: 021604FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: $cJ
                                            • API String ID: 3850602802-417114052
                                            • Opcode ID: 3d32e9a033b3f68d0da364985c163fb5253f3dbb21dda329ad3ae70eb24fda6c
                                            • Instruction ID: 9a548a0ff0a7d3b0b0e28031b8daa0b50f8efba3ee751cf0bacdd33a10b73e19
                                            • Opcode Fuzzy Hash: 3d32e9a033b3f68d0da364985c163fb5253f3dbb21dda329ad3ae70eb24fda6c
                                            • Instruction Fuzzy Hash: 9D51BC726443019FD7208F15D888B3EB7E5FF89725F55456DE9998B2C0E730D860CB52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __fassign
                                            • String ID: ,
                                            • API String ID: 3965848254-605440088
                                            • Opcode ID: 6d392ecb036466c7bc28d4b1ee0a262d97b5b41adce7e34230ff3c154ea9b493
                                            • Instruction ID: d6bb3469b80505cc0582e02f2ea48a6eb12af8ae11f46ba2f85ba08326924b5e
                                            • Opcode Fuzzy Hash: 6d392ecb036466c7bc28d4b1ee0a262d97b5b41adce7e34230ff3c154ea9b493
                                            • Instruction Fuzzy Hash: 16511674980321EFD721DF14D88072A73E5AF86354F140968FC999F392E371D9A9CB92
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 02127D93
                                              • Part of subcall function 021279C0: Shell_NotifyIconW.SHELL32(00000001,004CB28E), ref: 02127A90
                                            • SetCurrentDirectoryW.KERNEL32(004A3890,00000000,?,00000100,00000000), ref: 02127DFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentDirectoryIconNotifyShell__wcsncpy
                                            • String ID: $cJ
                                            • API String ID: 3432613961-417114052
                                            • Opcode ID: 038e1feb790dc717154fd5b89b9ce248b4eccb317c44cf7873f455b07e1d4a64
                                            • Instruction ID: c210c37767fc12cab6465518a77157925e5b832d5ff482d28fed95e843101f49
                                            • Opcode Fuzzy Hash: 038e1feb790dc717154fd5b89b9ce248b4eccb317c44cf7873f455b07e1d4a64
                                            • Instruction Fuzzy Hash: D85125B2644384DFD760DF68ECC0E67BB95EB85304F04847DF9488B290D7319858CB6A
                                            APIs
                                            • SendMessageW.USER32(?,0000105F), ref: 0215EB5F
                                              • Part of subcall function 0216D880: __wcsicoll.LIBCMT ref: 0216D89C
                                            • SendMessageW.USER32(?,0000104B), ref: 0215EBBC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MessageSend$__wcsicoll
                                            • String ID: $cJ
                                            • API String ID: 2764284104-417114052
                                            • Opcode ID: 9942069cf0db6a43520bd863272c55bd2024a636f1389c3bde3502c8a9f0dec1
                                            • Instruction ID: 8d51d0402d99620319c84a9f22263369dcdb9fc4fea97f31733b701f78ada192
                                            • Opcode Fuzzy Hash: 9942069cf0db6a43520bd863272c55bd2024a636f1389c3bde3502c8a9f0dec1
                                            • Instruction Fuzzy Hash: 8341D2B1644311DFD720CF28D880B6AB7E6FB84314F104AADF96A9B290E771D904CF62
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __itow
                                            • String ID: 0x%Ix
                                            • API String ID: 3482036329-2288733857
                                            • Opcode ID: 0e86f06e918903fd84595879037907ab772fc429207a04ceee62b104076617b2
                                            • Instruction ID: ae776d68f3dfc35fe916c0b1f613de8eb1b81822cf01e6b70569880b687ae888
                                            • Opcode Fuzzy Hash: 0e86f06e918903fd84595879037907ab772fc429207a04ceee62b104076617b2
                                            • Instruction Fuzzy Hash: F24121326082059FE7149B65C881B7773A0FF85310F9885AAFD408B790E3B9FC12C79A
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 02150488
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 021504EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DiskFreeSpace_wcsncpy
                                            • String ID: \
                                            • API String ID: 1165104651-2967466578
                                            • Opcode ID: 00abc2931b9043036465fde4b3fb628bd60df9bb621ab5a09d270a4bf91d96da
                                            • Instruction ID: da2b8c4d6dcbc7da4229f8b84d9b919c08bdec07e364e1467dcfebebc84e7516
                                            • Opcode Fuzzy Hash: 00abc2931b9043036465fde4b3fb628bd60df9bb621ab5a09d270a4bf91d96da
                                            • Instruction Fuzzy Hash: 61315932654314ABC724DB54DC44F9BB3A9EB8C320F04466AFD55672D0D7B0E544C7D9
                                            APIs
                                            • FormatMessageW.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 021684A1
                                            • _vswprintf_s.LIBCMT ref: 021684E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FormatMessage_vswprintf_s
                                            • String ID: No valid COM object!
                                            • API String ID: 3456365560-2914111645
                                            • Opcode ID: 5279c4d66cdd857995fb1138bce6be5872ad67d9030ff9327ad50f91fc1a19d4
                                            • Instruction ID: 73771d8ddfab5f38d47d257009e3c8be0336e9dbd94807acb60225ac53100ac7
                                            • Opcode Fuzzy Hash: 5279c4d66cdd857995fb1138bce6be5872ad67d9030ff9327ad50f91fc1a19d4
                                            • Instruction Fuzzy Hash: 6F314672644310ABD714EBA8DC88F7B37ADEF88704F018929AA0597080E774D908C7A5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcschr
                                            • String ID: function$variable
                                            • API String ID: 2691759472-1379276077
                                            • Opcode ID: 273e7c0133b1aeefffe944e0a34a659cb347f42e1708adecfc6786368bde12dd
                                            • Instruction ID: f3d54f62b6f6b0778473d9284875fbe781861ffd6541292233e4b0c0c349a1ff
                                            • Opcode Fuzzy Hash: 273e7c0133b1aeefffe944e0a34a659cb347f42e1708adecfc6786368bde12dd
                                            • Instruction Fuzzy Hash: 0C110666F8021417CB30B55AAC81F667399CB84335F04427BFD0CD72C0FB65985486E5
                                            APIs
                                            • SetCurrentDirectoryW.KERNEL32(004A3890,?,004CAD6C,0213D5B5,00000000,00000000,00000065), ref: 02113A35
                                            • GetTickCount.KERNEL32 ref: 02113AA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountCurrentDirectoryTick
                                            • String ID: e
                                            • API String ID: 2167818035-4024072794
                                            • Opcode ID: 6b79dfba60c1fe39b664df0ffb153e290497f8b9d3a5b6ee83f90ab23ff93158
                                            • Instruction ID: aeb937f93c5e38e6053017fa686df37c407cb6dbc2de31d2e8a1d5e3921bff0c
                                            • Opcode Fuzzy Hash: 6b79dfba60c1fe39b664df0ffb153e290497f8b9d3a5b6ee83f90ab23ff93158
                                            • Instruction Fuzzy Hash: F12181705447818EEB64CF29F808B56BBE1EB45318F0889BED4A6D73D4C7B59889CF48
                                            APIs
                                            • InsertMenuItemW.USER32(?,00000000,00000001,00000030), ref: 0217D282
                                              • Part of subcall function 0217DB50: __wcsicoll.LIBCMT ref: 0217DB78
                                            • GetMenuItemCount.USER32(?), ref: 0217D26C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ItemMenu$CountInsert__wcsicoll
                                            • String ID: 0
                                            • API String ID: 858756630-4108050209
                                            • Opcode ID: 2b92bb06e0142acd0dbe52444476e352b5e1701e98f4fdf13df1b190600c588d
                                            • Instruction ID: 7b6445538bd0e89e7a74dd277883dffa51913f4888ef695b1ab591f460508423
                                            • Opcode Fuzzy Hash: 2b92bb06e0142acd0dbe52444476e352b5e1701e98f4fdf13df1b190600c588d
                                            • Instruction Fuzzy Hash: 34216D716097059FD724CF69E444A2BBBF8EF88720F008A1EF896C7690E770E905CB91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: `dL$d;J
                                            • API String ID: 3832890014-3532224444
                                            • Opcode ID: 5be9c0ad1f30b90bfbbea2a9dea22aa66a09807b75e48b5532cfdc895c69757e
                                            • Instruction ID: c8df1d14cbff63bf17d27a671809ae29b2d870904445787f094c082556debab3
                                            • Opcode Fuzzy Hash: 5be9c0ad1f30b90bfbbea2a9dea22aa66a09807b75e48b5532cfdc895c69757e
                                            • Instruction Fuzzy Hash: B401F97238410547D725DEA8F8806FA73A6E780371F15883BE905C7101E332E8099655
                                            APIs
                                            • FileTimeToLocalFileTime.KERNEL32 ref: 00476044
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00476062
                                            Strings
                                            • %04d%02d%02d%02d%02d%02d, xrefs: 00476090
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$File$LocalSystem
                                            • String ID: %04d%02d%02d%02d%02d%02d
                                            • API String ID: 1748579591-4847443
                                            • Opcode ID: 42e1a3b716db4f8600779cadb7be6b665accd6c124b5f7ce359656b884348930
                                            • Instruction ID: 2b1691edeaa739b97338c0010a2acaf2dcc89ee84594656d4247a61c926406e4
                                            • Opcode Fuzzy Hash: 42e1a3b716db4f8600779cadb7be6b665accd6c124b5f7ce359656b884348930
                                            • Instruction Fuzzy Hash: 15019EA1118610AAC318DF55DC459BBB7E8AF89B00F008A4EF9C882290F67CD844E7A7
                                            APIs
                                            • __getptd.LIBCMT ref: 021AF5CA
                                              • Part of subcall function 021A3982: __getptd_noexit.LIBCMT ref: 021A3985
                                              • Part of subcall function 021A3982: __amsg_exit.LIBCMT ref: 021A3992
                                            • __getptd.LIBCMT ref: 021AF5D8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                            • String ID: csm
                                            • API String ID: 803148776-1018135373
                                            • Opcode ID: cf4c69ece9d69a2b6b889e57c0bbc0dc20a53738493a5713921788ea5bc3160b
                                            • Instruction ID: 4adf9cf630d902da982a5803503539385b6e0cbe723a6abb98b3f2f10a779ba6
                                            • Opcode Fuzzy Hash: cf4c69ece9d69a2b6b889e57c0bbc0dc20a53738493a5713921788ea5bc3160b
                                            • Instruction Fuzzy Hash: F2018B388812009ECF349F68C4607ADB3B6FF00318F24452DD4C996AA0CB329597CF81
                                            APIs
                                            • IsWindow.USER32(004CA564), ref: 02140A4D
                                            • DestroyWindow.USER32(004CA564), ref: 02140A65
                                            Strings
                                            • This DllCall requires a prior VarSetCapacity., xrefs: 02140A41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$Destroy
                                            • String ID: This DllCall requires a prior VarSetCapacity.
                                            • API String ID: 3707531092-2544115803
                                            • Opcode ID: dabbcdf0e06df0105577b415bdc5ca899a36287992fbd9f27948f0e5404afb97
                                            • Instruction ID: b6fac81c21170fe87d1e65275be6d82fc4f9777d3387bb8b16b2f7d5f02c857f
                                            • Opcode Fuzzy Hash: dabbcdf0e06df0105577b415bdc5ca899a36287992fbd9f27948f0e5404afb97
                                            • Instruction Fuzzy Hash: FCE01274681304AFD348DB65ED4DF653BA4AB49745F04C53CB209876A1DB74A401CB59
                                            APIs
                                            • GetGUIThreadInfo.USER32 ref: 02123AF5
                                            • GetKeyboardLayout.USER32(00000000), ref: 02123B0F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoKeyboardLayoutThread
                                            • String ID: 0
                                            • API String ID: 939672861-4108050209
                                            • Opcode ID: 6d501edb6af67e15d7267ec7101b85c6d7b328b853351aa09eec27844975f908
                                            • Instruction ID: f58feacc1399bd08e7ef511c4aa903f6dabbe0650fca57da1feee038872c7ca8
                                            • Opcode Fuzzy Hash: 6d501edb6af67e15d7267ec7101b85c6d7b328b853351aa09eec27844975f908
                                            • Instruction Fuzzy Hash: 9DE0307660122167D730AE669C04B9BBE9CEF82994F050565F815D3160D764C809C6F5
                                            APIs
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00401012
                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627034341.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2627034341.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2627034341.00000000004CE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AvailableClipboardFormat
                                            • String ID: <<>>
                                            • API String ID: 778505046-913080871
                                            • Opcode ID: 04f0b6836c3849fc43cd959317823ad0a7ee629a3c685ef4d77dab26bbd98445
                                            • Instruction ID: fc4e81c7ec4e22e57c7312cd810b67a9f2312ac08cb55214dfa6a66ca0fee7f1
                                            • Opcode Fuzzy Hash: 04f0b6836c3849fc43cd959317823ad0a7ee629a3c685ef4d77dab26bbd98445
                                            • Instruction Fuzzy Hash: FDE04861300191D3D66066ED7D81F9726809756B58F004137F514DBAE5D33DCC4156AC
                                            APIs
                                            • GlobalUnlock.KERNEL32(00000000), ref: 02114A9F
                                            • CloseClipboard.USER32 ref: 02114AAC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2627434216.0000000002110000.00000040.00001000.00020000.00000000.sdmp, Offset: 02110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2110000_W7ZBbzV7A5.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClipboardCloseGlobalUnlock
                                            • String ID: GlobalLock
                                            • API String ID: 3794156920-2848605275
                                            • Opcode ID: 063e2083801668df6284fe6aeb0da6a9bf68f4b1a00cd4b58b436b5e5594adcd
                                            • Instruction ID: 4ae495d22638584510756fcf8ca61652fbac44e6c92f7079e26bde1bee330559
                                            • Opcode Fuzzy Hash: 063e2083801668df6284fe6aeb0da6a9bf68f4b1a00cd4b58b436b5e5594adcd
                                            • Instruction Fuzzy Hash: DFE065740407018BE3349F49E818746B6F0EB80B0AF64482DA086826E0EBB890C4DA88